Cybersecurity profile

Assignment Help Computer Network Security
Reference no: EM13761764

Every organization must create a cybersecurity profile (system security plan (SSP)) for all of its major and minor information systems. The cybersecurity profile documents the current and planned controls for the system and addresses security concerns that may affect the system's operating environment. The cybersecurity profile includes security categorizations and security controls, and is included in the certification and accreditation package. For this project, you will create a sample cybersecurity profile describing the security posture of your selected organization.

  • Select and incorporate appropriate management, technical, and operational security controls into a system security plan.
  • Integrate and evaluate management, technical, and operational controls in the context of an information security program.
  • Develop a sample System Security Plan for an information system.

Deliverable

Your sample cybersecurity profile should be at least five full pages, double spaced, 1-inch margins, in New Times Roman 12-pitch font, with a cover page (name, course number, date, title of paper) and a reference page. The cover page and reference page are not included in the five-page minimum. Papers not meeting the five full-page minimum will lose points. You must have at least three sources, correctly formatted per APA guidelines. Submit your research paper to the appropriate TurnItIn assignment area by the due date.

Detailed Description of Learning Activity

Read NIST Special Publication 800-53 Rev 4 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, Building Effective Security Assessment Plans.

  1. Review the sample System Security Plan template in the Project Description area of the classroom.
  2. Select one management, one technical, and one operational control from the eighteen family controls that apply to your selected organization (i.e., AU - Audit and Accountability).
  3. Describe each family control. Include why these controls are required.
  4. For each family control, select two associated family identifiers (i.e., AU-3 Content of Audit Records).
  5. Describe each associated family identifier, describe the implementation status as it relates to your selected organization's security program, and describe how your selected organization implements the family identifer.
  6. Write your sample cybersecurity profile. At a minimum, the profile should include
  7. an Introduction that includes the purpose of your paper and introduces security profiles as they relate to your selected organization
  8. an Analysis section that includes Items 3-6 above
  9. a Conclusion that summarizes what you wrote

Reference no: EM13761764

Questions Cloud

Describe how employers can control labor costs : Describe how employers can control labor costs. Include in your response what might be some ot the affects from these control methods (either positive or negative)
Distinguish between global-expatriates-local nationals : Distinguish between global, expatriates, local nationals, and third country nationals. Select one and provide an example when it would be appropriate to use that type of resource and why.
Availability and portability vs. privacy : Analyze the evidence, arguments, and conclusions in your research that support your position.
Create naming conventions for each entity and attributes : Create naming conventions for each entity and attributes. Propose an efficient data structure that may hold the tour operator's data using a normalization process. Describe each step of the process that will enable you to have a 2nd Normal Form da..
Cybersecurity profile : Every organization must create a cybersecurity profile (system security plan (SSP)) for all of its major and minor information systems. The cybersecurity profile documents the current and planned controls for the system and addresses security conc..
Different types of budgets and techniques : You are a manager in a fictitious company of your choice. Your director has asked you to explain to the department staff the different types of budgets and techniques in order to provide an overall understanding.
What is the story socrates tells in this selection : What is the story Socrates tells in this selection? What is the story an allegory/analogy for according to Socrates? Be as detailed as you can in your answer.
A plan-based software engineering approach : Describe your approach in managing this project through both a Scrum-based approach and a plan-based software engineering approach.
Explicit policy of selling plant assets : Why would Acme have an explicit policy of selling plant assets before the temporary differences reversed in the deferred tax liability account?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Calculate the crc or fcs for the sender

The pattern or generator is P 1001. Calculate the CRC or FCS for the sender. You must give the details of this calculation.

  Select a research topic from the list below after selecting

cybersecurity research paperselect a research topic from the list below. after selecting your topic research the

  Des operating on a general plaintext input

DES operating on a general plaintext input 1st with key K1 and then with key K2 manufactures the same output as if K2 were first used and then K1.

  Sarbanes-oxley act

Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including: Sarbanes-Oxley Act

  Which of the following acts have made it a crime to break

question 1the computer fraud and abuse act of 1986 prohibits .answer threatening to damage computer systems in order to

  Commutative and ecb mode

Give an example to show that the group of permutations S5 is not commutative and ECB mode with block length 3 and the permutation cipher for the given operation

  Explain hardware and software used to support personal

Write 700-1050 word paper explaining hardware and software used to support personal, workgroup, and enterprise computing within current organization, an organization.

  Biggest new technology

Question 1: What are some problems with not adding data integrity for your input strings? Example: If you are asking for an amount and when you can put in a letter. Question 2: What is one security issue that can take place with an interface? Expla..

  Assessment of the risks associated with collection

Identify and provide an assessment of the risks associated with collection, processing, and storage of confidential client information (loss of confidentiality).

  Assignment on network security policy plan

Research and discuss the items that you would place in such a plan, and justify your reasoning for the items that you have decided to include.

  Beat the hacker

A honeypot can be a useful for discovering some of the hacking trends occurring within an organization. Of course, there have to be certain measures placed upon its operation, maintenance

  Recovering scrambled bits

Determine the legal and ethical considerations for investigating and prosecuting digital crimes and analyse data on storage media and various file systems

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd