Choose appropriate security controls

Assignment Help Computer Network Security
Reference no: EM13808836

Choose appropriate security controls from the SAN's 20 critical security controls and choose the remainder of controls that are needed to secure this system from the listing of controls provided from NIST 800-53 rev 4 (see webliography). You will select a total of 10 security controls. List the control by type, mapping them as best as you can to the NIST Control Families (i.e. PE-3, etc. and provide a one sentence description of the function of this control). NOTE: You will address each control in the 20 critical security controls document and determine whether or not the control is appropriate to security the system in the scenario. You will provide a sentence or two on why or why not it should be selected. The 20 critical security controls must be addressed for the scenario but not necessarily selected for the scenario. The rest of the 10 controls you will select can be chosen from the NIST SP 800-53, Rev. 4 controls, from the Access Controls Family (I've provided a list, below, however you will review each of the controls in the document provided in Course Content). For example, if you choose two of the twenty SANS controls, you will select eight of the Access controls for a total of ten controls.

Reference no: EM13808836

Questions Cloud

World of business management : Spend some time doing some research and identify someone who might be considered an "icon" of leadership. Your choice does not have to be limited to the world of business management.
Why communication can be affect by culture and relationships : Explain how and why communication can be affected by the following: Culture and Relationships.
Identify three common challenges in managing data : Identify three common challenges in managing data, and describe one way organizations can address each challenge using data governance
Patterns in making government work : Patterns in Making Government Work
Choose appropriate security controls : Choose appropriate security controls from the SAN's 20 critical security controls and choose the remainder of controls that are needed to secure this system from the listing of controls provided from NIST 800-53 rev 4
Public administrators should be restricted to laid down rule : public administrators should be restricted to only laid down rules in the discharge of their duties as espoused by Max Weber or should they have some amount of discretion. Provide the likely benefits and disadvantages of each scenario and use exam..
Multiple regression to forecast demand of its product : How would a manufacturing company use multiple regression to forecast demand of its product? Give one detailed example
Discuss the importance of the advancements to its success : discuss the importance of these advancements to its success as a mode of storytelling. How might it have been told differently, for better or worse, without these technological advancements?
Eliminate trade restrictions and encourage free trade : Why would a country eliminate trade restrictions and encourage free trade? Using the European Union as an example, identify key changes that took place to encourage free trade.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Current malware activity

Question: Of the top threats, how many can be classified as viruses? Worms? Trojans? Question: How many of them were discovered today? In the past week? How many are at least 1 year old?

  Plan a high-level backup and disaster recovery plan

Plan a high-level backup and disaster recovery plan for a business. Discuss the security of the network and suggest best practices for securing the business network.

  Security weaknesses

In this phase you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. You will then identify potential security weaknesses

  Consider the information stored on your personal computer

information security1. look up the paper that started the study of computer security. prepare a summary of the

  Computing the value of shared secret key

You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 291. What is the value of your shared secret key?

  Analyze issue using social contract and rule utilitarianism

Analyze issue using Social Contract, Kantianism, Act Utilitarianism, Social Contract Theory, Virtual Ethics and Rule Utilitarianism.

  Mandatory access control and discretionary access control

Explain in your own words the elements of the following methods of access control: Mandatory access control (MAC), Discretionary access control (DAC) and Role-based access control (RBAC)

  Discuss what security policies commerce should implement

For Reflective Article Paper 3, select an article that details current methods that are used to successfully prevent identity theft. Discuss what security policies commerce should implement to prevent it from happening.

  Assignment hi i am need your help in my assignment can you

hi i am need your help in my assignment. can you please help me. the date has already been passed i.e. 249 2014. so i

  Examine how the system balanced security and usability

Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.

  Forensic challenge in mobile network

As a forensic investigator firstly we have to know the details of the student like height, color and which dress he is wearing during the time of missing as his mobile is found in his room. It is easy to trace by checking the details in his mobile..

  Describe the new method in details and theoretical basis

Analyze advantages and weaknesses of the new protection method (e. g. implementation cost, runtime, reliability, stability and etc.)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd