Reference no: EM131143397
Project: Detailed Assignment Description
Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization (The organization is from Project 1)
Step 1: Review the selected case study and describe at least 10 issues related to security, interoperability, and operations.
Step 2: Prioritize and articulate the selected requirements based on immediate need, security posture, complexity, resource availability, and cost.
Step 3: Identify at least 4 applicable government regulations/ standards that govern how the requirements must be met, implemented, or measured. Provide rationale for why these are applicable.
Step 4: Using NIST Special Publication 800-53 select at least 4 security controls that relate to these issues and describe how these controls enhance the security posture or facilitates the secure implementation of these requirements.
The deliverable for this case study assignment will be a minimum 5 page, double-spaced paper using Times New Roman 12 font and APA style formatting for citations and references. It will also include a minimum of 5 references. The Title/Cover page, illustrations (tables/charts/graphs), or references are not part of the page count but are required for the assignment.
Most important behavioral aspects of informal organization
: One of the most important behavioral aspects of the informal organization is its communication pattern. Now that you have read about the different types of communication networks and the different roles that are used in informal communication, you wi..
|
Satisfy the needs of both amateur and professional artists
: An artist's supply shop stocks a variety of different items to satisfy the needs of both amateur and professional artists. In each case described below, what is the appropraite inventory control model that the store should use to manage the replenish..
|
Demonstrate input validation using regular expression
: Design, implement, test, and debug a C# program to demonstrate input validation using regular expression.
|
What are the major advantages to utilizing diversity
: Read the article, "The On-the-Ground Reality of Women Leaders." Based on the content of this article and your personal experiences, what do believe are the major challenges facing diversity of culture and gender in the workplace today?
|
Identify it security controls that should be implemented
: Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization (The organization is from Project 1).
|
Difference between independent and dependent demand
: In MRP, what is the difference between independent and dependent demand? If your company makes two products using the same resources, what factors lead to the case where it is not the most profitable to produce more of the most profitable item per un..
|
Management team as the founder of new venture
: Management Team As the founder of a new venture, examine your team-building skills to lead a new venture team. In a three- to four-page paper, not including the title and reference pages, identify key characteristics of individuals you would select t..
|
Predict the target group of your communication plan
: Outline the approach that you would use to conduct research and interpret the situational analysis for your hometown. Determine the main goals and objectives of your proposed communication plan. Predict the target group of your communication plan.
|
How many passengers were on the titanic
: How many passengers were on the Titanic? What percentage of passengers perished on the Titanic? What percentage passengers survived the sinking of the Titanic?
|