This document provides instructions for a case study assignment on data breaches and regulatory requirements. Students are asked to analyze a data breach that occurred within a government system, examining the causes and how compliance with regulations could have prevented it. They also must assess if existing regulations need changes to reduce future breaches. The paper should be 3-5 pages following APA or school formatting guidelines. The assignment addresses learning outcomes on legal compliance laws, governance of information, researching legal issues, and writing about information security topics.
1. Straver CIS 438 Week 6 Case Study 2 Data
Breaches and Regulatory Requirements
NEW
To purchase this material click below link
http://www.assignmentcloud.com/cis-438-
strayer/cis-438-week-6-case-studv-2-data-
breaches-and-regulatorv-requirements-new
For more classes visit
www.assignmentcloud.com
www.assignmentcloud.com/
CIS 438 Week 6 Case Study 2 Data
Breaches and Regulatory Requirements
Case Study 2: Data Breaches and
Regulatory Requirements
Due Week 6 and worth 120 points
2. The National Institute of Standards and
Technology (NIST) provides an extensive
amount of information, resources, and
guidance on IT and information security
topics. The Federal Information Security
Management Act (FISMA) provides
standards and guidelines for establishing
information security within federal
systems. However, there have been, and
WVcontinues to be, numerous security
incidents including data breaches within
federal systems. Review the information
about FISMA at the NIST Website, located
at
http://csrc.nist.gov/groups/SMA/fisma/i
n dex.html. Additionally, review the
information, located at
http://www.govtech.com/blogs/lohrmann
-on-cybersecurity/Dark-Clouds-Over-
3. Technology-042212.html, about the data
breaches within government systems.
Select one (1) of the data breaches
mentioned to conduct a case analysis, or
select another based on your research,
and research more details about that
incident to complete the following
assignment requirements.
Write a three to five (3-5) page paper on
your selected case in which you:
the primary causes of the data breach.
2.Analyze how the data breach could
have been prevented with better
adherence to and compliance with
regulatory requirements and guidelines,
including management controls; include
an explanation of the regulatory
requirement (such as from FISMA,
HIPAA, or others).
4. 3.Assess if there are deficiencies in the
regulatory requirements and whether
they need to be changed, and how they
need to be changed, to mitigate further
data breach incidents.
4.Use at least three (3) quality
resources in this assignment. Note:
Wikipedia and similar Websites do not
qualify as quality
resources.
Your assignment must fo
WWW*
•Be typed, double spaced, using Times
New Roman font (size 12), with one-inch
margins on all sides; references must
follow APA or school-specific format.
Check with your professor for any
additional instructions.
•Include a cover page containing the title
of the assignment, the student's name, the
professor's name, the course title, and the
5. date. The cover page and the reference
page are not included in the required page
length.
The specific course learning outcomes
associated with this assignment are:
•Describe legal compliance laws
addressing public and private institutions.
•Examine the principles requiring
governance of information within
www.assorganizations
-
•Use technology and information
resources to research legal issues in
information security.
•Write clearly and concisely about
information security legal issues and
topics using proper writing mechanics and
technical style conventions.
6. date. The cover page and the reference
page are not included in the required page
length.
The specific course learning outcomes
associated with this assignment are:
•Describe legal compliance laws
addressing public and private institutions.
•Examine the principles requiring
governance of information within
www.assorganizations
-
•Use technology and information
resources to research legal issues in
information security.
•Write clearly and concisely about
information security legal issues and
topics using proper writing mechanics and
technical style conventions.