This website uses cookies to ensure you have the best experience. Learn more

Unit 10 Assignment 1: Examine Real World Implementations Of Security Standards And Compliance Laws

525 words - 3 pages

UNIT 10 ASSIGNMENT 1: EXAMINE REAL-WORLD IMPLEMENATATIONS OF SECURITY STANDARDS AND COMPLIANCE LAWS

CIPA stands for The Children's Internet Protection Act. It is a bill that was signed into law in December 2000, and was to be constitutional by the United States Supreme Court in June 2003. It requires schools K-12 and libraries to have internet filters to protect children from harmful online content that blocks access to “visual depictions” on the Internet that are obscene, child pornography or harmful to minors. Meaning any picture, image, graphic image file, or other visual depiction that has been taken as a whole and with respect to minors, appeals to an excessive interest in nudity, sex, or excretion; depicts, describes, or represents, in a patently offensive way with respect to what is ...view middle of the document...


The act has several requirements for institutions to meet before they can receive government funds. Libraries and schools must provide reasonable public notice and hold at least one public hearing or meeting to address the proposed Internet safety policy. The meeting must address the purpose for this policy such as, actions to restrict a minor’s access to inappropriate or harmful materials on the Internet. Make sure security and safety measures of minors using chat rooms email, instant messaging, or any other types of online communications are in place. Also, addressing the unauthorized disclosure of a minor’s personal information and unauthorized access like hacking by minors.
However, CIPA does not require the internet to be tracked and all Internet access, even by adults, must be filtered, though filtering requirements can be less restrictive for adults. There was also an attempt to expand CIPA to include social networking, like Face book and other similar sites, was considered by the U.S.Congress in 2006 called Deleting Online Predators Act(DOPA). More attempts have been made recently by the International Society for Technology in Education (ISTE) and the Consortium for School Networking (CoSN) urging Congress to update CIPA terms for regulating, not totally abolishing, students' access to social networking and chat rooms.

ISTE or CoSN wish to ban these online communications entirely .They believe the "Internet contains valuable content, collaboration and communication opportunities that can and do materially contribute to a student's academic growth and preparation for the workforce".

Children's Internet Protection Act - Wikipedia, the free encyclopedia. (n.d.). Retrieved May 20, 2014, from http://en.wikipedia.org/wiki/Children%27s_Internet_Protection_Act

Other Papers Like Unit 10 Assignment 1: Examine Real-World Implementations of Security Standards and Compliance Laws

Unit 4 Assignment 1

271 words - 2 pages IS3340-WINDOWS SECURITY | Auditing Tools for Windows System | Unit 4 Assignment 1 | | | 5/1/2014 | | 1. You want to schedule a weekly analysis for the Windows servers in your data center. The command should run as a scheduled job and report any available patches for the Windows Server 2008 R2 operating system, Internet information services (IIS) Web server, or structured query language (SQL) server that have not been

Alternative Assignment Unit 1

549 words - 3 pages professors from all over the world, with different backgrounds and different ways of thinking. • Online learning is similar to learning on campus with the challenges; the difference is it requires proper time management, self-discipline and motivation. • Prof. St. John is available for support through email and AIM, to provide feedback through assignments and personal dilemmas. How to succeed in this class: 1. Syllabus: The course syllabus

Unit 4 Assignment 1

1067 words - 5 pages 1 Running head: UNIT 4 ASSIGNMENT 1 Fundamentals of Finance BUS 3062 Rodtrice Johnson 3/7/16 Unit 4 Assignment 1 Dennis Hart 1. Q: Proficient-level: "How do Cornett, Adair, and Nofsinger define risk in the M: Finance textbook and how is it measured?" (Cornett, Adair, & Nofsinger, 2016). Distinguished-level: Describe the risk relationship between stocks, bonds, and T-bills, using the standard deviation of

It520 Unit 1 Assignment

560 words - 3 pages Question 1 Define each of the following terms. In addition, provide an example of each term. a. Entity Set - A collection of like entities.  Example: If a customer is an entity, then the entity set would be a collection of two or more customers. b. Entity Instance - Each row in the relational table.  Example: A row of information beginning with the entity itself and showing the relations of that specific entity and none other. c

Unit 1 Assignment

598 words - 3 pages Exercise 2-7 1. Economic entity assumption (45) - (f) indicates that personal and business record keeping should be separately maintained. 2. Going-concern assumption (46) - (d) Rationale why plant assets are not reported at liquidation value. (Do not use historical cost principle.) 3. Monetary unit assumption (46) - (j) assumes that the dollar is the “measuring stick” used to report on financial performance. 4. Periodicity

It530 Assignment Unit 1

1422 words - 6 pages IPv4 when a packet size is larger than the maximum transmission unit, it will be fragmented by the host before it can be sent over the network. There are couple of control fields in the IPv4 header to help when fragmentation is needed. The Flags which will point out if there are more fragments, and Fragment offset which identify the position of the fragment in the datagram. In IPv6 only the sender is allowed to fragment a packet, therefore, the

Unit 2 Assignment 1

559 words - 3 pages Lab Assessment Questions & Answers 1. Relate how Windows Server 2012 Active Directory and the configuration of access controls achieve C-I-A for departmental LANs, departmental folders, and data. Windows Server 2012 Active Directory achieves C-I-A for departmental LANs, departmental folders and data through the two-way authentication and Global Policy Management for secure networking within domains. 2. Is it a good practice

Unit 1 Assignment 2

372 words - 2 pages something they previously did not). With the use of the levels of GPO’s described above, the lower level (user account) takes precedence over the higher level. If you want a specific manger or individual user to have privileges to something that the others in that GPO (Local, Site, or Domain) don’t, you have authorize that individual the privilege. It makes the management of privileges and security much easier to track, and not have to worry

Unit 1 Assignment

927 words - 4 pages of constant success. When the Silver Crash took place, and the price of silver diminished over a few years, it put businesses as well as workers in a tough situation. Many of them were left jobless and frustrated. Strikes began to take place and the government started to take action, forcing many people to flee the area. Though the miners faced such a depressing hardship, political influence began to set stage, neutralizing labor laws and

Unit 1 Assignment

1439 words - 6 pages , including things like election results along with names and biographical information of candidates. He studied elections for governor that took place between 1998 and 2008. Brown located a few errors, but the majority of the information was correct. The candidates’ prior experience was accurate, and Brown found that the vote counts were accurate except for four races, where the counts were more than 1% inaccurate (Maffly, 2011). A peer review

Gs1140T Unit 1 Assignment 1

602 words - 3 pages Introduction Full immersion virtual reality is much closer than some think about. This type of technology could open up more opportunities than we once thought. Think about a world where all of your office buildings, entire corporation’s where people telecommute using virtual reality. Getting rid of the overhead of having office buildings and trimming down the number of people that would have to commute every day to the corporate office. Full

Related Essays

Top 10 Laws Of Security Essay

1706 words - 7 pages understand the environment deeply before reflecting such laws, in order to meet security goals aimed by the owners. 1 Introduction It is proven that analysis of a system the key factor for successful management. These systems are collection of functional and non-functional components that work inherently to meet the strategic objectives of the enterprise. For that, it is important to control relations and processes among such components

Unit 1 Assignment 1

415 words - 2 pages 1. Ken 7 will create the users in the shop floor group folder in active directory users and computers. This way you know everything that relates to shop floor will be in the shop floor folder. 2. Password changes require very special semantics that are enforced by the server, and developers need to understand these semantics for password management applications to be successful. In order to try to facilitate the password management process

Unit 1 Assignment 1

998 words - 4 pages 0.0001 W ( 10 dBm) (d) p 25 m W ( 16 dBm) Section 1-3 15 Define electrical. noise, and explain why it is so troublesome to a communi- cations receiver. In electronics, noise is a random fluctuation in an electrical signal, a characteristic of all electronic circuits. Noise generated by electronic devices varies greatly, as it can be produced by several different effects. Thermal noise is unavoidable at non-zero temperature, while other types

Unit 1 Assignment 1

2818 words - 12 pages Marco Di Virgilio – BTEC Level 3 Civil Engineering Task 1) There are various control measures in place for given workplace situations. This is done primarily to reduce to reduce risk and to meet legal requirements. The following control measures are applicable to the mechanic workshop environment in the college. I have selected three control measures that each aim to reduce the risk of their respective hazards. The first control