How privacy law differ from information systems security


Lab Assignment

Remember, you must cite and reference sources. Your answer must be a minimum of 2 full pages in length following APA guidelines.

Read the below article titled "VA Ignores Cybersecurity Warnings" By Grant Gross.

Note: When reading the article, place yourself in the position of the person called to prevent the situation from happening again. Where do the vulnerabilities begin?

Discuss the following questions:

1. What laws have been violated?

2. What do you think contributed to the problems that could lead to a violation of these laws?

3. What are the implications to the individual and organization of these violations?

4. What are some security controls and mitigation strategies for handling future violations? (Name three to five)

5. How does privacy law differ from information systems security?

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also include a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also Include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: How privacy law differ from information systems security
Reference No:- TGS02946519

Now Priced at $30 (50% Discount)

Recommended (97%)

Rated (4.9/5)