Information Systems

case 3 - 17: i need help | Information Systems

i need help case3-ITM17.docx Module 3 - Case Security Laws and Standards Assignment Overview Employees must be trained and kept aware of topics related to

Jun 02, 2025 0 views

Check out this sample solution our expert writers created for a client with a "write assignment" task.

i need help case3-ITM17.docx Module 3 - Case Security Laws and Standards Assignment Overview Employees must be trained and kept aware of topics related to information security, not the least of which is the expected behaviors of an ethical employee. This is especially important in information security, as many employees may not have the formal technical training to understand that their behavior is unethical or even illegal. It is the responsibility of information security personnel to do everything in their power to deter illegal, immoral, or unethical behavior and to use policy, education and training, and technology to protect information and systems.  Three general causes of unethical and illegal behavior are ignorance, accident, and intent.   Deterrence is the best method for preventing illegal or unethical activity. Laws, policies, and technical controls are all examples of deterrents. Laws and policies and their associated penalties only deter if three conditions are present: fear of penalty , probability of being apprehended , and the  probability of penalty being applied . Many professional organizations have established codes of conduct or codes of ethics that members are expected to follow. Module 3 Video Case Assignment Discuss and prepare tables to compare the following certifications: Certified Information Systems Security Professional (CISSP), HealthCare Information Security and Privacy Practitioner (HCISPP), Certified Cyber Security Forensics Analyst (CSFA), Certified Secure Software Lifecycle Professional (CSSLP) certification. Use the Internet to identify the ethical rules that holders of each certification have agreed to follow. Also determine the knowledge requirements for each of these certifications. Assignment Expectations You will be assessed on your comparison of the certifications in terms of their knowledge requirements, ethical rules, and effectiveness for the individual in terms of future employment. You are required to make effective and appropriate use of in-text citations to the assigned readings and other source material to support your arguments. Please use the  Trident APA 7 Guide  at https://careered.libguides.com/tui/library/apa for proper formatting and style. Module 3 - Resources Security Laws and Standards Required Reading  (2022) Cybersecurity 101: Auditing & Incident Response. Course. 1st half of course.  Finding Skillsoft Books (2022). Cybersecurity Awareness: Exposure to Security Risks. 1st half of course.  Finding Skillsoft Books De Freminville, Marie (2020). Cybersecurity and Decision Makers: Data Security and Digital Trust, Wiley Chapter 2 and 3.  Finding Skillsoft Books Moschovitis, C. (2021). Privacy, Regulations, and Cybersecurity: The Essential Business Guide. Wiley-VCH. Chapters 1 – 3.  Finding Skillsoft Books Schreider, T. and Noakes-Fry, K. (2020). Cybersecurity Law, Standards and Regulations, 2nd Edition. Rothstein Publishing. Chapters 1 – 3.  Finding Skillsoft Books Optional Reading Harris, S., & Maymi, F. (2018). CISSP all-in-one exam guide, seventh edition, 8th edition (7th ed.) McGraw-Hill, Chapter 1.  Finding Skillsoft Books Gregory, P. H. (07/24/2019). CISM® : Certified information security manager practice exams McGraw-Hill. Chapter 2 Read Chapters 10 to 12 Andress, Jason and Winterfeld, Steve (2014). Cyber warefare: Techniques, tactics and tools for security practitioners. Syngress, Waltham, Ma. (ISBN: 9780124166721). Available in the Trident Online Library.  Read Chapters 8, 9, 10 Chappel, M. Ballad, B., Balad, T. and Bnks, E.K. (2014). Access control, authentication, and public key infrastructure. Jones and Barlett Learning, 2nd Edition Read chapters 19 – 23 Dordal, Peter L. (2017).   An introduction to computer networks . Book under Creative Commons  Chapters 4 and 5 Gordon, A. (2015). Official (ISC)2 guide to the CISSP CBK, Fourth Edition, CRC Press. Read Chapter 3 Risk management for enterprises and individuals  (2017)  Book under Creative Commons

Need a similar assignment?

Our expert writers can help you with your specific requirements. Get started today.

Order Your Custom Solution

Get a Price Estimate

Price Estimate

Deadline.

Number of Pages.

Price: $12

Order Now

Why Students Choose Us

  • 150+ subject experts with advanced degrees
  • 100% original work with plagiarism reports
  • Secure confidentiality and data protection
  • 24/7 customer support and progress updates
  • Unlimited revisions until you're satisfied