Create a cyber security profile for major information system

Assignment Help Management Information Sys
Reference no: EM131308670

Assignment

Overview - Every organization must create a cyber security profile (System Security Plan (SSP)) for all of its major and minor information systems. The cyber security profile documents the current and planned controls for the system and addresses security concerns that may affect the system's operating environment. The cyber security profile includes security categorizations, security controls, and is included in the certification and accreditation package. For this project, you will create a sample cyber security profile describing the security posture of your selected organization.

Learning Objective - After completing this project, students will be able to 1) explain security categorizations, 2) explain management, technical, and operational controls, 3) provide examples of management, technical, and operational controls, and 4) create a security profile.
Media - Students will use the Internet and Microsoft Word. Students will use the NIST website. Students will use their selected organization's information security program documentation. Students will use several NIST Special Publications.

Deliverable - Your sample cyber security profile should be at least three (3) full pages, double-spaced, 1-inch margins, New Times Roman 12-Pitch font, include a cover page (name, course number, date, title of paper) and a reference page. The cover page and reference page are not included in the three-page minimum. Papers not meeting the three full-page minimum will lose points. You must have at least three (3) sources, correctly formatted per APA guidelines. Submit your security profile the appropriate assignment area by the due date.

Detailed Description of Learning Activity

1. 2. Review the sample 800-53 System Security Plan template attached to this conference. This is a template an organization would use if it was doing a FULL security profile.

3. Select one management, one technical, and one operational control that applies to HHS (i.e., Risk Assessment - RA).

4. Describe each control. Include why these controls (and family controls) are required.

5. For each management, technical, and operational control, select two family controls (Vulnerability Scanning - RA-5).

6. Describe each family control, state the implementation status as it relates to HHS's security program, and describe how your selected organization implements the control.

7. Write your sample cyber security profile. At a minimum, the profile should include:

a.) An introduction that includes the purpose of your paper and introduces security profiles as they relate to your selected organization.
b) An analysis section that includes items 3, 4, 5, and 6 above
c) A conclusion that summarizes what you wrote

8. Use Spell and Grammar Checker before submitting. It is also a good idea to have someone else read your paper. You should also review the below grading rubric to ensure you have all the graded components.

9. Submit the project to the appropriate TurnItIn assignment area by the due date AND post a comment in the WebTycho assignment area stating you uploaded your assignment to TurnItIn.

10. Use the MANDATORY template for this assignment. You will earn zero points if you do not use the template.

Reference no: EM131308670

Questions Cloud

How should it change its target for the federal funds rate : Would you recommend borrowing from a bank at an 18 percent annual interest rate to take advantage of the cash discount offer? Explain your answer.
Consider the dilemmas hospitals face : For this discussion, consider the dilemmas hospitals face in treating the uninsured. Consider the following questions and post your response:
Most appropriate for an aggressive? investor : An investor is considering purchasing one of the following three stocks. Stock X has a market capitalization of ?$99 ?billion, pays a relatively high dividend with little increase in? earnings, and has a? P/E ratio of 1111. Stock Y has a market capit..
Source of funding for state emergency management offices : Who is usually in charge of developing and maintaining the community emergency plan?- Where does the emergency management office reside at the state level? Give three examples.
Create a cyber security profile for major information system : Every organization must create a cyber security profile (System Security Plan (SSP)) for all of its major and minor information systems.
Critical chain project management : Dave Armstrong has asked you to meet with him in his office. He continues to be concerned about the schedule. From a business perspective, he believes that this project will allow him to capture and hold 80% of the market but only if the project..
How do you think this attack impacted the us : Do you think that this attack should be considered a terrorist attack or an example of guerrilla warfare? Why?In your opinion, how do you think this attack impacted the United States' government? Explain.How do you think it impacted the general popul..
What is the incident command system : What kinds of things do volunteer organizations provide for victims in the aftermath of a disaster?- What is the Incident Command System, and why was it originally developed?
What is your profit? from these transactions : Last year you sold short 400 shares of stock selling at ?$74.39 per share. Six months later the stock had fallen to ?$38.62 per share. Over the? six-month period the company paid out two dividends of ?$2.05 per share. Your total commission cost for s..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Analyze types of organizational and computer architectures

Examine the major pros and major cons of each of the top three (3) software packages available. Recommend the virtualization software that you feel is most appropriate for the organization. Provide a rationale for your recommendation.

  Impact of information technology on business

Impact of information technology on business - What are your thoughts on how security and privacy will be controlled?

  Supply chain managementwhat are some of functional

supply chain managementwhat are some of functional strategies that affect the supply chain? meaning what functional

  Operations management improvement plan fast food burger

operations management improvement plan fast food burger chainhow do i start this paper what are the headings i can use?

  Summarize the key features of the hitech act

From the third e-Activity, analyze the primary manner in which EHR technology ensures improvement in the quality of patient care. Next, speculate on the overall impact that the health care information system standards have on the adoption of EHR t..

  Explain what you believe are three most important concerns

Explain what you believe are the three most important concerns when it comes to mobile devices in the workplace. Justify your response.

  Create a pert diagram that identifies the critical path

Analyze and develop project schedules with appropriate techniques and software tools. Prepare strategies to manage project resources to include human resources, capital equipment, and time.

  Analyze porters five forces model

Analyze Porter's Five Forces Model in relation to competition within the industry of That corporation

  Find a current article about emerging technologies

Write a 1-2 page paper discussing what professional organizations might you join, and websites might you visit, that would provide insight into a career that includes responsibility for IT project management.

  Important information about employee privacy

Important information about Employee Privacy - Under what circumstances would this be acceptable? When would it be unacceptable?

  Licensing proprietary technology to foreign

licensing proprietary technology to foreign competitorsdiscuss this statement licensing proprietary technology to

  Does it fit into our contemporary society

In this exercise you are to write a short paper (1-2 pages of text) analyzing the term "white collar crime." I am looking for a thorough analysis of how the meaning of this phrase has developed and changed through the years since it was first int..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd