Security policies and an information security plan


1. Research the Sarbanes-Oxley Act. Write a minimum of 500 words(this question only), cite your sources using APA 6th style and completely address the following:

- What was the motivation for enacting this law? Specifically, provide some background on the economic conditions in the US that led to this law.

- What arguments do critics have about the law?

- Is this law good or bad for US companies? Both? Explain your answer.

- What other names is this law know by?

2. Describe the relationship between information security policies and an information security plan. How are they different? What does each accomplish in an organization. Why are they important?

3. Describe in detail the five steps an organization must do to create an information security plan.

4. Provide a specific example for each of the three primary security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response. **Hint: Don't just define them...suggest actual technologies/products for each of the six noted above (Two per area).

5. Describe the relationships and differences between hackers and viruses. Be sure to discuss the differences between white-hat hackers and black-hat hackers. Describe how viruses are transmitted.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Security policies and an information security plan
Reference No:- TGS0550974

Expected delivery within 24 Hours