Nist security models

Assignment Help Basic Computer Science
Reference no: EM131260527

NIST Security Models

The design of a security awareness program depends on many factors. One important factor is how the organization will develop and distribute security information. Determining whether the strategies and implementation of an SAP are set centrally or are decided on at a lower level will have a significant impact on the success or failure of the program.

For this Discussion, you will evaluate security models based on a specific organization and its business model. Review Chapter 3 of NIST SP800-50 in this unit's Learning Resources to gain a deeper understanding of the three security models.

The organization you base your security model evaluation on will be determined by the first letter of your last name as listed below:

Wal-Mart

A-C

Apple Computer

D-F

A small, "mom-and-pop," hardware store

G-I

The Kraft Group

J-L

The United Nations

M-O

The Louvre Museum

P-R

Walden University

S-U

Fiat Group Automobiles

V-Z

Post a 300- to 500-word evaluation of which of the security models defined in NIST SP800-50 you would recommend for your organization. Include in your evaluation a description of your assigned organization and a detailed explanation of your recommended security awareness model. Justify the model you recommended.   Include your research on the organization and explain any assumptions you made about the organization to come to this conclusion.

Reference no: EM131260527

Questions Cloud

Determine the shear stress in the pin : The bar AB is supported by a frictionless inclined surface at A and a 7/8- in.-diameter pin at B that is in double shear. Determine the shear stress in the pin when the vertical 2000-lb force is applied. Neglect the weight of the bar.
Nonemployees having physical access : What are the dangers of nonemployees having physical access? Give examples.
Determining the encoding mechanisms : List all of the IrDA (infrared) encoding mechanisms, and if possible please specify what they do.
What is the expected value of perfect information : What is the expected value of perfect information (EVPI)? - What is the expected value with perfect information (EVwPI)? - Identify the five steps in analyzing a problem using a decision tree?
Nist security models : The design of a security awareness program depends on many factors. One important factor is how the organization will develop and distribute security information. Determining whether the strategies and implementation of an SAP are set centrally or..
Find the stresses in members bc and be for the truss shown : Find the stresses in members BC and BE for the truss shown. The crosssectional area of each member is 4:2 in: 2. Indicate whether the stresses are tensile (T) or compressive (C).
International currency and banking markets : Could you please let us know the turnaround time for this page? Subject relates to international currency and banking markets.
What are marketable securities : What are marketable securities and how do you recognize when there are marketable securities? I have trouble understanding the concept of them.
Analyzing a security breach : Many types of systems are networked together, and the number of devices that are added to this network increases every year. You can set your home security alarm system using a smartphone app or use another mobile app to open your car door.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Show how an assembly might replace

show how an assembly might replace this pseudo-instruction with the true instructions to achieve the same effect. You solution must observe MIPS register use conventions.

  Who should control the it policy within an organization

Who should control the IT policy within an organization and why? Does the responsibility for IT control depend on the organizational structure, the importance of the IT function, or other factors and why?

  How many relationships between users and permissions defined

For a RBAC scheme, how many relationships between users and permissions must be defined?

  Write computer code to implement the fft on chirp signal

The original chirp pattern or signal is give by (3) Describe the FFT algorithm based on chirp signal.

  Create an entity-relationship diagram with the database

Consider a problem (document) that can be solved creating a database. Identify all elements related to it, and separate the entities with their attributes, making sure that you have functional dependencies.

  What are possible limitations using macros

What are possible limitations using macros within Microsoft Excel and how would you convey this to a user

  Relational database management

As indicated in the project description, each team will prepare a written and oral presentation of their project designed to explain the design of each of the systems to individuals that will be using the system. The written presentation will be w..

  Protect the access to the password hashes

Usual authentication systems verify passwords with the help of their hashes stored in protected files. i. Explain why is the purpose of storing password hashes rather than the passwords themselves? ii. Explain why should we protect the access to the ..

  Determine the minimum sampling frequency

Determine the minimum sampling frequency for each signal, and design a TDM commutator and decommutator to accommodate the signals.

  Type of local area network called a home area network

Some of the reasons a website would need to be redesigned is the management system or technology may be out of date, the web designs are probably look old or outdated, website is not mobile friendly, not getting the result you are seeking for, or ..

  Devise an iterative method of generating valid configuration

The objective is to find a tour (i.e., permutation of the order in which the cities are visited) that is of minimal total length L. In this problem, the different possible tours are the configurations, and the total length of a tour is the cost fu..

  Update columns orderplaced subtotal shipping tax and totel

After a shopper completes an order, a procedure is called to update the following columns in the Basket table: orderplaced, subtotal, shipping, tax and total.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd