Identify and prioritize it security controls

Assignment Help Basic Computer Science
Reference no: EM13787212

Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization (The organization is from Project 1)

Step 1: Review the selected case study and describe at least10 issues related to security, interoperability, and operations.

Step 2: Prioritize and articulate the selected requirements based on immediate need, security posture, complexity, resource availability, and cost.

Step 3: Identify at least 4 applicable government regulations/ standards that govern how the requirements must be met, implemented, or measured. Provide rationale for why these are applicable.

Step 4: Using NIST Special Publication 800-53 select at least 4 security controls that relate to these issues and describe how these controls enhance the security posture or facilitates the secure implementation of these requirements.

Step 5: Paper must be a minimum of 5 pages, in APA format, with at least 5 references.

Reference no: EM13787212

Questions Cloud

Determine general security architecture for the company : Determine the most important assets of the company, which must be protected, Determine general security architecture for the company
How you assist organization in accomplishing their goals : Where they are: The organization's current security and how they handle emergency situations, Where they should be: Where the organization should be with the level of their security and emergency management, How you'll get there: How you will assist ..
Define security technique that aims to expose flaws : Fuzzing" is a security technique that aims to expose flaws in error handling by providing invalid, random, or unexpected data as inputs to computer systems. Here "system" is used generically, and should be read as "function call, program, or shell..
What are the salient situational factors : What are the salient situational factors.
Identify and prioritize it security controls : Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization
Develop a treatment plan for mike : Review "The Case of Mike". Develop a treatment plan for Mike. Discuss the importance of goal setting within the therapeutic relationship and explain how this is related to the process of implementation
Explain the huffman trucking virtual organization : Which of these roles would be installed in the Huffman Trucking Virtual Organization. State your reasoning for each server role that you would install.
Describe the types of negotiations : Describe the types negotiations
Documented evidence of psychiatric issues : John Hinckley, Jr. and the documented evidence of psychiatric issues leading to his controversial insanity defense in the shooting of President Ronald Reagan

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  What technologies should be used to secure these areas

On what areas should the security policy focus (physical security, data security, auditing, passwords, and so forth), and what technologies should be used to secure these areas?

  Compare and contrast how useful each engine

Compare and contrast how useful each engine was in terms of providing reliable information, not just manufacturer's ads. Ask and AoL.

  Write the definition of the function

Write the definition of the function, leavesCount, that takes as a parameter a pointer to the root node of a binary tree and returns the number of leaves in a binary tree. Add this function to the class binaryTreeType and create a program to test ..

  Identify telecommunication component technology

Identify one telecommunication component technology - 3-5 appendix pages including spreadsheets, Datas , and diagram tables if any available or any references.

  What is chained exceptions in java

What is chained exceptions in java? Explain different layout manager in Java.

  Introduction to wireless communications

After reviewing the concepts, pictorially model the TCP/IP protocol against the 7-layer OSI model. In your depiction, include the common protocol sections that fit in the various levels.

  Display an appropriate message comparing the month expenses

Display an appropriate message comparing the month's expenses to the budget.

  Planning the dblc-logical and physical design

The development of a database requires thorough methodology that ensures quality within the solution.

  Acquire a bit-stream copy from the flash drive

During a criminal case investigation, a computer was taken as part of the evidence. The computer was found with a flash drive connected to one of the USB ports. It is suspected that this flash drive contains image files relevant to the case. Pr..

  Draw the block diagram for the hardware

Draw the block diagram for the hardware that implements the following: y + xz: AR ß BR + CR where AR, BR and CR are n-bit registers and x, y, and z are control variables.

  Draw a flow chart, hierarchy chart

Draw a flow chart, hierarchy chart, and write pseudocode for the following problem. • A weather sensing system calculates & prints a report on the following: ? Average temperature ? Highest temperature ? Lowest temperature ?

  What is uml

What is UML and how is it useful in designing large systems?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd