Risk analyses conducted by the internal federal c&a team
Course:- Computer Networking
Reference No.:- EM13755954

Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Networking

With the completion of the threat, vulnerability, exposure, and risk analyses conducted by the internal federal C&A team, your chief technology officer (CTO) has asked that the team transition to the evaluation of the technical, management, and operational security controls involving those risk areas identified. The selection and implementation of the technical, management, and operational security controls in the C&A package are required to protect the availability, integrity, and confidentiality of the system and any information being exchanged. Your team must provide responses to the following concerns posed by the CTO.

Provide a report with responses to the CTO in a memo format, with responses of at least 1 page per concern:

• Provide a memo header (To, From, Subject, Date).
• Address the following concerns:

o Concern 1: The CTO does not understand the security controls that are needed to provide risk mitigation based on the current use of information and information systems when executing the mission of the organization and business.
o Concern 2: The CTO is confused with the current security control selection and implementation. Will there be a realistic security control implementation plan? Describe that plan.
o Concern 3: The CTO is concerned with the identified assurance levels (e.g., grounds for confidence). Some people in the organization doubt that the implemented security controls will be effective in their application.

• Provide a closure paragraph to the memo regarding the concerns above.

The memo should be a minimum of 3-5 pages in length (excluding the title page), and it should be neatly formatted. Post your document in your individual assignment upload area. Sources should be properly cited in APA style.

Put your comment

Ask Question & Get Answers from Experts
Browse some more (Computer Networking) Materials
What characteristics or issues would be pertinent or applicable for implementing this system? Be sure to discuss political, socio-economic, language, currency, educationa
DesignIT plans to relocate three servers already configured. DesignIT has requested the consideration of all interconnected devices and wiring, along with speeds, for best per
MN504 T3 2016 - Elastic Caching Explore by reviewing Typical Web Caching Techniques and Technologies and over Typical Web their strength and weakness and develop skills of cr
Compare and contrast the data communication technologies of guided media and unguided media. This should include transmission media, data link control protocols, and multip
Compare and contrast cat. 6 unshielded twisted pair (UTP), coaxial, and single mode fiber optic cabling types. Describe one or two of the advantages and/or disadvantages ass
What are all the protocol steps that take place, starting from powering on your PC to getting the web page? Assume there is nothing in our DNS or browser caches when you pow
Briefly explain how an integrity check value (ICV) may be used in network communication to detect errors - How the receiver checks whether the message has been transmitted wit
How will the second site factor into domain controller placement? How will AD sites be configured and how will AD organizational units be organized (considering how group poli