Risk analyses conducted by the internal federal c&a team
Course:- Computer Networking
Reference No.:- EM13755954

Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Networking

With the completion of the threat, vulnerability, exposure, and risk analyses conducted by the internal federal C&A team, your chief technology officer (CTO) has asked that the team transition to the evaluation of the technical, management, and operational security controls involving those risk areas identified. The selection and implementation of the technical, management, and operational security controls in the C&A package are required to protect the availability, integrity, and confidentiality of the system and any information being exchanged. Your team must provide responses to the following concerns posed by the CTO.

Provide a report with responses to the CTO in a memo format, with responses of at least 1 page per concern:

• Provide a memo header (To, From, Subject, Date).
• Address the following concerns:

o Concern 1: The CTO does not understand the security controls that are needed to provide risk mitigation based on the current use of information and information systems when executing the mission of the organization and business.
o Concern 2: The CTO is confused with the current security control selection and implementation. Will there be a realistic security control implementation plan? Describe that plan.
o Concern 3: The CTO is concerned with the identified assurance levels (e.g., grounds for confidence). Some people in the organization doubt that the implemented security controls will be effective in their application.

• Provide a closure paragraph to the memo regarding the concerns above.

The memo should be a minimum of 3-5 pages in length (excluding the title page), and it should be neatly formatted. Post your document in your individual assignment upload area. Sources should be properly cited in APA style.

Put your comment

Ask Question & Get Answers from Experts
Browse some more (Computer Networking) Materials
Consider a TCP connection between Host A and Host B. Suppose that the TCP segments traveling from Host A to Host B have source port number x and the destination port number
Each register window has 32 registers, of which 10 are global variables and 10 are local variables. How many registers would be available for use by input parameters?
nclude both the Requires interface and the Provides interface in your design. Develop a visual rendering depicting your design through the use of Microsoft Visio or its open s
Explain the basic components and media of network systems and summarize current networking standards and how standards bodies and the standardization process impact networking
You have been asked by Redline Motors & Equipment, a local motor and performance parts company, to install a network in its new office. The corporate office use to be locate
Using MS Word, write a three-page summary describing a successful penetration test. What penetration tools and techniques do you feel would be needed in a successful penetra
Why does HTTP at the application layer uses TCP while DNS uses UDP when it passes its message packet with overhead to the Transport Layer and then hand it off to the Network
Its primary purpose is to determine the configuration of devices and to allow different network-layer protocols to learn about each other. Using deductive reasoning, provide