Project #54199 - Information security anyalis







During Week 1, you selected an organization (or your professor assigned an organization) that you will use for your authentic assessment projects. You must use the same organization throughout the course. Do not ask to change organizations. The purpose of project 1 is to research and evaluate the legislative drivers for information security programs within an organizational context and then write a well-researched critical analysis of legal and regulatory compliance of an organization’s information security program.


Learning Objectives

At the completion of this project, students should


1.     Be familiar with current legislative and regulatory (passed or proposed) requirements for information security programs

2.     Be able to interpret and apply legislative and regulatory requirements for information security programs within an organizational context.

3.     Be able to develop criteria for assessing legislative and regulatory compliance for an organization’s information security program.


Your research paper should be no more than three (3) full pages, double spaced, 1-inch margins, in New Times Roman 12-pitch font, with a cover page (name, course number, date, title of paper) and a reference page. The cover page and reference page are not included in the threee-page minimum. Papers not meeting the three full-page minimum will lose points. You must have at least three scholarly sources, correctly formatted per APA guidelines. Submit your research paper to the appropriate TurnItIn assignment area by the due date.


Detailed Description of Learning Activity

1.     Review the May 2011 Cyber Security Legislative Proposal, the proposed Cyber Security Act of 2012, Executive Order (EO) 13636 Improving Critical Infrastructure Cybersecurity, and Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience.

2.     Review the selected organization's information security program and program evaluation reports.

3.     Select three to five points of analysis from the resources listed in item 1 above. Your points of analysis must be specific items from the legislative proposals, the EO, or the PPD.

4.     Research the impacts of the points of analysis on the selected organization's information security program.

5.     Write your research paper. At a minimum, the paper should include

1.     an Introduction that includes the purpose of your paper, describes your selected organization, and introduces your points of analysis.

2.     a Points of Analysis section that describes your points and explains why you selected each point of analysis

3.     an Analysis/Research section associated with each point of analysis explaining how the selected point of analysis will impact your selected organization’s security program (be specific)

4.     a Conclusion that summarizes the purpose of your paper and describes the key take away from each point of analysis,

6.     Use spell and grammar check before submitting. It is also a good idea to have someone else read your paper. You should also review the grading rubric to ensure that you have all the graded components.

7.     Submit the project to the TurnItIn by the due date.



















Web Site

Strategic Plan

Information Security Program

Program Evaluation Reports

Department of Health and Human Services

Department of Veterans Affairs

Internal Revenue Service

National Aeronautics and Space Administration

State of Maryland

University of Nebraska Medical Center

Audit report not available. Use                                      

Vanderbilt University Medical Center

Audit report not available. Use



Subject Computer
Due By (Pacific Time) 01/24/2015 07:00 pm
Report DMCA

Chat Now!

out of 1971 reviews

Chat Now!

out of 766 reviews

Chat Now!

out of 1164 reviews

Chat Now!

out of 721 reviews

Chat Now!

out of 1600 reviews

Chat Now!

out of 770 reviews

Chat Now!

out of 766 reviews

Chat Now!

out of 680 reviews
All Rights Reserved. Copyright by - Copyright Policy