Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Designing FERPA Technical Safeguards

Assignment 1: Designing FERPA Technical Safeguards

Imagine you are an Information Security consultant for a small college registrarâs office consisting of the registrar and two assistant registrars, two student workers, and one receptionist. The office is physically located near several other office spaces. The assistant registrars utilize mobile devices over a wireless network to access student records, with the electronic student records being stored on a server located in the building. Additionally, each registrarâs office has a desktop computer that utilizes a wired network to access the server and electronic student records. The receptionist station has a desktop computer that is used to schedule appointments, but cannot access student records. In 1974, Congress enacted the Family Educational Rights and Privacy Act (FERPA) to help protect the integrity of student records. The college has hired you to ensure technical safeguards are appropriately designed to preserve the integrity of the student records maintained in the registrarâs office.

Write a three to five page paper in which you:

  1. Analyze proper physical access control safeguards and provide sound recommendations to be employed in the registrarâs office.
  2. Recommend the proper audit controls to be employed in the registrarâs office.
  3. Suggest three logical access control methods to restrict unauthorized entities from accessing sensitive information, and explain why you suggested each method.
  4. Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards.
  5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the studentâs name, the professorâs name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe the role of information systems security (ISS) compliance and its relationship to U.S. compliance laws.
  • Use technology and information resources to research issues in security strategy and policy formation.
  • Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Note:The assignment will be check for plagiarism.

The grading rubric for this assignment attached below.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

Points: 50

Assignment 1: Designing FERPA Technical Safeguards

Criteria

Unacceptable

Below 60% F

Meets Minimum Expectations

60-69% D

Fair

70-79% C

Proficient

80-89% B

Exemplary

90-100% A

1. Analyze proper physical access control safeguards and provide sound recommendations to be employed in the registrar's office.

Weight: 21%

Did not submit or incompletely analyzed proper physical access control safeguards and did not submit or incompletely provided sound recommendations to be employed in the registrar's office.

Insufficiently analyzed proper physical access control safeguards and insufficientlyprovided sound recommendations to be employed in the registrar's office.

Partially analyzed proper physical access control safeguards and partiallyprovided sound recommendations to be employed in the registrar's office.

Satisfactorily analyzed proper physical access control safeguards and satisfactorilyprovided sound recommendations to be employed in the registrar's office.

Thoroughly analyzed proper physical access control safeguards and thoroughlyprovided sound recommendations to be employed in the registrar's office.

2. Recommend the proper audit controls to be employed in the registrar's office. Weight: 21%

Did not submit or incompletely recommended the proper audit controls to be employed in the registrar's office.

Insufficiently recommended the proper audit controls to be employed in the registrar's office

Partially recommended the proper audit controls to be employed in the registrar's office.

Satisfactorily recommended the proper audit controls to be employed in the registrar's office.

Thoroughly recommended the proper audit controls to be employed in the registrar's office.

3. Suggest three logical access control methods to restrict unauthorized entities from accessing sensitive information, and explain why you suggested each method.

Weight: 21%

Did not submit or incompletely suggested three logical access control methods to restrict unauthorized entities from accessing sensitive information, and did not submit or incompletely explained why you suggested each method.

Insufficiently suggested three logical access control methods to restrict unauthorized entities from accessing sensitive information, and insufficiently explained why you suggested each method.

Partially suggested three logical access control methods to restrict unauthorized entities from accessing sensitive information, and partially explained why you suggested each method.

Satisfactorily suggested three logical access control methods to restrict unauthorized entities from accessing sensitive information, and satisfactorily explained why you suggested each method.

Thoroughly suggested three logical access control methods to restrict unauthorized entities from accessing sensitive information, and thoroughly explained why you suggested each method.

4. Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards.

Weight: 21%

Did not submit or incompletely analyzed the means in which data moves within the organization and did not submit or incompletely identified techniques that may be used to provide transmission security safeguards.

Insufficiently analyzed the means in which data moves within the organization and insufficiently identified techniques that may be used to provide transmission security safeguards.

Partially analyzed the means in which data moves within the organization and partially identified techniques that may be used to provide transmission security safeguards.

Satisfactorily analyzed the means in which data moves within the organization and satisfactorily identified techniques that may be used to provide transmission security safeguards.

Thoroughly analyzed the means in which data moves within the organization and thoroughly identified techniques that may be used to provide transmission security safeguards.

5. Three references

Weight: 6%

No references provided

Does not meet the required number of references; all references poor quality choices.

Does not meet the required number of references; some references poor quality choices.

Meets number of required references; all references high quality choices.

Exceeds number of required references; all references high quality choices.

6. Clarity, writing mechanics, and formatting requirements

Weight: 10%

More than eight errors present

Seven to eight errors present

Five to six errors present

Three to four errors present

Zero to two errors present

Ã

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question