Describe the rmf and how it relates to the cia concepts

Assignment Help Computer Network Security
Reference no: EM131749894

Question:

"Introduction to Information Security," of Elementary Information Security, you read about National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and how it expands on the CIA concepts.

Assume that a security model is needed for the protection of information in your class.

In a 1/2- to 1-page paper, describe the RMF and how it relates to the CIA concepts and expands on them. Explain how this framework is used to address the need to protect information in your class.

Verified Expert

?This solution describes the RMF and how it relates to the CIA concepts and expands on them. It explains how this framework is used to address the need to protect information in the class. ?

Reference no: EM131749894

Questions Cloud

Financial obligation to its employees : According to the reading, the company has a financial obligation to its employees. The issue of organizations having the ability to pay the employees
Opinion of the maryland court of appeals : Read the 2007 opinion of the Maryland Court of Appeals in the case of Barrie School v. Patch. Do you agree with the Court that this was a valid liquidated
Do you see evidence of growth strategies and new products : Describe the external environment variables (e.g., economic, technological, sociocultural etc) would affect your firm and its strategy? How?
Prepare a selling and administrative expense budget : Prepare a selling and administrative expense budget for November
Describe the rmf and how it relates to the cia concepts : Describe the RMF and how it relates to the CIA concepts and expands on them. Explain how this framework is used to address the need to protect information
Diversity of information systems to support : Healthcare organizations utilize a diversity of information systems to support and enhance the delivery of care to their patients.
Discuss implement an aggressive long-term strategy : Firm HR is about to implement an aggressive long-term strategy consisting of three phases. It is crucial to the success of the strategy that the IRS accepts
Draw a detailed decision tree for the given problem : Assume that the federal government just announced plans to build a new embassy in France, and is asking individuals in the architectural community to submit.
Create a secure environment for company data : You have been hired as a security specialist by a company to provide methods and recommendations to create a more secure environment for company data

Reviews

len1749894

12/4/2017 11:58:53 PM

In a 1/2- to 1-page paper, describe the RMF and how it relates to the CIA concepts and expands on them. Explain how this framework is used to address the need to protect information in your class. Submit your assignment using the Assignment Files tab.

Write a Review

Computer Network Security Questions & Answers

  Information security program for a midsized organization

The following paper describes the design of an information security program for a midsized organization of roughly 1000 local and remote employees.

  What is the mutual information

Consider a source X that has two symbols. - Find H(Y|X). -  Find H(Y). -  What is the mutual information I(X; Y)?

  Limited management abilities

Originally Linux/UNIX systems had one all-powerful user called root that managed systems and discuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems.

  Write a precis of construction engineering v hexyl pvt ltd

Write a precis of Construction Engineering (Aust) Pty Limited v Hexyl Pty Limited [1985] HCA 13; (1985) 155 CLR 541 and discuss how this case contributed to the law of partnership.

  Explain the general intent of a trojan horse

Explain the general intent of a Trojan horse.

  Benefits of an information system

Suppose monetary advantages of an information system of $50,000 the 1st year and increasing benefits of $5000a year of the next four years year 1=$50,000;

  Identify three current or future security issues in SDN

MN502 Overview of Network Security Assessment Title - Security Issues. The purpose of this assignment is to develop skills to independently think of innovation

  Compare tool for each of the three network management areas

Compare and contrast, at least, one tool for each of the three network management areas. What is the best tool for each area? Can one tool be used for managing more than one area? Why or why not?

  What is the definition of privacy as it relates to

1introduction to the management of information security?2.which trend in it has eliminated the we have technology

  Compute the mst or implement prims algorithm

You cannot use built in functions which directly compute the MST or implement Prim's algorithm - You can assume that the user would not make any error in entering the link cost matrix.

  Public key encryption

If you have access to public keys n and e, it is possible to reverse the public keys from them. One method is to factor the value of n to discover p and q,

  Communicate together securely

There are two offices in different locations that must communicate together securely.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd