Identify and prioritize it security controls

Assignment Help Management Information Sys
Reference no: EM13751229

Case Study-Identify Requirements

Instructions

Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization

Step 1: Review the selected case study and describe at least10 issues related to security, interoperability, and operations.

Step 2: Prioritize and articulate the selected requirements based on immediate need, security posture, complexity, resource availability, and cost.

Step 3: Identify at least 4 applicable government regulations/ standards that govern how the requirements must be met, implemented, or measured. Provide rationale for why these are applicable.

Step 4: Using NIST Special Publication 800-53 select at least 4 security controls that relate to these issues and describe how these controls enhance the security posture or facilitates the secure implementation of these requirements.

Reference no: EM13751229

Questions Cloud

Importance of internal controls in general : As the new accounting manager for a water district, you have been asked to evaluate the internal controls utilized by your new employer. You find that the following controls are in place. Please define and explain the importance of internal cont..
True about a partnership : 1. The ability of one partner to enter into a contract binding all other partners is termed:
Discusses the role of the leaders in this case study : Case Study: A System Approach, Review the case study in the article, Texas Health Harris Methodist-Cleburne: A System Approach to Surgical Improvement. Discusses the role of the leaders in this case study
Cost of capital for analyzing capital expenditures : Would you recommend that ExxonMobil use a single company- wide cost of capital for analyzing capital expenditures in all its business units? Why or why not?
Identify and prioritize it security controls : Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization
Discuss internal technical risks and legal risks : Different firms utilize various approaches to categorizing risks. For our purposes, we will use the following risk categories: External - Predictable Risks, Internal Non-Technical Risks, Internal Technical Risks, and Legal Risks.
Create table that shows various required hardware components : Case Study - Director's Requirements", Create a table that shows the various required hardware components. The table should have all the necessary columns, rows, and column headings to show the following
Call premium of the bond : Consider a bond with a 5.2 percent coupon rate and a yield to call of 6.1 percent. The bond currently sells for $1,086. If the bond is callable in 5 years, what is the call premium of the bond?
Industry-economy environment-future outlook : Provide an in-depth look into your business. Use the language of business to give detail of your industry, economy environment, future outlook and unique selling advantage. Talk about your product or services and the demographic you wish to market..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe some of the possible risks to store security system

You will be creating a proposed security policy for the online grocery store that you selected. Describe some of the possible risks to the store's security system

  Corporate liabilityargue for or against the following

corporate liabilityargue for or against the following statementcompanies should not be held liable for losses sustained

  Benefits of computers without risking harms to social good

In what ways do these enhanced capacities have the potential to benefit and harm the social good?

  Supply management chains

Supply Management Chains - Explain possible situations where leagility has maximum benefit for the organization.

  Sdlc methodology vs pure prototyping methodologyshow why an

sdlc methodology vs. pure prototyping methodologyshow why an application might be built using prototyping as part of

  Explain about a service-oriented architecture

Question about information systems management - Explain about a Service-Oriented Architecture (SOA)? How is SOA an improvement on older architectures? Explain how SOA relates to web services

  Operational and supply chain management

Operational and Supply Chain Management - Why are companies interested in operational management today

  Describe the flow of materials to organization

Compare and contrast these practices with other supply chain practices, both domestic and global and check the existing supply chain management processes within your organization or an organization with which you are familiar.

  Explain the process within public key systems

Role of Technology, etc. and Explain the process within public key systems if you want to support non-repudiation and securing the message.

  What is an enterprise system and what does it do

What is an enterprise system and what does it do and What are some of the advantages and disadvantages to implementing an enterprise system

  Concerning privacy the united statesa provides a great deal

concerning privacy the united statesa. provides a great deal of legislation that purports to offer some privacy

  Design systems that apply common sense in business problem

Do you think that Artificial Intelligence (AI) scientists will ever be able to design systems that apply common sense in business problem solving? Why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd