Textbook: Fundamentals of Information Systems Security Chapter 4, “Organization

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

Textbook: Fundamentals of Information Systems Security
Chapter 4, “Organization

Textbook: Fundamentals of Information Systems Security
Chapter 4, “Organization and Adhering to Compliance Laws” section
Chapter 8, “A Brief History of Malicious Code Threats” and “Threats to Business Organizations” sections
Chapter 9, “Compliance and Professional Ethics” section
Chapter 15, “Compliance is the Law” section
As you read, consider the following questions: 
Chapter 4, “Organization and Adhering to Compliance Laws” section: 
How
do you mitigate risk and achieve compliance with laws, regulations, and
requirements? What are the primary means to ensure compliance?
Chapter 8, “A Brief History of Malicious Code Threats” and “Threats to Business Organizations” sections:
Why are malicious actions on the rise? What are you trying to protect?
Chapter 9, “Compliance and Professional Ethics” section: 
How does an organization monitor for compliance? How does compliance relate to ethics?
Chapter 15, “Compliance is the Law” section:
What are the primary means to ensure compliance? How is compliance related to information security?
CIA Triad and Fundamental Security Design Principles PDF opens in new window
This
document contains essential terms and their definitions that we will be
revisiting throughout this course and the rest of your program.
As you learn about data protection and legislation, it is important to reflect on what you have read and learned in this module.
In your journal, you will reflect on general data protection.
Specifically, you will discuss legislation, threat actors, and data
protection compliance.
Your journal entry should be three or more sentences per prompt and address the following questions: 
What are some important pieces of legislation that affect how organizations conduct information technology operations?
Why are malicious actions from threat actors on the rise?
What are the primary means to ensure compliance?
How does compliance relate to ethics?
Journal Guidelines and Rubric
Overview
Journals are private and between you and the instructor only.
Approach these activities as an opportunity to reflect upon and apply
what you learn each week based on the assigned readings, discussions,
and activities. As a successful professional, you will need good
reflective and writing skills. Journal activities offer you the
opportunity to develop these skills further. The journal entries in this
course are graded separately.
Prompt
First, complete the assigned readings for the week. Then read the
journal prompt and write a reflection. Your journal entry should be two
paragraphs long and address the prompt provided in each module.
In your response, be certain to address the following critical elements:
Critical Thinking and Reflection: Support the claims with relevant examples of previous and logical thought processes.
Integration and Application: Show excellent depth of knowledge of the module content and exhibit careful consideration of the topic.
Voice: Write in a style that is appealing and
appropriate for the intended audience and use a consistent voice that is
evident throughout.
What to Submit
Submit journal assignments as Word documents with double spacing,
12-point Times New Roman font, and one-inch margins. Responses should be
at least two paragraphs long and address the points indicated in the
journal prompt for each module.
Journal Rubric
Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
Critical Thinking and Reflection Supports claims with relevant examples of previous and logical thought processes Supports claims with mostly relevant examples of previous and logical thought processes Supports claims with somewhat relevant examples of previous and logical thought processes Does not support claims with reflection on relevant personal examples 25
Integration and Application Shows excellent depth of knowledge of the module content and exhibits careful consideration of the topic Shows good depth of knowledge of the module content and demonstrates that the module content has been read Shows limited depth of knowledge, indicating the module content may have been reviewed but needs to be explored further Does not address the prompt and reflects that the module content has not been read 25
Voice  Writes in a style that is appealing and
appropriate for the intended audience and uses a consistent voice that
is evident throughout Writes in a style that is generally appropriate for the intended audience and makes an attempt to use a consistent voice Writes in a style that considers the audience but is not consistent in voice, and it is difficult to identify the voice Does not attempt to use a style that considers the audience and leaves no evidence of the voice 25
Writing  Is free of errors in organization and grammar Is mostly free of errors in organization and grammar; errors are marginal and rarely interrupt the flow Contains errors in organization and grammar, but errors are limited enough so that it can be understood Contains errors in organization and grammar, making it difficult to understand 25
Total: 100%

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now