Emerging Threats & Countermeasures
Question – 1 (250 words) : An organization will be testing a beta upgrade version of its employee’s fingerprint matching system. Because it’s difficult to mimic human fingerprints the company used real biometric images, data, and templates to test the beta upgrade. The previous and current versions both contain meta data, and demographic data with each fingerprint that includes the owner’s name, age, sex, race, and date of birth. After a successful upgrade consider the following:
- What data types stored by the system should be considered as PII
- Review the NIST Special Publication 800-122 to determine the impact level. What factors did you include to determine the impact level?
- What privacy safeguards should be considered to protect the PII in the upgrade test.
- Is a Privacy Impact Assessment (PIA) required to complete the upgrade?
- What should be done with the test data after the upgrade?
Question – 2 (3pages): Personally identifiable information (PII) is any information that can identify an individual.
Review the NIST Special Publication 800-122 “Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). In an APA formatted document answer the following: (link – https://s3.us-east-1.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/6166301?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27nistspecialpublication800-122-2.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200208T004104Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21599&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20200208%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=a3b4e673a0a42d2320b459e85ae891fcf87d7f3e4f281e683bd13dd0e841a261)
- What is considered PII information?
- How to protect PII information?
- What are the categories of PII and how to determine what types are considered for the categories?
- What should occur if a breach happens?
- Did this article mention others to reference for more information? If so identify the source.
- How should an organization address data fields?
- Explain Intranet Activity Tracking
- What security controls and safeguard’s should be implemented (recommendations)
Do not simply copy the content from the article that can be considered as plagiarism, in your own words explain and answer the above question in a research paper format.
- APA Formatted Document
- Minimum 3 pages
We've got everything to become your favourite writing service
Money back guarantee
Your money is safe. Even if we fail to satisfy your expectations, you can always request a refund and get your money back.
Confidentiality
We don’t share your private information with anyone. What happens on our website stays on our website.
Our service is legit
We provide you with a sample paper on the topic you need, and this kind of academic assistance is perfectly legitimate.
Get a plagiarism-free paper
We check every paper with our plagiarism-detection software, so you get a unique paper written for your particular purposes.
We can help with urgent tasks
Need a paper tomorrow? We can write it even while you’re sleeping. Place an order now and get your paper in 8 hours.
Pay a fair price
Our prices depend on urgency. If you want a cheap essay, place your order in advance. Our prices start from $11 per page.