Identify and prioritize it security controls

Assignment Help Computer Network Security
Reference no: EM13758932

Bank Solutions Inc. - Bank Solutions - Project 2 NIST

Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization (The organization is from Project 1)

Step 1: Review the selected case study and describe at least10 issues related to security, interoperability, and operations.

Step 2: Prioritize and articulate the selected requirements based on immediate need, security posture, complexity, resource availability, and cost.

Step 3: Identify at least 4 applicable government regulations/ standards that govern how the requirements must be met, implemented, or measured. Provide rationale for why these are applicable.

Step 4: Using NIST Special Publication 800-53 select at least 4 security controls that relate to these issues and describe how these controls enhance the security posture or facilitates the secure implementation of these requirements.

Step 5.The deliverable for this assignment is a minimum 5 page, double-spaced paper using Times New Roman 12 font and APA style format. It will also include a minimum of 5 references. The Title/Cover page, illustrations (tables/charts/graphs), or references are not part of the page count but required.. Also the grading rubric can provide more details to include in the paper. The instructor may provide an APA style template to use for this paper.

Reference no: EM13758932

Questions Cloud

What do you want to do with business management degree : What do you want to do with business management degree and how will it help you impact others?" "Who in your life has motivated you to work for this degree and how have they impacted you?"
Advantages and disadvantages of social networking : Analyze how the university might integrate at least two social media and networking technologies to accomplish their goals. Your analysis must cover the advantages and disadvantages of social networking
News article regarding denial of service attack : Research via the internet and find recent news article regarding denial of service attack, or distributed denial of service attack.Summarize the article using at least 500 words.The key to this assignment is to demonstrate your understanding of th..
Tay-sachs disease : Tay-Sachs disease and provide a discussion of the information you would share with the couple about Tay-Sachs and possible implications for future children.
Identify and prioritize it security controls : Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization
How can you link assessment findings to intervention : How can you link assessment findings to intervention? How can assessment information be used to create effective educational programs for children age birth - 8 years with ASD?
Provide a list of security activities or controls : List a security program in each level and provide a list of security activities or controls applied in these levels. Support your list with real world application data
Analyze instructional strategies, models that you might use : Analyze at least three instructional strategies, models, or programs that you might use when working in your field with an individual with ASD. Why would you expect these approaches to be effective?
Why is it important to document change requests : Why is it important to document change requests? What happens if a development team doesn't? When a project is late, do you think that adding more people to do the work helps or not? Justify your answer

Reviews

Write a Review

Computer Network Security Questions & Answers

  Dos attackers use zombies to attack victims

Why do you think DoS attackers use zombies to attack victims instead of sending attack packets directly to victims? Come up with two reasons.

  Describe situations where end-to-end encryption combined

Give some examples where traffic analysis could jeopardize security. Describe situations where end-to-end encryption combined with link encryption would still allow enough traffic analysis to be dangerous. about 150 words with references

  Automating compliance with federal information security

Automating Compliance with Federal Information Security Requirements," on page 115 of the text Information Security: Contemporary Cases. Also, you will be creating a PowerPoint presentation that explains the information that you wrote in your p..

  Research on personally identifiable information

Learn to correctly use the tools and techniques within Word to format a research paper including using Word 2010/2013's citation tools. These skills will be valuable throughout students' academic career. The paper will require a title page, NO a..

  Analyze the header files of spams

Analyze the header files of spams. The file 199803.zip is a collection of spams received by someone during 1998 March (http://untroubled.org/spam/, other spam archives could be found at:http://spamlinks.net/filter-archives.htm, etc.).

  Explain computer forensics software or services

Use a web search engine to search for companies specializing in computer forensics software or services. Select two or three and write a one- to two-page report comparing what each company does.

  Explain the difference between the client and the server

What is the difference between the client and the server. What is the difference between server-side and client-side scritping? Why are they separate

  Network security policy plan

Explain why you believe these are important, and include examples of security breaches that can occur if these items are not outlined and followed.

  Describing the some of the issues you might face

Assignment: Write a 3-to 4-page paper describing the some of the issues you might face when maintaining security in a company that has offices in multiple countries

  Briefly describe your cryptanalys is methodology

Decrypt this message, and briefly describe your cryptanalys is methodology. In particular, list features of the ciphertext that hindered or helped your decryption process.

  You work as a network administrator for a college located

you work as a network administrator for a college located in your local city. next door to the college is a new gated

  Protection of transmitted information-sensitive data stored

You must include in your investigation protection of both transmitted information also sensitive data stored locally in computer databases.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd