Course Textbook
Kim, D., & Solomon, M. G. (2014). Fundamentals of information systems security
(2nd ed.).Burlington, MA: Jones & Bartlett Learning.
Unit III Essay
Describe the different identification methods that organizations can use to identify their employees and to grant access to the organizational infrastructure. Your paper should contain a minimum of 300words. Format your paper using APA style. Use your own words, and include citations and references as needed to avoid plagiarism.
Information about accessing the Blackboard Grading Rubric for this assignment is provided below.
Unit V Essay
Explain what the open systems interconnection (OSI) model is and its different layers. Also, differentiate between a wide area network (WAN) and a local area network (LAN) architecture. Yourpaper should contain a minimum of 300 words. Format your paper using APA style. Use your own words, and include citations and references as needed to avoid plagiarism.
Information about accessing the Blackboard Grading Rubric for this assignment is provided below.
Unit VII Research Paper
You have read about the different security standards and compliance laws in this unit. Carefully select at least one of the security standards and one of the compliance laws. Make sure when you select a standard that you can apply that to the compliance law you have chosen.
Standards
|
Compliance Laws
|
W3C
|
HIPAA
|
IEEE
|
GLBA
|
ITU-T
|
SOX
|
ANSI
|
FERPA
|
ISO 17799
|
CIPA
|
ISO/IEC 27002
|
FISMA
|
PCIDSS
|
|
You will conduct online research using the. You must have a minimum total of six references. least three. Your research paper must have an abstract, a title page, and a reference page.
You must incorporate at least one table and one picture or graphic. Be sure you use proper APA style for tables and pictures/graphics.
Your research paper should be five pages in length and formatted using APA style. Use your own words, and include citations and references as needed to avoid plagiarism