The following directions are below: In this task, you will analyze an independent assessment and respond to it in a detailed written report.
The following directions are below:
In this task, you will analyze an independent assessment and respond to it in a detailed written report. You will need to read the attached “Company Overview” and “Independent Security Report” that correspond with the following scenario.
A. Describe both the physical vulnerabilities and physical threats that put the security posture of Psinuvia Inc. at risk. Provide details from the attached “Independent Security Report,” including how each vulnerability or threat is negatively impacting the security posture of the company.
B. Describe both the logical vulnerabilities and logical threats that put the security posture of Psinuvia Inc. at risk. Provide details from the attached “Independent Security Report,” including how each vulnerability or threat is negatively impacting the security posture of the company.
C. Summarize industry standards for securing organizational assets regarding policies for acceptable use, mobile devices, passwords, and personally identifiable information (PII), using industry-respected sources to support your claims.
D. List the IT department duties that belong in the Compliance and Risk Department and the Security Department, as described in part six of the attached “Independent Security Report,” by organizing them into a chart or table.
E. Develop a PCI DSS-compliant policy to address the concerns in the “Independent Security Report,” including the roles and responsibilities of each component of the policy.
F. Propose methods for bringing Psinuvia Inc. into compliance with General Data Protection Regulation (GDPR) requirements, including specific examples for how each method will address international regulations.
G. Identify the HIPAA provisions Psinuvia Inc. needs to address, including the associated consequences for continued noncompliance.
H. Develop a business continuity plan to address the natural disaster described in part four of the “Independent Security Report.” CISSP best practice should inform execution and maintenance of mission critical tasks in the business continuity plan for Psinuvia Inc.
I. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
J. Demonstrate professional communication in the content and presentation of your submission.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
