Choose appropriate security controls

Assignment Help Computer Network Security
Reference no: EM13808836

Choose appropriate security controls from the SAN's 20 critical security controls and choose the remainder of controls that are needed to secure this system from the listing of controls provided from NIST 800-53 rev 4 (see webliography). You will select a total of 10 security controls. List the control by type, mapping them as best as you can to the NIST Control Families (i.e. PE-3, etc. and provide a one sentence description of the function of this control). NOTE: You will address each control in the 20 critical security controls document and determine whether or not the control is appropriate to security the system in the scenario. You will provide a sentence or two on why or why not it should be selected. The 20 critical security controls must be addressed for the scenario but not necessarily selected for the scenario. The rest of the 10 controls you will select can be chosen from the NIST SP 800-53, Rev. 4 controls, from the Access Controls Family (I've provided a list, below, however you will review each of the controls in the document provided in Course Content). For example, if you choose two of the twenty SANS controls, you will select eight of the Access controls for a total of ten controls.

Reference no: EM13808836

Questions Cloud

World of business management : Spend some time doing some research and identify someone who might be considered an "icon" of leadership. Your choice does not have to be limited to the world of business management.
Why communication can be affect by culture and relationships : Explain how and why communication can be affected by the following: Culture and Relationships.
Identify three common challenges in managing data : Identify three common challenges in managing data, and describe one way organizations can address each challenge using data governance
Patterns in making government work : Patterns in Making Government Work
Choose appropriate security controls : Choose appropriate security controls from the SAN's 20 critical security controls and choose the remainder of controls that are needed to secure this system from the listing of controls provided from NIST 800-53 rev 4
Public administrators should be restricted to laid down rule : public administrators should be restricted to only laid down rules in the discharge of their duties as espoused by Max Weber or should they have some amount of discretion. Provide the likely benefits and disadvantages of each scenario and use exam..
Multiple regression to forecast demand of its product : How would a manufacturing company use multiple regression to forecast demand of its product? Give one detailed example
Discuss the importance of the advancements to its success : discuss the importance of these advancements to its success as a mode of storytelling. How might it have been told differently, for better or worse, without these technological advancements?
Eliminate trade restrictions and encourage free trade : Why would a country eliminate trade restrictions and encourage free trade? Using the European Union as an example, identify key changes that took place to encourage free trade.

Reviews

Write a Review

Computer Network Security Questions & Answers

  How to identify udp socket and how to identify a tcp socket

How to identify a UDP socket and how to identify a TCP socket - Compare two pipelining protocols shown in the textbook

  Define cybercrimes and computer security

Evaluate how teamwork and leadership are effective tools for financial forensic investigations. Provide support for your evaluation.

  How can the trusted boot functions prevent the unauthorized

Why would IBM be an advocate for open standards? Why would it change its proprietary ESS 1.0 chip—which it had already sold in some ofits PL300 desktops and T23 ThinkPad notebooks,and which it had paid a Common Criteria Testing Laboratory to evaluate..

  Identify the critical business functions

Identify the Critical Business Functions (CBFs) a midsized organization would need to restore after a catastrophic failure occurs, and suggest the ways the organization would determine the order in which it restores its CBFs.

  What percentage of the modules exceed the structure

Examine the product quality from the point of view of the customer and what percentage of the modules exceed the structure / architecture guidelines?

  Illustrate that signature verification will succeed

If Bob receives M and S, describe process Bob will use to verify signature. Illustrate that in this case signature verification will succeed.

  Find out the security risks with respect to phishing

mobile banking features have added several advantages for customers however there are security risks that come with

  How system with capabilities as its access control mechanism

In general, do capabilities offer more or less protection against Trojan horses than do access control lists? Justify your answer in light of the theoretical equivalence of ACLs and C-Lists.

  Network risk assessment

The key to this assignment is to demonstrate your understanding of the topics for the course, not to re-word the text or reference material. Please see Appendix A for the grading rubric on all written assignments.

  Explain the purpose of the law

Also, don't forget to keep up with references to include on the powerpoint. note: I'm a member in group of the persons .My part is 6 slides.So. the slides must just have info about the topic . could you please help me with that ?

  Assignment on data warehouses and network infrastructure

Imagine that you are an IT organizational leader in a mid-sized company. Comprise a justifiable argument for the use of data warehouses, data centers, and data marts in order to support for business intelligence (BI) within the organizational stru..

  Access control models

Compare and contrast access control models. Select an access control model that best prevents unauthorized access for each of the five scenarios given below

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd