Overview You have been hired as the Chief Security Officer

Overview

You have been hired as the Chief Security Officer for a local University. For this role, you will be responsible for establishing and maintaining an enterprise-wide information security program to ensure that all information and data assets are not compromised. Knowing the concepts that are presented in the course, you will develop a plan to carry out a security program that deters computer crimes, establishes a process for investigation and outlines which laws are applicable for possible offenders.

Instructions

Write an 8–10 page paper in which you:

  • Use your textbook, the Internet, and Strayer Library to research:
    • Recent computer hacker attacks or other crimes that have been committed against higher educational institutions. 
      • Analyze the processes put in place by other higher education institutions in order to prevent these crimes from reoccurring. 
      • Recommend processes, methodologies, or technology that can be purchased to lower computer crime threats.  
      • Include specifics on pricing and the level of support and maintenance that would be required.
    • Current laws and government agencies that exist in your region that address the threat of computer cyber-crimes. 
      • Identify the laws that would be effective to convict offenders.  
      • Determine what computer crime fighting government programs exist within your region that can complement your security operations.
    • Computer forensics technology that can be used by the University. 
      • Identify the types and determine the costs of technology that can be used for gathering electronic evidence, evidence from hardware, evidence from Firewalls, or cell phones.
      • Use the Strayer Library to find at least four academic resources. Note: Wikipedia and similar Websites are not considered quality references.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. The specific course learning outcome associated with this assignment:

  • Formulate processes and plans for a security program that deters computer crime, including applicable laws, relevant government programs, and appropriate evidence-gathering technology.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Search out and connect with an individual in a management

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

In order for you to develop skills in applying the

 In order for you to develop skills in applying the organizational concepts we are studying to your work to identify problems and propose effective solutions, we will first begin by practicing with case studies based on real issues in organizations. This case study is based upon the actions of real

Bill has spent 25 years as a project manager for

Bill has spent 25 years as a project manager for a large manufacturing company, but he has recently taken over the project management office for a software development company. While most of Bill’s project experience was in lean project management methodologies, he discovered that software development most often utilizes agile

Please read the following case scenario below. You will be

  Please read the following case scenario below. You will be using these facts over the next 7 weeks. The case heading and type of case is listed below. PEOPLE OF THE STATE OF TEXAS, Plaintiff               VS. Scott Mayo, Defendant TYPE OF CASE-Criminal SUMMARY OF FACTS Scott Mayo worked as

Please note that this is an INDIVIDUAL project. You have

  Please note that this is an INDIVIDUAL project. You have recently assumed the role of CFO at your company. The company’s CEO is looking to expand its operations by investing in new property, plant, and equipment. You are asked to do some capital budgeting analysis that will determine whether

Minimum of 300 words with at least two peer review reference in 6th edition apa style. It is important for APRNs to know what medication errors occur and the cause of these errors in order to reduce t Nursing Assignment Help

Minimum of 300 words with at least two peer review reference in 6th edition apa style. It is important for APRNs to know what medication errors occur and the cause of these errors in order to reduce them. Review research studies performed within the last 3-5 years regarding medication errors.

Q2: This week our topic shifts to working with data.

Q2: This week our topic shifts to working with data.  In this week’s discussion post, please note a system that you work with frequently that has a major data component.  Note the type of data, how the data is managed and maintained, and any other important factors regarding the data

Discussion: The Complexity of Eating Disorder Recovery in the Digital

Discussion: The Complexity of Eating Disorder Recovery in the Digital Age Through this week’s Learning Resources, you become aware not only of the prevalence of factors involved in the treatment of eating disorders, but also the societal, medical, and cultural influences that help individuals develop and sustain the unhealthy behaviors

Public Information Officer Paper Nursing Assignment Help

Com Plan Template attached Communication Plan You are a public information officer (PIO) for an emergency  medical services  (EMS) agency, and you have been given the task of educating  the public on child  car seats. You will make a plan for communicating the necessary  information to the  various media outlets

For this assignment, you are to review several of the

  For this assignment, you are to review several of the technologies listed below Assignment:  For this assignment, you are to select four different technologies that we have NOT covered in other modules in this course. Investigate these technologies using the links provided and elsewhere.  Provide the information for each

Scenario: Watch the following video, and then answer the questions

  Scenario: Watch the following video, and then answer the questions below (Wiseman, 2014): https://youtu.be/z7kMeJQWr4Y  The chart is used to visually present relationships between what variables? A correlation analysis measures the strength of what variables? A correlation analysis is concerned with the strength of the relationship between what variables? If

Develop the initial outline of your Complete Marketing Plan. Develop

Develop the initial outline of your Complete Marketing Plan. Develop an original product or service. What do you want to market? What is your target market? Where do you want to market your product? Why do you want to market this product to that target market in that physical environment?

I’m really struggling with this graph problem because the hard

I’m really struggling with this graph problem because the hard part is how to model the maze as a graph. Please help me solve it in C++ or Python preferably with a known graph algorithm, the expected input and output of this graph problem will be explained below: One of

Human Trafikking

Write a paper based on Human Trafikking. Please make sure professor instructions are follow exactly. Please identify clearly an issue, problem or condition related to stress, trauma, crisis or PTG in individuals, families or communities. You can base your choice on a particular case to which analysis informed by available

Amazon.com has become one of the most successful online merchants.

 Amazon.com has become one of the most successful online merchants. Two measures of its success are sales and net income/loss figures. The data can be found in the file, Amazon.Use Excel to complete the following: Construct a scatter plot for Amazon’s net income/loss and sales figures for the period 1995–2015.  

J.S. is a 42-year-old man who lives in the Midwest

  J.S. is a 42-year-old man who lives in the Midwest and is highly allergic to dust and pollen and has a history of mild asthma. J.S’s wife drove him to the emergency room when his wheezing was unresponsive to his fluticasone/salmeterol (Advair) inhaler. J.S. was unable to lie down,