The weakest areas of the cyber security policy

Assignment Help Computer Network Security
Reference no: EM13769912

1. Is the organization you selected for the learning portfolio FIPS 200 compliant? Why or why not?
(My organization wasU.S Department of Health and Human Services)

2. From a FIPS 200 perspective, what are the weakest areas of the cyber security policy associated with the organization you selected? Discuss at least two weak areas and describe why.

3. If you were the Federal CIO what would you do about organizations that are not FIPS 200 compliant? Why?

Reference no: EM13769912

Questions Cloud

Describe the three principles of direct manipulation : Describe the three (3) principles of direct manipulation and give examples as to how they are used in video game controls. Analyze video game-type interfaces and discuss three (3) reasons why video game-type interfaces would not be effective for re..
Therapy that identifies and replaces thoughts : Shemp feels sad because people do not think he is as good a comedian as Moe. In talking to his therapist, Shemp discovers that his belief that everyone should adore him is self-defeating. Therapy that identifies and replaces such thoughts is most lik..
Component of strategic management process : Describe at least five issues that may require a management policy as a component of its strategic management process
How we understand distinct characterizations of dionysus : How might we understand the very distinct characterizations of Dionysus in Bacchae and Frogs as portraits of the same god?
The weakest areas of the cyber security policy : From a FIPS 200 perspective, what are the weakest areas of the cyber security policy associated with the organization you selected? Discuss at least two weak areas and describe why.
Keys to success in multinational companies : It is widely known that Knowledge Management Systems are the key to success in multinational companies. Imagine that you are a Vice President of a company that is ramping up to go global.
Create a change-management plan : Create a change-management plan. Put yourself in the position of a consultant making recommendations to the CEO of the organization
What are some advantages and disadvantages of internet : What are some advantages and disadvantages of internet based experiments? In what type of situation would internet experiments be preferred to laboratory experiments? In what type of situations would laboratory experiments be preferred to internet ex..
Define the web server on the dmz : Around the same time these meetings were occurring, one network administrator at the company noticed anomalous traffic on port 80 of the Web Server on the DMZ. The edge router's logs showed that the traffic started six months ago and ended five mo..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Geen computing is the study and practice of ecofriendly

1 green computing is the study and practice of ecofriendly computing resources. green computing is often seen

  Leaders and managers

One of business' contemporary rules states that organizations should move away from some top leaders and many managers to leaders at every level and few managers.

  Differentiate business continuity-disaster recovery planning

Business Continuity (BC) planning and Disaster Recovery (DR) planning are main elements in organizational security architectures. Write down the difference between them.

  Design the layout of users

The topology diagram for the different servers and locations and trust domains. For example, where is the firewalls, and where are the users located in the topology.

  In what aspects could the tool be improved

What is the functionality of the tool and what is the actual running environment (software and hardware) of the tool?

  Nmap application and how it can be used

Write a one papge paper APA FORMAT about NMAP application and how it can be used to find vulnerabilities

  Identify and explain how the breach occurred

Identify the type of breach and identify and explain how the breach occurred (or suspicions by authorities as to how it may have occurred)

  Securing several desktop computers connected to network

Securing numerous desktop computers connected to the network. Explain the access control that you would put in place for each and explain why.

  For this application you will determine how your computer

for this application you will determine how your computer is connected through a network. you do not have to actually

  Identify and prioritize it security controls

Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization

  Case study - personal computer security threats

Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack.

  Financial organization managing routine administrative

An organization managing public information on its Web server and a law enforcement organization managing extremely sensitive investigative information.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd