Identify and prioritize it security controls

Assignment Help Computer Network Security
Reference no: EM13758932

Bank Solutions Inc. - Bank Solutions - Project 2 NIST

Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization (The organization is from Project 1)

Step 1: Review the selected case study and describe at least10 issues related to security, interoperability, and operations.

Step 2: Prioritize and articulate the selected requirements based on immediate need, security posture, complexity, resource availability, and cost.

Step 3: Identify at least 4 applicable government regulations/ standards that govern how the requirements must be met, implemented, or measured. Provide rationale for why these are applicable.

Step 4: Using NIST Special Publication 800-53 select at least 4 security controls that relate to these issues and describe how these controls enhance the security posture or facilitates the secure implementation of these requirements.

Step 5.The deliverable for this assignment is a minimum 5 page, double-spaced paper using Times New Roman 12 font and APA style format. It will also include a minimum of 5 references. The Title/Cover page, illustrations (tables/charts/graphs), or references are not part of the page count but required.. Also the grading rubric can provide more details to include in the paper. The instructor may provide an APA style template to use for this paper.

Reference no: EM13758932

Questions Cloud

What do you want to do with business management degree : What do you want to do with business management degree and how will it help you impact others?" "Who in your life has motivated you to work for this degree and how have they impacted you?"
Advantages and disadvantages of social networking : Analyze how the university might integrate at least two social media and networking technologies to accomplish their goals. Your analysis must cover the advantages and disadvantages of social networking
News article regarding denial of service attack : Research via the internet and find recent news article regarding denial of service attack, or distributed denial of service attack.Summarize the article using at least 500 words.The key to this assignment is to demonstrate your understanding of th..
Tay-sachs disease : Tay-Sachs disease and provide a discussion of the information you would share with the couple about Tay-Sachs and possible implications for future children.
Identify and prioritize it security controls : Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization
How can you link assessment findings to intervention : How can you link assessment findings to intervention? How can assessment information be used to create effective educational programs for children age birth - 8 years with ASD?
Provide a list of security activities or controls : List a security program in each level and provide a list of security activities or controls applied in these levels. Support your list with real world application data
Analyze instructional strategies, models that you might use : Analyze at least three instructional strategies, models, or programs that you might use when working in your field with an individual with ASD. Why would you expect these approaches to be effective?
Why is it important to document change requests : Why is it important to document change requests? What happens if a development team doesn't? When a project is late, do you think that adding more people to do the work helps or not? Justify your answer

Reviews

Write a Review

Computer Network Security Questions & Answers

  How do they fit within the situational crime prevention

What are the countermeasures to those threats, and how do they fit within the Situational Crime Prevention framework - how does the current law help or hinder your countermeasures? Are there any proposals for laws that would assist?

  What rc4 key value will completely invert s

What RC4 key value will completely invert S after the initial permutation (so that S[0] = 255, S[1] = 254, ..., S[254] = 1, S[255] = 0)?  Show your work. (Explain how you got this.)

  System enforcing bibas strict integrity policy

Consider the system enforcing Biba's strict integrity policy for a software vendor - defined integrity levels for an access class are released

  Strong ciphers produced by the enigma machine

Concur with, dispute, or qualify following statement: "The strong ciphers produced by Enigma machine are  result of complex mathematical trapdoor functions used to encrypt messages."

  Explain it director and staff to how to mange complexities

Host the discussion with IT director and staff and let them know what you believe to be most significant of these extra complexities and reasons why you believe them to be difficult to manage.

  Why is network security particularly difficult to achieve

Why is network security particularly difficult to achieve?

  Discuss primary challenges related to maintaining security

Distributed applications and cloud computing have become a viable option within the LAN-to-WAN Domain. Discuss the primary challenges related to maintaining the security of both applications and data in such an environment

  Prepare a trouble ticket to record the problem

Prepare a Trouble Ticket to record the problem

  What is the decryption function

a). What is the decryption function, b). What is the decrypted plaintext? c). What are some weaknesses of this cipher?

  Discuss the role they play in computer crime

Discussing the role they play in computer crime. Be sure to research and document cases to support each law and your discussion

  Application to input a character string

Output the string rotated to the right by a user-defined number of characters (0 or more). For example, Hello world!rotated by two characters would be: Hello world.

  Identify at least three different social media networks and

identify at least three different social media networks and describe how they are used.explain the advantages and

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd