Unit 1 Assignment 2: Impact of U.S. Federal and State Compliance Laws

Satisfactory Essays
Unit 1 Assignment 2: Impact of U.S. Federal and State Compliance Laws

Learning Objectives and Outcomes
 Evaluate how U.S. compliance laws influence the given business problem.

Assignment Requirements
Read the business scenario given in the text sheet named “IS3230: Unit 1 ABS Financial Solutions.” Analyze the given business scenario in order to evaluate how the U.S. Federal and State Compliance laws affect the given problem and shape its solution accordingly. Then write a summary report that answers the following questions:
 How do the U.S. Federal and State Compliance laws affect the given problem and influence the solution taken by the company?
 How is the solution to the problem an outcome of the compliance laws?
 How do cost-benefit issues and considerations affect decisions regarding solutions?
 What role will customers’ acceptance and attitude play in developing the new business solution?
 What is the contribution of an individual customer’s attitude in developing the business solution?

Required Resources
 Text sheet: IS3230: Unit 1 ABS Financial Solutions

Submission Requirements
 Format: Microsoft Word
 Font: Arial, Size 12, Double-Space
 Citation Style: Chicago Manual of Style
 Length: 1–2 pages
 Due By: Unit 2

Self-Assessment Checklist
Use the following checklist to support your work on the assignment:
 I have evaluated the depth of the influence of the government.
 I have provided examples of primary influences present in the given case scenario.
 I have described the cost-benefit issues and considerations that affect decisions regarding solutions.
 I have described the customer’s acceptance and attitude towards the new system.
 I have followed the submission requirements.

Unit 2 Assignment 1: Infrastructure C

You May Also Find These Documents Helpful

  • Good Essays

    Access Control

    • 661 Words
    • 3 Pages

    Simply defined, the term "access control" describes any technique used to control passage into or out of any area. The standard lock that uses a brass key may be thought of as a simple form of an "access control system". Over the years, access control systems have become more and more sophisticated. Today, the term "access control system" most often refers to a computer-based, electronic card access control system. The electronic card access control system uses a special "access card", rather than a…

    • 661 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Access Control

    • 2183 Words
    • 9 Pages

    | Access Control | Course Project – SEC330 | | Kristen E. Mosuch | 2/10/2013 | Table of Contents: Introduction………………………………………………………………………………………………………………………………Page 2 Risks and Threats Overview………………………………………………………………………………………………………Page 2 Risks Associated with Access Control………………………………………………………………………………………..Page 3 Methods of Access Control……………………………………………………………………………………………………….Page 4 Government Regulations…………………………………………………………………………………………………………..Page 7 Conclusion…………………………………………………………………………………………………………………………………Page…

    • 2183 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Access Control

    • 648 Words
    • 3 Pages

    OATH (Open Authentication) Alvin Claxton Grantham University Abstract The need for stronger authentication methods on line has never been in more demand than at present. There are many services that provide security and authentication while on line or to verify who is the end user. With the rise of identity theft among other cyber crimes, the need for stronger authentication is greatly needed. This written assignment will define, describe and explain OATH (Open Authorization) as a preferred…

    • 648 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Access Control Policy

    • 703 Words
    • 3 Pages

    Material Appendix F Access Control Policy Student Name: University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Date: December 9, 2012 Access Control Policy Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems 1 Authentication Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include…

    • 703 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Access Control Models

    • 2490 Words
    • 10 Pages

    policy (AUP) and the employee manual, and discuss status during performance reviews. 2. Disgruntled employee sabotage…(I) Track and monitor a Premium372 Words2 Pages Unit 3 Discussion 1: Access Control Models NT2580 Unit 3 Discussion 1: Access Control Models 10/01/2013 Scenario 1: (DAC) Discretionary Access Control. Being that the business is small and…

    • 2490 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Access Control Simulation

    • 698 Words
    • 3 Pages

    Ground Level Upon entry the door was locked and a key card was required for this single point of entry. There were security cameras outside of the building. There was a dumpster outside that was not secured, which could allow anyone access to sensitive information. Locking the dumpster or placing it in a secured location would mitigate this risk. The receptionist did not ask me to verify my identity. The receptionist should be required to verify the identity of everyone entering building to…

    • 698 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Access Control List

    • 330 Words
    • 2 Pages

    Access Control List Your Name University Professor Date Access Control List An ACL is a configuration script of a router that manages whether a router denies or permits packets to pass founded on criteria placed in the packet header. It is also employed in selecting forms of traffic to be processed, forwarded, or analyzed in other ways. As every packet passes through an interface with a related ACL, the ACL is analyzed, one line at a time from top to bottom, searching for a pattern corresponding…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It244 Access Control

    • 648 Words
    • 3 Pages

    1. Access Control Policy Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems 1.1. Authentication Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on. Authentication credentials are used to control access to sensitive…

    • 648 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Access Control Modules

    • 489 Words
    • 2 Pages

    (DAC) Discretion Access Control would be the simplest way to maintain and monitor a small business. 2. With employees in Top Ads mainly communicating through smart phones, there could be a security risk. Mandatory Access Control (MAC) is a bit more sophisticated than DAC, but just easily monitored for a business of this size. 3. NetSecIT is a big company, and many employees will need roles, since they travel and work from home and would benefit using Role Based Access Control (RBAC). The security…

    • 489 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Associate Level Material Appendix F Access Control Policy Student Name: Casey DeCesare University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Scott Sabo Date: 5/27/2014 1. Access Control Policy Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems 1.1. Authentication Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include…

    • 833 Words
    • 3 Pages
    Powerful Essays