ACCESS CONTROL MECHANISMS NEEDED FOR APPLICATIONS AND SYSTEMS

Throughout this course, you will be working with a scenario in which some basic background information is provided about a consulting firm. This scenario and information is typical in many companies today. You are tasked to select a company that you are familiar with that is facing a similar situation. The company can be real or fictitious, but the framework and problems that it faces should be similar. The assignments that you complete each week are based on the problems and potential solutions that similar companies may face. The end goal for these assignments is to analyze the problems that the company faces with respect to the upcoming audit and to provide guidance on how it can provide security for its infrastructure.
Scenario Week 4: 
The case study company is also concerned about the confidentiality and integrity of the data. What policies and controls are needed to meet the regulatory requirements imposed by the recent initial public offering (IPO)? In an effort to ensure the confidentiality of data both internally and externally, discuss how you can effectively protect the data in motion and at rest. Create the following section for Week 4:

Week 4: Security Policies, Procedures, and Regulatory Compliance

List and describe the regulatory requirement that was introduced by the IPO.
List and describe at least 5 policies that the company needs.
From the list of policies, list and describe at least 3 controls that the company needs to implement.
Describe the data at rest and data in motion and analyze how they can be protected

Section 4 should be 2–3 pages long.
Name the document “CS651_FirstnameLastname_IP4.doc.”

How to create Testimonial Carousel using Bootstrap5

Clients' Reviews about Our Services