Describe testing procedure that will mitigate vulnerability

Assignment Help Management Information Sys
Reference no: EM131506049

Security Assessment for an enterprise must be incorporated into the Software Development Life Cycle (SDLC) in order to be a secure, integrated process.

Testing of selected security controls ensures that applications meet business requirements, function as planned, and protect associated data securely from attack.

A security assessment of the targeted environment identifies vulnerabilities that may cause a security breach and specifies the security controls that mitigate the vulnerabilities. Refer to NIST SP 800-53 rev 4 for identification of the eighteen candidate security control families and associated security controls.

Choose five distinct security control families as specified in SP 800-53 rev 4, click on the chosen familites, and create a spreadsheet that identifies the following criteria for each family:

Control ID

Control Name

Vulnerability

Provide a short paragraph for each family describing the testing procedure that will mitigate the vulnerability.

Example:

Family - Identification and Authentication

Control ID - IA-2

Control Name - Identification and Authentication (Organizational Users)

Vulnerability - Illegal user access

Reference no: EM131506049

Questions Cloud

Summarize the research on animal cognition : Summarize the research on animal cognition, including short and long term memory, language, and reasoning
Draw an initial context-level data-flow diagram : What people or other information systems will provide data inputs to your information system? List a few.Draw an initial context-level Data-Flow Diagram.
Which design alternative do you recommend : In the design of a special-use structure, two mutually exclusive alternatives are under consideration. These design alternatives are as follows.
Explain how primates developed such big brains : There are three explanations posited to explain how primates developed such big brains
Describe testing procedure that will mitigate vulnerability : Provide a short paragraph for each family describing the testing procedure that will mitigate the vulnerability.
Demographic factors in the collection of crime data : Find statistics for this crime in your hometown (Tampa Florida) and in one other city of similar population size
Which chilling system should be recommended : Two mutually exclusive alternatives for office building refrigeration and air conditioning are being investigated.
Identify the internal and external processes : Identify the internal and external processes used by auditors for your chosen organization.
What is metacognition : What is metacognition? What role does it play in middle childhood? How would each theorist explain why a 10-year-old child might steal a toy from a store

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd