Cybersecurity profile

Assignment Help Computer Network Security
Reference no: EM13761764

Every organization must create a cybersecurity profile (system security plan (SSP)) for all of its major and minor information systems. The cybersecurity profile documents the current and planned controls for the system and addresses security concerns that may affect the system's operating environment. The cybersecurity profile includes security categorizations and security controls, and is included in the certification and accreditation package. For this project, you will create a sample cybersecurity profile describing the security posture of your selected organization.

  • Select and incorporate appropriate management, technical, and operational security controls into a system security plan.
  • Integrate and evaluate management, technical, and operational controls in the context of an information security program.
  • Develop a sample System Security Plan for an information system.

Deliverable

Your sample cybersecurity profile should be at least five full pages, double spaced, 1-inch margins, in New Times Roman 12-pitch font, with a cover page (name, course number, date, title of paper) and a reference page. The cover page and reference page are not included in the five-page minimum. Papers not meeting the five full-page minimum will lose points. You must have at least three sources, correctly formatted per APA guidelines. Submit your research paper to the appropriate TurnItIn assignment area by the due date.

Detailed Description of Learning Activity

Read NIST Special Publication 800-53 Rev 4 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, Building Effective Security Assessment Plans.

  1. Review the sample System Security Plan template in the Project Description area of the classroom.
  2. Select one management, one technical, and one operational control from the eighteen family controls that apply to your selected organization (i.e., AU - Audit and Accountability).
  3. Describe each family control. Include why these controls are required.
  4. For each family control, select two associated family identifiers (i.e., AU-3 Content of Audit Records).
  5. Describe each associated family identifier, describe the implementation status as it relates to your selected organization's security program, and describe how your selected organization implements the family identifer.
  6. Write your sample cybersecurity profile. At a minimum, the profile should include
  7. an Introduction that includes the purpose of your paper and introduces security profiles as they relate to your selected organization
  8. an Analysis section that includes Items 3-6 above
  9. a Conclusion that summarizes what you wrote

Reference no: EM13761764

Questions Cloud

Describe how employers can control labor costs : Describe how employers can control labor costs. Include in your response what might be some ot the affects from these control methods (either positive or negative)
Distinguish between global-expatriates-local nationals : Distinguish between global, expatriates, local nationals, and third country nationals. Select one and provide an example when it would be appropriate to use that type of resource and why.
Availability and portability vs. privacy : Analyze the evidence, arguments, and conclusions in your research that support your position.
Create naming conventions for each entity and attributes : Create naming conventions for each entity and attributes. Propose an efficient data structure that may hold the tour operator's data using a normalization process. Describe each step of the process that will enable you to have a 2nd Normal Form da..
Cybersecurity profile : Every organization must create a cybersecurity profile (system security plan (SSP)) for all of its major and minor information systems. The cybersecurity profile documents the current and planned controls for the system and addresses security conc..
Different types of budgets and techniques : You are a manager in a fictitious company of your choice. Your director has asked you to explain to the department staff the different types of budgets and techniques in order to provide an overall understanding.
What is the story socrates tells in this selection : What is the story Socrates tells in this selection? What is the story an allegory/analogy for according to Socrates? Be as detailed as you can in your answer.
A plan-based software engineering approach : Describe your approach in managing this project through both a Scrum-based approach and a plan-based software engineering approach.
Explicit policy of selling plant assets : Why would Acme have an explicit policy of selling plant assets before the temporary differences reversed in the deferred tax liability account?

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Paper about cyber security and identify assess and propose

Please refer to the latest document about cyber security and identify assess and propose: Risk related indicators and governance solutions, vulnerability assessment for cyber security

  Critique the transition process performed by the dms in

write a three to four page paper in which youanalyze the security mechanisms needed to protect the dms systems from

  Write the enterprise technical infrastructure security plan

Write one page with references in APA format.Utilizing your comprehensive security plan outline as a guide (It is the attached document), write the enterprise technical infrastructure security plan for the organization.

  What is the single most important asset of security program

What are the benefits if personnel in security management develop skills as educators for their organization's security? Analyze and explain your point of view. Why are security programs relevant? What is the single most important asset of a securi..

  Organization-severely lacks in appreciating need security

Organization that severely lacks in appreciating the need for security or a company that depends on equipment that is outdated and services from contractors that are low quality? Why?

  Network security hii need the attached assignment done by

hi ltbrgti need the attached assignment done by 120914. please quote the best price. the assignment should be completed

  At what generation did video downloads and reasonably fast

answer the following test your understanding questions from chapter 8 using apa style and form nbspnbsp a. what are

  How adequate destruction of materials ensuring privacy

How will your company ensure adequate destruction of the materials thus ensuring an individual's privacy? Will any state-wide, national, or industry standards be met? If so, which ones and how?

  When applying cryptography determine why securing the key

when applying cryptography determine why securing the key is more important than securing plaintext or ciphertext.

  Detailed network security recommendations

As the company's subject matter expert/consultant, the CEO wants a 4-6 page report at the end of your assignment. The CEO tells you they will have remote users, so firewall and VPN technologies are needed.

  Implementing information systems security policies

Describe the roles and responsibilities of those implementing information systems security policies.

  What is the decrypted plaintext

A 1,024-bit message is used to generate a 24-bit hash. On the average, how many other messages could be expected to generate the same hash value? What is the probability that two massages that generate the same 24-bit hash?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd