Computer Science

Project: Addressing a New Business’s Compliance Responsibilities Part 1answers

Purpose This project provides an opportunity for you to apply principles related to auditing to ensure information systems are in compliance with pertinent la

Jun 02, 2025 6 views

Check out this sample solution our expert writers created for a client with a "write assignment" task.

Purpose This project provides an opportunity for you to apply principles related to auditing to ensure information systems are in compliance with pertinent laws and regulations, as well as industry requirements. Required Source Information and Tools  To complete the project, you will need the following:  Course textbook  Access to the Internet to perform research for the project  PCI Security Standards Council: https://www.pcisecuritystandards.org Important PCI Compliance Information for Merchants: https://www.bigcommerce.com/blog/pci-compliance/#weve-successfully-achieved-pci-compliance-whats-next  COSO Internal Control—Integrated Framework Executive Summary: https://www.coso.org/_files/ugd/3059fc_1df7d5dd38074006bce8fdf621a942cf.pdf COSO Internal Control—Integrated Framework PowerPoint COSO Internal Control—Integrated Framework (2013) whitepaper: https://assets.kpmg/content/dam/kpmg/pdf/2016/05/2750-New-COSO-2013-Framework-WHITEPAPER-V4.pdf Note: The 2013 version of the framework is also available for purchase, or you may be able to retrieve it through our library.  Learning Objectives and Outcomes  You will be able to: Explain the purpose of PCI DSS Analyze business factors that influence PCI DSS compliance Describe potential consequences of failing to demonstrate PCI DSS compliance Apply standards and frameworks to the development of information security internal control systems Analyze the use of information security controls within IT infrastructure domains Introduction  Public and private sector companies are expected to comply with many laws and regulations as well as industry requirements to promote information security. Assessments and audits of the information technology (IT) environment help to ensure a company is in compliance. A successful information security professional must be able to assess a business’s needs, evaluate various standards and frameworks, and develop a customized, integrated internal control system that addresses the company’s compliance responsibilities. Furthermore, the professional must be able to communicate with various people—both inside and outside the organization—to facilitate awareness of how control activities mitigate weaknesses or potential losses that could compromise the company’s information security.  Scenario  S&H Aquariums is a new online retailer that is about to begin selling aquariums and other items for aquarium hobbyists. In recent months, many companies have been featured in the news because of information security breaches that have exposed customers’ credit card data. S&H Aquariums’ management team is worried about the negative impact a potential breach could have on the company’s reputation and business standing.  S&H Aquariums has hired you, an information systems security expert, to ensure that the company is prepared to accept credit card payments for purchases made through the company’s Web site. To kick off the planning phase, the board of directors would like you to write a report explaining what the company will need to do to minimize risks to sensitive data and comply with applicable laws and regulations, as well as industry standards. In preparation, you sit down with the company’s president and discuss the following details:  Per the company’s strategic plan, the company expects to have between 20,000 and 1,000,000 credit card transactions during the first year of operations. However, the board would like to know what differences to anticipate as the volume of credit card transactions grows in the coming years. The company will initially accept payments made with MasterCard and Visa only, but it may decide to accept other credit cards in the future. The board of directors is discussing the possibility of opening a bricks-and-mortar store in the future, and the board would like to consider any compliance-related issues prior to making that decision. The board consists of professionals from a variety of fields. It is unlikely that any of the board members are familiar with complex information security concepts or with PCI DSS, the set of requirements that prescribes operational and technical controls to protect cardholder data.  Tasks Review the information related to PCI DSS compliance provided in the course textbook and in the Internet resources listed for this project. Consider how this information relates to the description of S&H Aquariums provided in the scenario above.  Write a report for S&H Aquariums’ board of directors. Include the following:  Introduction  PCI DSS Overview  Include a discussion of the six principles, twelve primary requirements, and the sub-requirements of PCI DSS. Rationale Explain why the company needs to address the PCI DSS requirements and describe potential consequences if the company is not able to demonstrate compliance. Immediate Considerations for PCI DSS Compliance Analyze factors (including those introduced in the scenario above) that will influence S&H Aquariums’ immediate plans for PCI DSS compliance. Discuss payment brands (credit card companies), transaction volumes, merchant levels (i.e., 1 through 4), and types of reporting required in relation to S&H Aquariums’ business projections. Future Considerations for PCI DSS Compliance Analyze contingencies that may influence PCI DSS compliance in the future. Address potential questions from the board, including but not limited to: What would be expected of the company if credit card volume increases past 1,000,000 transactions in future years? What should S&H Aquariums do to demonstrate PCI DSS compliance if it begins to accept American Express or Discover? How would opening a bricks-and-mortar store affect the company’s responsibilities for PCI DSS compliance? Conclusion As a reminder, you may use the textbook for this course and the Internet to conduct research. You are encouraged to respond creatively, but you must cite credible sources to support your work. Submission Requirements  Format: Microsoft Word Font: Arial, 12-point, double-space  Citation Style: APA  Length: 2–3 pages  Self-Assessment Checklist I have created a report that uses a professional tone and includes correct terminology. In my report, I have described PCI DSS, provided a sound rationale for addressing PCI DSS compliance, and analyzed immediate and future considerations for PCI DSS compliance.  I have conducted adequate independent research for this part of the project.

Need a similar assignment?

Our expert writers can help you with your specific requirements. Get started today.

Order Your Custom Solution

Get a Price Estimate

Price Estimate

Deadline.

Number of Pages.

Price: $12

Order Now

Why Students Choose Us

  • 150+ subject experts with advanced degrees
  • 100% original work with plagiarism reports
  • Secure confidentiality and data protection
  • 24/7 customer support and progress updates
  • Unlimited revisions until you're satisfied