Risk analyses conducted by the internal federal c&a team
Course:- Computer Networking
Reference No.:- EM13755954

Assignment Help
Assignment Help >> Computer Networking

With the completion of the threat, vulnerability, exposure, and risk analyses conducted by the internal federal C&A team, your chief technology officer (CTO) has asked that the team transition to the evaluation of the technical, management, and operational security controls involving those risk areas identified. The selection and implementation of the technical, management, and operational security controls in the C&A package are required to protect the availability, integrity, and confidentiality of the system and any information being exchanged. Your team must provide responses to the following concerns posed by the CTO.

Provide a report with responses to the CTO in a memo format, with responses of at least 1 page per concern:

• Provide a memo header (To, From, Subject, Date).
• Address the following concerns:

o Concern 1: The CTO does not understand the security controls that are needed to provide risk mitigation based on the current use of information and information systems when executing the mission of the organization and business.
o Concern 2: The CTO is confused with the current security control selection and implementation. Will there be a realistic security control implementation plan? Describe that plan.
o Concern 3: The CTO is concerned with the identified assurance levels (e.g., grounds for confidence). Some people in the organization doubt that the implemented security controls will be effective in their application.

• Provide a closure paragraph to the memo regarding the concerns above.

The memo should be a minimum of 3-5 pages in length (excluding the title page), and it should be neatly formatted. Post your document in your individual assignment upload area. Sources should be properly cited in APA style.

Put your comment

Ask Question & Get Answers from Experts
Browse some more (Computer Networking) Materials
What are the costs of thin client versus thick client architectures? Search the Web for at least two different studies and be sure to report your sources. What are the likel
Your manager has tasked you to create two network diagrams that illustrate the Remote Employee Connection options for VPN connectivity. These diagrams will assist IT in sett
Wireless DSL is available in her apartment building for $45 per month for 1.5 Mbps down and 256 Kbps up. Explain the differences in these services and make a recommendati
Corporation is expanding from single physical location to three physical locations distributed across county to better serve the requirements of their customers.
NET202 Assignment: Network Programming. Build a chat programme using socket level programming. This can be done at various levels of sophistication and the marks available at
Arrival at time t = 1, length 3; arrival at t = 2, length 1. Buffer 3: arrival at time t = 3, length 5. You need to find out the finish tag, order of transmissi
Question 1: How many people are in your network? Question 2: Do you have strategic connections across industries? Question 3: Do you know people at different stages in their c
The business acquisition is largely superficial and the existing personnel structures will remain in place. You have to bring the "Wild Frontier" under the "Foghorn Leghorn"