Role of ethics in developing the certification package

Assignment Help Computer Network Security
Reference no: EM13755998

The development of the C&A package will be a critical responsibility for the internal federal C&A team. The initiation of the C&A project, analyzing research, preparing the required documents, verifying information, and retaining ethics are all important responsibilities during the development of the C&A package.

In a report of 3-5 pages, provide an explanation of this C&A developmental process. The report should include the following:

• Title page
• Introduction to the paper
• Explanation of what is required to initiate the C&A project, examples of which include the following:

o Creating a contact list
o Holding a kick-off meeting
o Obtaining any existing agency guidelines

• Explanation of the types of research that need to be analyzed, examples of which include the following:

o Documents from the information system developers and administrators
o Previous certification package

• Description of how to represent the required documentation and requirements in the certification package
• Description of the role of ethics in developing the certification package

o An example of an ethics issue: the IS owner wants the certification review team to get the IS certified; therefore, it may be requested for you to compromise your ethics.

• Reference page in APA format

The following documents can be used to assist you with this assignment:

• DOE CIO Guide 205.1-1, Management, Operational, and Technical Controls
• 5 CFR 930, Employees Responsible for the Management of Use of Federal Computer Systems
• The National Institute of Standards and Technology (NIST) special Publication 800-16, Information Technology Security Training Requirements: A Role- and Performance-Based Model, dated April 1998
• Executive Order 13103, Computer Software Piracy, dated September 30, 1998, that requires training on the prevention of software piracy

Reference no: EM13755998

Questions Cloud

Companys current organizational model : Your boss has called you in to tell you that they plan on buying out this firm and integrating their business, and he needs you to develop the internal executive proposal that outlines a plan for integrating the smaller company into your current c..
Differences in how each theory addresses ethics and morality : A description of the differences in how each theory addresses ethics and morality
How mergers and acquisitions have affected the way : Review the following examples of how mergers and acquisitions have affected the way in which companies do business.
Analyze the economic impact of major social problems : Analyze the economic impact of major social problems and issues such as poverty, discrimination, crime, income distribution, the role of government, and other major issues.
Role of ethics in developing the certification package : Description of the role of ethics in developing the certification package and Description of how to represent the required documentation and requirements in the certification package
Compute trend analysis for net revenue and net income : Compute trend analysis for net revenue and net income - Which grew faster during the period, net revenue or net income?
Was the american civil war an inevitable event : In antebellum America, there was a great deal of social and political conflict. What were these conflicts? Was the American Civil War an inevitable event?
Creating an er diagram : Creating an ER diagram, Listing the functional dependencies, confirming that the database is in at least 4NF, Using SQL commands to create the and populate the database (there do not need to be many rows)
Identification of preventative controls : Identification of preventative controls and the development of recovery strategies and Explanation of the information technology (IT) contingency planning process to include an understanding of the required business impact analysis

Reviews

Write a Review

Computer Network Security Questions & Answers

  Define encryption

In a given encryption system where the messages are expressed only as numbers and "e" is an integer.

  Famous financial corporation

Your submission should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insight relating directly to the topic. Your response should reflect scholarly writing and APA stan..

  Analyze the impact of security breaches

1. you need to select a particular security breach that happened in the recent past. You need to search the Internet to find a security breach that you can analyze. Once you select a particular security breach to work on, other students cannot ..

  Why is the authentication header mode ipsec incompatible

Design and explain any issues or problems - Why is the authentication header (AH) mode of IPSec incompatible with network address translation schemes

  Cryptography and network security

CS 470: Cryptography and Network Security,  Compare the RSA and EIGamal signature schemes' performance in terms of efficiency of the verification operation, ability to pre-compute most of the signature operation in advance.

  Find out the security risks with respect to phishing

mobile banking features have added several advantages for customers however there are security risks that come with

  Primary steps to database design

We explored the 2-primary steps to database design - conceptual design and physical design. We discussed importance of having representatives from all key stakeholders in conceptual design to ensure accuracy of the design.

  How to demonstrate that the server is up and running

You have been asked to install an SVN repository on a server. The SVN will be remotely accessed using the svnserve daemon that is supplied with SVN (please note that this is not the most secure way to access an SVN repository)

  Identifying and discussing technological improvements

Identify the type of breach and identify and explain how the breach occurred (or suspicions by authorities as to how it may have occurred)

  Describe why important to secure windows-unix from servers

Describe why you recommend it is so important to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities.

  Calculate an rsa signature on a long message

Would it be reasonable to compute an RSA signature on a long message by ?rst computing what the message equals mod n, for some ?xed n and then signing this computed value only. Why or why not?

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd