Cybersecurity profile
Course:- Computer Network Security
Reference No.:- EM13761764

Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Network Security

Every organization must create a cybersecurity profile (system security plan (SSP)) for all of its major and minor information systems. The cybersecurity profile documents the current and planned controls for the system and addresses security concerns that may affect the system's operating environment. The cybersecurity profile includes security categorizations and security controls, and is included in the certification and accreditation package. For this project, you will create a sample cybersecurity profile describing the security posture of your selected organization.

  • Select and incorporate appropriate management, technical, and operational security controls into a system security plan.
  • Integrate and evaluate management, technical, and operational controls in the context of an information security program.
  • Develop a sample System Security Plan for an information system.


Your sample cybersecurity profile should be at least five full pages, double spaced, 1-inch margins, in New Times Roman 12-pitch font, with a cover page (name, course number, date, title of paper) and a reference page. The cover page and reference page are not included in the five-page minimum. Papers not meeting the five full-page minimum will lose points. You must have at least three sources, correctly formatted per APA guidelines. Submit your research paper to the appropriate TurnItIn assignment area by the due date.

Detailed Description of Learning Activity

Read NIST Special Publication 800-53 Rev 4 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, Building Effective Security Assessment Plans.

  1. Review the sample System Security Plan template in the Project Description area of the classroom.
  2. Select one management, one technical, and one operational control from the eighteen family controls that apply to your selected organization (i.e., AU - Audit and Accountability).
  3. Describe each family control. Include why these controls are required.
  4. For each family control, select two associated family identifiers (i.e., AU-3 Content of Audit Records).
  5. Describe each associated family identifier, describe the implementation status as it relates to your selected organization's security program, and describe how your selected organization implements the family identifer.
  6. Write your sample cybersecurity profile. At a minimum, the profile should include
  7. an Introduction that includes the purpose of your paper and introduces security profiles as they relate to your selected organization
  8. an Analysis section that includes Items 3-6 above
  9. a Conclusion that summarizes what you wrote

Put your comment

Ask Question & Get Answers from Experts
Browse some more (Computer Network Security) Materials
Examine at least three (3) risks associated with using public wireless access points to gain access to a corporate network. Provide oneĀ  real-world example that demonstrates
Choose, at least, three areas and explain the general trend and trends within two subsets of the area (i.e., security has subsets of physical, perimeter, monitoring) over th
Comments/Deadline : Topic "Software Security Operations in Cloud Computing"( The topic must relevant to Software Security concepts, operations, trends, or best practices.)
Write a very brief scenario of what "could" happen if a brand new Linux user accidentally logged in as root instead of as another type of user. Try to make your scenario as
As a forensic investigator firstly we have to know the details of the student like height, color and which dress he is wearing during the time of missing as his mobile is fo
The purpose of project is to write an executive proposal for a fictitious company called Advanced Research Corporation. Evaluate and select a security tool for recommendation
ITI581 Security Fundamentals - CCA Pty Ltd Case Study - You have been hired as a network security consultant to advise on security issues as a result of the recent re-structu
Define the mission statement for your business. Develop a technology architecture plan. The datacenter has five servers. Each server hosts different services: HTTPS, DNS, Secu