Risk analyses conducted by the internal federal c&a team
Course:- Computer Networking
Reference No.:- EM13755954

Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Networking

With the completion of the threat, vulnerability, exposure, and risk analyses conducted by the internal federal C&A team, your chief technology officer (CTO) has asked that the team transition to the evaluation of the technical, management, and operational security controls involving those risk areas identified. The selection and implementation of the technical, management, and operational security controls in the C&A package are required to protect the availability, integrity, and confidentiality of the system and any information being exchanged. Your team must provide responses to the following concerns posed by the CTO.

Provide a report with responses to the CTO in a memo format, with responses of at least 1 page per concern:

• Provide a memo header (To, From, Subject, Date).
• Address the following concerns:

o Concern 1: The CTO does not understand the security controls that are needed to provide risk mitigation based on the current use of information and information systems when executing the mission of the organization and business.
o Concern 2: The CTO is confused with the current security control selection and implementation. Will there be a realistic security control implementation plan? Describe that plan.
o Concern 3: The CTO is concerned with the identified assurance levels (e.g., grounds for confidence). Some people in the organization doubt that the implemented security controls will be effective in their application.

• Provide a closure paragraph to the memo regarding the concerns above.

The memo should be a minimum of 3-5 pages in length (excluding the title page), and it should be neatly formatted. Post your document in your individual assignment upload area. Sources should be properly cited in APA style.

Put your comment

Ask Question & Get Answers from Experts
Browse some more (Computer Networking) Materials
An omega switching network connects 4096 RISC CPUs, each with a 60-nsec cycle time, to 4096 infinitely fast memory modules. How many delay slots are needed by a LOAD instruc
Write down a one-page proposal of how this company can handle SNMP from corporate location. Write details on versions, basic operations, and MIBs.
List down all the questions that you will put forward to your client "First Financials" to understand their requirements and needs in terms of hardware, software, bandwidth
Access control is handled at ____ layer during routing processrouter consults a list of rules before forwarding incoming packet to determine whether a packet meeting certai
You are the Network Manager for a large bank. You have been asked to investigate having employees connect using wireless and not cables.
Assume nodes A and Bare on the same 10 Mbps Ethernet bus, and the propagation delay between the two nodes is 325 bit times. The answer is no, if B 's signal reaches A before b
Based on the Takahashi et al. (2007) article, what characteristic of a mesh network is important to the experiment? What are the pros and cons of employing this emergency co
Try to devise a technique that will allow Arnold to establish a TCP connection with Bernard without application-specific NAT configuration. If you have difficulty devising