Identify and prioritize it security controls

Assignment Help Basic Computer Science
Reference no: EM13787212

Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization (The organization is from Project 1)

Step 1: Review the selected case study and describe at least10 issues related to security, interoperability, and operations.

Step 2: Prioritize and articulate the selected requirements based on immediate need, security posture, complexity, resource availability, and cost.

Step 3: Identify at least 4 applicable government regulations/ standards that govern how the requirements must be met, implemented, or measured. Provide rationale for why these are applicable.

Step 4: Using NIST Special Publication 800-53 select at least 4 security controls that relate to these issues and describe how these controls enhance the security posture or facilitates the secure implementation of these requirements.

Step 5: Paper must be a minimum of 5 pages, in APA format, with at least 5 references.

Reference no: EM13787212

Questions Cloud

Determine general security architecture for the company : Determine the most important assets of the company, which must be protected, Determine general security architecture for the company
How you assist organization in accomplishing their goals : Where they are: The organization's current security and how they handle emergency situations, Where they should be: Where the organization should be with the level of their security and emergency management, How you'll get there: How you will assist ..
Define security technique that aims to expose flaws : Fuzzing" is a security technique that aims to expose flaws in error handling by providing invalid, random, or unexpected data as inputs to computer systems. Here "system" is used generically, and should be read as "function call, program, or shell..
What are the salient situational factors : What are the salient situational factors.
Identify and prioritize it security controls : Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization
Develop a treatment plan for mike : Review "The Case of Mike". Develop a treatment plan for Mike. Discuss the importance of goal setting within the therapeutic relationship and explain how this is related to the process of implementation
Explain the huffman trucking virtual organization : Which of these roles would be installed in the Huffman Trucking Virtual Organization. State your reasoning for each server role that you would install.
Describe the types of negotiations : Describe the types negotiations
Documented evidence of psychiatric issues : John Hinckley, Jr. and the documented evidence of psychiatric issues leading to his controversial insanity defense in the shooting of President Ronald Reagan

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create a spreadsheet in microsoft excel

Work individually to create a resume and cover letter for a job you could apply for upon graduation. Think about the kinds of jobs your education will prepare you for and then find a specific one for a specific organization and prepare paperwork t..

  What is qos what is it used for and how does it work

What is QOS what is it used for and how does it work and What are the differences between Inserv and Diffserv

  How do i put three numbers ascending order in ocaml pattern

how do i put three numbers in ascending order in ocaml using pattern matching?

  Find the binary, octal and hexadecimal representations

Find the binary, octal and hexadecimal representations for each of the following integers (given in base 10).

  Types of pre-created objects that can be used on web sites

Types of pre-created objects that can be used on Web sites. Describe the objects you find and what they are used for. Include links to the sites you used in your research.

  Name the obligatory select query clauses in the correct orde

Name the obligatory SELECT query clauses in the correct order

  Show the risk mitigation strategy

Each member selects one of the highest risks. Explain why these are considered high risk, and explain their potential effect on the project and outline a risk mitigation strategy for the each of the selected high risks.

  Write nested for loops to produce the following output

Write nested for loops to produce the following output

  Describe how rsa algorithm works for cryptography

Explain why RSA works, namely the math foundation behind it. You must explain why each equation works and provide one simple example to verify that - Itemize the steps described in the textbook for the scenario and explain the purpose for each ste..

  Decimal ascii number with an implied decimal point

Write a procedure named WriteScaled that outputs a decimal ASCII number with an implied decimal point.

  Produce a diagram of a proposed network

Produce a diagram of a proposed network

  Explain in detail each step of the machine cycle show the

high-level computer languages are created to be understood by humans. as a result the keywords and the commands of

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd