$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!
Add File

Error goes here

CSIS 340 Computer Science

tag 0 Download3 Pages / 522 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT
  • Course Code: CSIS 340
  • University: Liberty University
  • Country: United States


Discussion boards are collaborative learning experiences. Therefore, the student will answer questions in response to the provided prompt for each forum. The student must submit a thread of at least 250 words that completely answers the question(s) for each forum.

2.In addition to the thread, the student must also reply to at least 2 classmates’ threads. Each reply must be at least 100 words. The student must use complete paragraphs, proper APA formatting, and cite information that is not his/her own.

Main Discussion Board Post-

Minimum 250 words (-5 for less than 250 words)

Must have a reference from the book with a citation or a reference from the Bible (-5 if no Bible verse AND version).

DB Replies:

Each reply must have a min 100 words (-5 for less than 100 words)

Must have two DB replies (-3 for each missing reply)

Each reply must have a Bible verse with the Edition of the Bible (-5 for each reply missing a Bible verse with Bible version

Each thread is due by 11:59 p.m. (ET) on Thursday of the assigned module/week and replies are due by 11:59 p.m. (ET) on Monday of the same module/week, with the exception of Module/Week 8. In Module/Week 8, your thread is due by 11:59 p.m. (ET) on Thursday and replies are due by 11:59 p.m. (ET) on Friday.


Part 1  Discussion Board Question

Describe the fundamental security policies outlined by PCI DSS, FISMA, and COBIT. In a subsequent paragraph, identify at least 2 types of industries (e.g., Internet service providers, health care, education) and describe which of the latter standard(s) should be considered in that industry. Defend your response.
Post your thread by 11:59 p.m. (ET) on Thursday, and your 2 replies by 11:59 p.m. (ET) on Monday.

Part 2: Student Threads ( Must reply to each individually 100 words each)

Thread 1

Karen Benson

Payment Card Industry (PCI)


Top of Form

Payment Card Industry (PCI) is a standard developed by the major card providers in an attempt to address public concern about hacks of credit cards.  One of the first poster children of credit card hacks was the TJ Max hack in 2007, when 94 million credit cards were stolen (Chickowski, 2008).  Due to that event and others, the big five credit card companies: Visa, Mastercard, American Express, Discover, and JCB got together to form the Security Standards Council (SSC).  The primary outcome of the SSC, was the development of the Data Security Standard (DSS), which outlines several important security standards for processing and holding credit card data.  The PCI DSS has 12 sections, but has been organized into 6 sections, covering the following security concepts: build and maintain a secure network, protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test networks, maintain an information security policy (Johnson, 2015).  The standard has stood the test of time and today serves as a force against hackers that would otherwise have easy access to credit card data.

     The PCI DSS standard applies to any entity that produces, processes, or stores credit card data.  However, other standards apply to other industries.  For example, the Healthcare Insurance Portability and Accountability Act (HIPAA) applies to any entity that produces, transmits, or stores Protected Healthcare Information (PHI).  The Federal Information Security Management Act (FISMA) applies to all U.S. Government agencies.  There are hundreds of other standards and some organizations have to comply with multiple standards at once.


Chickowski, E. (2008). TJX: Anatomy of a massive breach. Baseline, (81), 28–29.

Johnson, R. (2015). Security Policies and Implementation Issues (2 edition). Burlington, MA: Jones & Bartlett Learning. 

Bottom of Form

Thread 2 Nathanael Gentry Forum 4: Fundamental Policies


Top of Form

The Payment Card Industry Data Security Standard (PCI DSS), currently in version 3.0 (2015), represents the efforts of major credit card companies (Visa, MasterCard, American Express) to protect payment information transmitted over the Internet (Johnson, 2015, p. 71). Since nearly all Internet industries (including all mentioned in the prompt) can accept online payment, all much maintain PCI DSS complaint systems. As Johnson (2015, p. 71) notes, PCI DSS mandates security policies and compliance validation from e-commerce companies; noncompliance can provoke punitive charges from the companies and even revocation of card-handling authorization. The standard ensures security through two facets: encryption and processing isolation (segmentation). PCI DSS requires at-rest encryption—the persistent encryption of data even in nonvolatile storage. Moreover, the standard recommends establishing entire compliant network segments; for applications that cannot isolate the payment-processing systems, all systems on the segment must comply with the standard (Johnson, 2015, p. 71).  

While PCI DSS represents a private industry’s self-regulation, the Federal Information Security Management Act (FISMA) provides the government’s own regulation of its information security (Johnson, 2015, pp. 58-59). Standards developed by NIST concern inventory management, risk analysis, system security certification, and audits. Since private corporations handling government data must also comply with FISMA, defense contractors (e.g. Lockheed Martin, BWXT) and think-tanks (e.g. RAND) would face such requirements.

Finally, as Johnson (2015, pp. 62-63) notes, Control Objective for Information and Related Technology (COBIT) provides a library of security controls for corporate compliance with the Sarbanes-Oakley Act (SOX). Indeed, COBIT stretches far across private-sector regulations—including auditing, product and policy lifecycle management, and risk management. Since COBIT has international application, global industries like investment firms and technology companies should implement policies from its vast library.


Johnson, R. (2015). Security policies and implementation issues (Second edition). Burlington, MA: Jones & Bartlett Learning.

Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

Unique Document

Under Evaluation

Get Money
into Your Wallet

Total 3 pages, 1 USD Per Page

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2020). Computer Science. Retrieved from

My Assignment Help (2020) Computer Science [Online]. Available from:
[Accessed 01 March 2021].

My Assignment Help. 'Computer Science' (My Assignment Help, 2020) <> accessed 01 March 2021.

My Assignment Help. Computer Science [Internet]. My Assignment Help. 2020 [cited 01 March 2021]. Available from:

For years, has been operating as one of the cheap assignment help providers in the USA. We are one of the best college paper writing services that keep service price minimal. We do not let the affordability of our service to hamper the standard of our work. We have separate teams of experts to provide report writing help . At, we believe in earning credibility, so students can pay for assignments only after getting satisfied solutions. Tough assignments bother you? Trust us with your project. You will not regret paying us to write assignments for you.

Latest Other Samples

LAWS20058 Australian Commercial Law

Download : 0 | Pages : 10
  • Course Code: LAWS20058
  • University: Central Queensland University
  • Country: Australia

Answer: Since time immemorial, the Maori tribes have experienced major renaissance and as a result of this, there are existing claims in relation to past grievances and the rights regarding self-governance. The Constitution of the Maori tribes has been developed in a way for the purpose of protecting them from acts of violence. It is evident that, the individuals belonging to the Maori culture have distinct system, customs and culture of their...

Read More arrow

MIS770 Foundation Skills In Data Analysis

Download : 0 | Pages : 9
  • Course Code: MIS770
  • University: Deakin Business School
  • Country: Australia

Answer: This report entails the analysis of the data set from the survey which was conducted among the employees from TechnoMart regarding the association between the variation in working hours and the employees at TechnoMart depending on specific factors of change such as the occupation, union membership, and the employee job satisfaction. This report is sub-divided into different parts with the aim of addressing some of the critical concerns...

Read More arrow

BUS110 Workplace Learning

Download : 0 | Pages : 10
  • Course Code: BUS110
  • University: Charles Sturt University
  • Country: Australia

Answer: Describe an ideal organization and occupation where you would you like to work. An ideal organization is a place where each individual is allowed to exhibit their strengths, which is working together in coordination with the other team member, in such a way that the team work should be given the highest priority (Armson & Whiteley, 2010). Also, the organization should provide its employee, the freedom to express their views and wo...

Read More arrow

IMAT 5209 Human Factors In System Design

Download : 0 | Pages : 14
  • Course Code: IMAT5209
  • University: De Montfort University
  • Country: United Kingdom

Answer: Human computer interaction is an extensive topic and it needs to be handled carefully adhering to all the principles and concepts that surrounds it. Human factors that are applicable while designing a website or a mobile application must be put in to consideration to avoid loss of customers or clients. The loss of clients and customers may have otherwise occurred due to poorly designed websites that are not user friendly enough. Some o...

Read More arrow

REl 123 Christian Spiritual Vision

Download : 0 | Pages : 3
  • Course Code: REL123
  • University: Saint Leo University
  • Country: United States

Answer: Explain the role of reason within theology as it seeks to deepen its understanding of the mysteries of faith             Foster, (2018) argues that, Christian spiritual value means what leads to action, event, belief or having a firm standing concerning an issue. It can also be regarded as tangible proof that will make an individual come to believe or understand a certain issue. I...

Read More arrow

Save Time & improve Grade

Just share requirement and get customized Solution.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

Add File

Error goes here




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

453 Order Completed

98% Response Time

Howard Asuncion

LLM in Criminal Law

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

2594 Order Completed

95% Response Time

Michael Johnson

Masters of MSc in Economics

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2115 Order Completed

97% Response Time

Kimberley Chen

MPA in Accounting

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

203 Order Completed

97% Response Time

Richard Alpert

PhD in Psychology

London, United Kingdom

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

great work as per expectation. Referencing done right. no plagiarism. no similarity found


User Id: 606594 - 28 Feb 2021


student rating student rating student rating student rating student rating

My grade is high in this course after making some corrections, i email my for additional materials and the assignment was done to my satisfaction. Bravo to the job well done from the professional tutors I\'m very happy. unlike other ...


User Id: 548921 - 28 Feb 2021


student rating student rating student rating student rating student rating

Thank you for your fabulous work performance. Your solution gave the base to create my own work, which I did and I think it is perfectly splendid. I am looking forward working with you in the future. Once again, thank you kindly.


User Id: 233928 - 28 Feb 2021


student rating student rating student rating student rating student rating

im satisfied with the work and i will continue do my assignment here. The price is also reasonable and the work completed 10 days earlier


User Id: 251304 - 28 Feb 2021


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?