Describe security architecture

Assignment Help Management Information Sys
Reference no: EM132137776

Answer the following Questions:

1. The official definition used by the US Government, as defined in the Federal Information Security Act (FISA), is "protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality, and availability."

(True/False)

2. The term information assurance, is defined as follows in NIST IR 72980 Revision 2, Glossary of Key Information Security Terms: Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.

(True/False)

3. Describe CIA and when you are considered secured.

4. Which CISSP domain according to your session materials highlights intrusion detection and prevention systems?

5. According to your session materials the Cybersecurity Act (the Act) was enacted on December 18, 2015, and includes a requirement for Federal Inspectors General to generate a report describing agency policies, procedures, and practices for covered systems. List three items the Act requires the report to include:

6. According to your session materials which CISSP domain includes "Security Control Testing?"

7. According to your session material describe the difference between standards, guidelines, and procedures.

8. According to your session materials, organizational risk mitigation strategies reflect a(n) ______________ perspective on what mitigations are to be employed and where the mitigations are to be applied, to reduce information security risks to organizational operations and assets, the Nation, other organizations, and individuals.

9. According to your session materials, risk is a measure of the extent to which an entity is threatened by a potential circumstance or event. What are the two related functions?

10. Describe the four steps in the risk assessment process according to your session materials.

11. According to your session materials, a ________________________ is a management, operational, and/or technical control employed by an organization in lieu of a recommended security control in the low, moderate, or high baselines that provides equivalent or comparable protection for an information system

12. According to one of the class OERs the purpose of the system security plan is to provide detailed security requirements of the system and describe the controls in place or planned for meeting those requirements.

(True/False)

13. What are the steps in a detailed or formal risk analysis according to our session materials?

14. The information flow model is an extension of the state machine concept and serves as the basis of design for both the Biba and Bell-LaPadula models.

(True/False)

15. Describe Defense in Depth according to the materials in session 3.

16. Describe Security Architecture according to your session materials.

17. Describe Business Continuity Planning according to your session materials.

18. Describe COBIT and what it is used for according to your session materials.

19. According to our session materials, which US president described cybersecurity as one of the most important challenges we face as a Nation?

20. According to your session materials how long should your individual risk research paper/project be?

Reference no: EM132137776

Questions Cloud

Calculate the relative proportion of seismic forces : Calculate the base shear V for the structure - Calculate the relative proportion of seismic forces, hence shears and moments to each of the walls
Calculate the real interest rate in singapore : Suppose in Singapore the velocity of money is constant, real GDP grows by 7% per year, the stock on money grows by 10% per year, and the nominal interest rate.
Defines an equivalence relation : Mathematics- Algebraic Geometry Problem - Let K denotes an algebraically closed field - Show that defines an equivalence relation on A2\{0}
What is the consumer surplus : Suppose that a student would go to 1 Blue Jays game if the price were $120, 2 Blue Jays games if the price were $80, 3 Blue Jays games if the price were $50.
Describe security architecture : Which CISSP domain according to your session materials highlights intrusion detection and prevention systems?
Determine effect of increase in total factor productivity : Suppose that the substitution effect of an increase in the wage is always larger than the income effect. Suppose the economy is on the low tax side.
Malware can effect a mac computer : What are some ways malware can effect a mac computer? Can they be prevented?
What is unified threat management : What is Unified Threat Management (UTM) and the services it combines into one device. Does UTM holds true to the principle of defense-in-depth
What is sunny valley market share : Suppose that there are only three types of fruit sold in the United States. Annual sales are 1,200,000 tons of blueberries, 5,400,000 tons of strawberries.

Reviews

Write a Review

Management Information Sys Questions & Answers

  What is the supply chain-wide technology strategy

What is the supply chain-wide technology strategy that supports multiple levels of decision making and describe the clear view of the flow of products, services, and information.

  How organizations develop confidence in security of network

How can organizations develop confidence in the security of their networked systems when they have the capability to open their systems to almost any network?

  Discuss salient manner in which you will leverage lessons

Summarize this course in just one (1) sentence or two (2) so that someone thinking about taking the course in the future would understand what it is all about.

  Question about strategic supply chain management

Question about Strategic Supply Chain Management - Show the competing and conflicting objectives of these parties.

  What would you say to this student to try to convince him

You are talking with another student who is complaining about having to learn the systems development life cycle because he or she is not going to work in an IT department. Would you agree with this student?What would you say to this student to t..

  Discuss the impact of telecommunications in todays business

Discuss telecommunications and distributed connectivity systems as used by local and global teams.

  Functionality and efficiency of the complaint-push model

Compare and contrast the functionality and efficiency of the complaint-push model and data-pull model within the process of health care service delivery

  Addressing the disadvantages of waterfall modelthe

addressing the disadvantages of waterfall modelthe waterfall model has some disadvantages. it only incorporates

  How does this change in a personal and small-office

Organizations need to be careful about their wireless transmissions and controlling the reception of the wireless signal. Discuss ways that organizations can control the transmission and reception of wireless signals. Assess the security and the ..

  Would you pay more for a fair trade smartphone or laptop

Should Companies Reveal Which Products They Manufacture Using Fair Trade Practices?Would you pay more for a fair trade smartphone or laptop?

  Create a data warehouse conceptual design using star schema

CSE5DWD – Data Warehouse Concepts and Design - create a Data Warehouse conceptual design using Star Schema Modelling

  Articles to the evolution of e-commerce

Primary sources such as government websites (United States Department of Labor - Bureau of Labor Statistics, United States Census Bureau, The World Bank), peer reviewed and scholarly journals in EBSCOhost (Grantham University Online Library) and G..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd