Examine the real-world information assurance problems


Assignment: Information Assurance Compliance With Government Regulations

Capstone Project Overview

The purpose of this capstone project is for you to examine and solve real-world information assurance problems and apply associated techniques to create practical solutions. The course takes an integrative and senior security officer approach to address the policy, risk, and control opportunities within cyberspace and IT environments. Skills, experience, and knowledge gained through the completion of prerequisite courses will be used throughout each deliverable.

The project contents to be addressed are as follows:

1. Security Needs and Objectives.

2. Cybersecurity Policy Catalog.

3. Information Assurance Compliance With Government Regulations.

Instructions

Review the following articles:

4. Making Policy on Augmented Intelligence in Health Care.

5. Corporate, Operational, and Information Systems Strategies: Alignment and Firm Performance.

6. A Multidimensional Approach to Cybersecurity for Critical Infrastructures.

In addition to the articles above, conduct research and use three additional resources.

Submission Requirements

Write a 6 to 10 page paper in Word in which you:

7. Explain why certain employees and organizations have a deeper level of information assurance (IA) policy compliance.

8. Examine the factors that increased the individual's level of propensity for compliance.

9. Determine the internal and external factors affecting IA policy compliance.

10. Explain which of the organizational requirements poses difficulty in adopting technical features to enhance security policy.

11. Explain why factors related to IA and policy compliance are affected by government regulations.

12. Identify ways you can assess the cyber capability of an organization as a manager.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.

The specific course learning outcome associated with this assignment is:

13. Evaluate factors that complicate information assurance policy compliance, including internal, external, and government regulation factors.

Readings:

1. Corporate, operational, and information systems strategies: Alignment and firm performance

By Ricardo A. Santa and Alejandro Acosta

2. A multidimensional approach to cybersecurity for critical Infrastructures

By Petri?or PATRA?CU

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Examine the real-world information assurance problems
Reference No:- TGS03152073

Now Priced at $120 (50% Discount)

Recommended (91%)

Rated (4.3/5)