Risk analyses conducted by the internal federal c&a team
Course:- Computer Networking
Reference No.:- EM13755954

Assignment Help
Assignment Help >> Computer Networking

With the completion of the threat, vulnerability, exposure, and risk analyses conducted by the internal federal C&A team, your chief technology officer (CTO) has asked that the team transition to the evaluation of the technical, management, and operational security controls involving those risk areas identified. The selection and implementation of the technical, management, and operational security controls in the C&A package are required to protect the availability, integrity, and confidentiality of the system and any information being exchanged. Your team must provide responses to the following concerns posed by the CTO.

Provide a report with responses to the CTO in a memo format, with responses of at least 1 page per concern:

• Provide a memo header (To, From, Subject, Date).
• Address the following concerns:

o Concern 1: The CTO does not understand the security controls that are needed to provide risk mitigation based on the current use of information and information systems when executing the mission of the organization and business.
o Concern 2: The CTO is confused with the current security control selection and implementation. Will there be a realistic security control implementation plan? Describe that plan.
o Concern 3: The CTO is concerned with the identified assurance levels (e.g., grounds for confidence). Some people in the organization doubt that the implemented security controls will be effective in their application.

• Provide a closure paragraph to the memo regarding the concerns above.

The memo should be a minimum of 3-5 pages in length (excluding the title page), and it should be neatly formatted. Post your document in your individual assignment upload area. Sources should be properly cited in APA style.

Put your comment

Ask Question & Get Answers from Experts
Browse some more (Computer Networking) Materials
COIT20261 Network Routing and Switching -  What is the full (expanded) address of the abbreviated IPv6 address FDEC::CF:0:FFFF - Identify the destination port number.
How will Forest Functional Levels be implemented? How will cross-forest trusts be implemented? How will replication be handled? Read-Only Domain Controlle
Determine the smallest size subnet which can be utilized to fulfil this requirement? _______. Determine the maximum number of IP addresses which can be assigned in this size
For discussion, noting the extent to which we are connected to the internet, at home, while in class, even in flight, what is your approach to protecting your privacy when o
Create a list of messages that you think would be necessary during server-client and client-client interactions. Do not rely on the implicit acknowledgement of Transmission
Let RTP session consisting of four users, all of which are sending and receiving packets to same multicast address. How much RTCP bandwidth will each receiver be allocated?
discuss about the OSI layers in detail.and describe typical attacks in that layer and the controls that are employed in the layer to minimize the attack or vulnerability that
Discuss the two type styles of typography, explaining how their differences effect your presentation within a webpage, and how you might use each to achieve your objectives.