Question

Search online for credible, authoritative information about the Sarbanes-Oxley Act. What provisions does the law make regarding information security?


Solution Preview

This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.

Considerations Regarding Sarbanes-Oxley Act.

There are two significant sections of Sarbanes-Oxley Act that involve directly provisions about information security: 302 and 404. First of the two sections outlines the fact that both CEO (Chief Executive Officer) and CFO (Chief Financial Officer) need to imply into report activity, in order to ensure these are “accurate and complete”. Despite the fact that the law doesn’t point out specifically what internal controls must be assessed, it is clear that responsibility for financial reporting is residing at corporate top-management level. The same lack in specifying exactly what internal controls need assessment is present also in section 404. Another specification refers to the necessity of consulting an external audit (“The assessment must also be reviewed and judged by an outside auditing firm”) as second opinion. Another particularity of this act is the missing of direct references (with these words) to information security....

This is only a preview of the solution. Please use the purchase button to see the entire solution

$15.00

or free if you
register a new account!

Assisting Tutor

Related Homework Solutions

Technology & Product Review for Identity Governance & Administration (1080 words)
Homework Solution
$35.00
Technology
Product
Review
Identity
Governance
Administration
Centrify
Risk
Assessment
Software
Development
Strategic
Threat
Control
Security
Management
IGA
Access
Least
Privilege
Separation
Duties
Intellectual
Insider
Attack
Discl
Two Information Security Questions about Authorization Types and Malware Analysis
Homework Solution
$20.00
Authorization
Malware
Plumbing
Contractor
Role
RBAC
Inventory
Database
Part
System
Payable
Clerk
Installation
Foreman
Acess
Read-only
Read-write
CodeRed
ILOVEYOU
Nimda
MyDoom
Payload
Spread
Trigger
Condition
Damage
Strategy
Miti
Security Attacks on Software Applications and Network Interfaces (570 words)
Homework Solution
$23.00
Detect
Attack
Security
Platform
Software
Application
Product
Network
Interface
Relational
Database
Confidentiality
Integrity
Availability
Injection
SQL
Inference
Management
System
Vulnerability
Get help from a qualified tutor
Live Chats