Business > CASE STUDY > IT 412 ShortPaper ImpactOfDataBreach.doc IT 412 “ Cyberlaw and Ethics 4.1 Short Pape (All)

IT 412 ShortPaper ImpactOfDataBreach.doc IT 412 “ Cyberlaw and Ethics 4.1 Short Pape

Document Content and Description Below

IT_412___ShortPaper_ImpactOfDataBreach.doc IT 412 “ Cyberlaw and Ethics 4.1 Short Paper: Impact of Data Breach Southern New Hampshire University There are three laws that primarily effect the ... data breach for this aircraft manufacturing plant located in California. They are The Federal Information Security Management Act, The Sarbanes-Oxley Act, and the California Breach Notification Act. The Federal Information Security Act also known as FISMA was created in 2002 as part of the E-Government Act. This law was put in place to require entities to develop and maintain an information security program. This act would have applied to the aircraft manufacturer as well. The information security program must include a risk assessment, annual inventory, policies, and procedures, testing and evaluation and incident response (Grama & Spinello. n.d.). Preforming a risk assessment, would have allowed the aircraft manufacturer the ability to measure the possibility of harm that would result from unauthorized access to their system. The security program created should be developed and updated from this assessment. By preforming this assessment annually, you can make changes if needed to the IT security program. An annual inventory of all the IT equipment will ensure none of the equipment is missing and will also allow the ability to determine if there is any equipment that is old or out of date that needs to be replaced for security reasons. Companies, including this aircraft manufacturer should have policies and procedures in. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [Show More]

Last updated: 2 years ago

Preview 1 out of 5 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$7.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

33
0

Document information


Connected school, study & course


About the document


Uploaded On

Oct 03, 2022

Number of pages

5

Written in

Seller


seller-icon
helperatsof1

Member since 4 years

48 Documents Sold

Reviews Received
1
0
0
0
2
Additional information

This document has been written for:

Uploaded

Oct 03, 2022

Downloads

 0

Views

 33

Document Keyword Tags

Recommended For You

Get more on CASE STUDY »

$7.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·