New England College of Business and Finance Computer Science Essay
In at least three pages of content, determine which widely accepted standards your company should use for auditing purposes. After a recent outside audit of IT systems, it was found that your company is not using an industry-accepted standard for best practices when it comes to database security. Your manager has requested that you look into which standard should be used (pick one) and describe the requirements and ways to audit against those on a continuous basis.
That is a minimum of three pages of content, double-spaced using APA format. NOT including the title and reference pages. A minimum of five total pages.
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered or other list format.
Each paragraph must have at least five sentences.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.
Consider this hypothetical situation:
David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.
What steps might have been taken to detect David’s alleged industrial espionage?
What steps might have been taken to prevent his perpetrating such an offense?
You are the web master of a college website. You share a server with other school departments such as accounting and HR.
Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.
Write your answer using a WORD document.
Need answers with no plagrism