Main elements addressing risk management framework

Assignment Help Basic Computer Science
Reference no: EM13829621

Problem:

The National Institute of Standards and Technology (NIST) replaced the former NIST Special Publication 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems with NIST Special Publication 800-37 Revision 1, Guide for Applying Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach. The NIST document changed from a certification and accreditation framework to a risk management framework because information security management systems should be regularly reviewed, updated, and maintained. It makes more sense to follow a security life cycle approach (continuous monitoring) versus a single one-time static certification/accreditation approach.

For this task, you will be using NIST Special Publication 800-37 Revision 1, Guide for Applying Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach and the attached "Healthy Body Wellness Center Risk Assessment" case study.

You have been hired to apply the NIST's risk management framework to the Healthy Body Wellness Center's information systems. You know that the organization has recently had a risk assessment completed that includes recommendations for implementing security controls and mitigating risks. In your new role, a team of people will be assigned to help you with the task. The first job you are tasked with is creating a to-do list for the specific tasks outlined in each of the six steps in the risk management framework (RMF).

Task:

A. Discuss key elements that need to be addressed as part of the risk management framework by completing the attached "RMF To-Do List."

B. Create a white paper that compares the ISO 27002, COBIT, NIST, and ITIL frameworks by doing the following:

1. Discuss how each framework is most commonly used.
2. Analyze the purpose of each framework design.
3. Evaluate the strengths of each framework.
4. Evaluate the weaknesses of each framework.
5. Discuss the certification and accreditation process for the frameworks.
6. Discuss when you would choose to use each framework (e.g., ISO 27002 versus COBIT, NIST, or ITIL).

C. When you use sources, include all in-text citations and references in APA format.

Additional Information:

This question is from Computer Science and it explains about the main elements addressing risk management framework for ISO 27002, COBIT, NIST and ITIL frameworks.

Total Word Limit: 2642 Words

Reference no: EM13829621

Questions Cloud

Importance of information security : To help prepare for the upcoming installation of computers in the dormitory buildings, the university president has asked you to provide more information on the importance of information security and the possible information in need of protection...
Statement review practices a social tyranny more formidable : practices a social tyranny more formidable
What is market value of the company without the new project : ABC Corporation is investing $500 million in production facilities. The present value of all future cash flows is estimated to be $700 million. Assume that all cash flows are aftertax. ABC has 180 million outstanding shares with a current market pric..
Calculate the velocity using displacement data : Calculate the velocity using displacement data and calculate the velocity using acceleration data - Plot the data and find the best curve fit for displacement and for acceleration.
Main elements addressing risk management framework : The National Institute of Standards and Technology (NIST) replaced the former NIST Special Publication 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems with NIST Special Publication 800-37 Revision 1, G..
Assuming reasonable debt levels and good credit : Common stock financing is often considered the safest form of financing, as the issuing firm is under no obligation to pay dividends. Owners of common shares assume this uncertainty in the hope of favorable returns. Debt financing, assuming reasonabl..
How many justices does it take : How many justices does it take to grant a writ of certiorari
Statement review labour produces for the rich wondrous thing : labour produces for the rich wondrous thing
What are the projects payback and discounted payback periods : (Payback period, net present value, profitability index, and internal rate of return calculations) You are considering a project with an initial cash outlay of $80,000 and expected cash flows of $20,000 at the end of each year for six years. The disc..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How code an interactive hangman game using string method

How do you code an interactive hangman game using the string method

  Create an applet to draw a digit using the method fillrect

In Java Programming, Create an applet to draw a digit using the method fillRect of the class Graphics. For instance, if the input is 4, the applet will display the digit 4. I will also need the HTML code along with the code

  Which technology half or full duplex has a lower effective

Which technology (half or full duplex) has a lower effective throughput rate

  Impose appropriate field types and lengths on all fields

Impose appropriate field types and lengths on all fields

  How many different seven-digit phone numbers can be formed

How many different seven-digit phone numbers (ignoring area code) can be formed? Can city of 2 million people be served by single area code? Describe.

  Update columns orderplaced subtotal shipping tax and totel

After a shopper completes an order, a procedure is called to update the following columns in the Basket table: orderplaced, subtotal, shipping, tax and total.

  Our model assumes that the arrival distribution of customers

In the McBurgers simulation, our model assumes that the arrival distribution of customers is the same throughout the entire day. Do you think this is a realistic assumption? If not, explain how you could modify the model to make it a better repres..

  How many block of main memory is needed-direct mapped cache

Suppose a computer using direct mapped cache has 2^32 words of main memory and a cache of 1024 blocks, where each cache block contains 32 words. How many block of main memory are there?

  Design a dtack circuit that will generate the correct number

Assume the processor has a clock period of 5ns and the memory chips' access time is 58 ns. Design a DTACK circuit that will generate the correct number of wait states.

  Explain how determine the process state and what are states

Explain how to determine the process state and what are the states a process can be in. (Hint: use the man pages! You may have to do some cross referencing

  Discuss how you think learning more about excel will assist

Discuss how you think learning more about Excel will assist you in your school work and career. What types of spreadsheets have you created or do you plan to create now that you know more about Excel

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd