Identify it security controls that should be implemented

Assignment Help Management Information Sys
Reference no: EM131143397

Project: Detailed Assignment Description

Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization (The organization is from Project 1)

Step 1: Review the selected case study and describe at least 10 issues related to security, interoperability, and operations.

Step 2: Prioritize and articulate the selected requirements based on immediate need, security posture, complexity, resource availability, and cost.

Step 3: Identify at least 4 applicable government regulations/ standards that govern how the requirements must be met, implemented, or measured. Provide rationale for why these are applicable.

Step 4: Using NIST Special Publication 800-53 select at least 4 security controls that relate to these issues and describe how these controls enhance the security posture or facilitates the secure implementation of these requirements.

The deliverable for this case study assignment will be a minimum 5 page, double-spaced paper using Times New Roman 12 font and APA style formatting for citations and references. It will also include a minimum of 5 references. The Title/Cover page, illustrations (tables/charts/graphs), or references are not part of the page count but are required for the assignment.

Reference no: EM131143397

Questions Cloud

Most important behavioral aspects of informal organization : One of the most important behavioral aspects of the informal organization is its communication pattern. Now that you have read about the different types of communication networks and the different roles that are used in informal communication, you wi..
Satisfy the needs of both amateur and professional artists : An artist's supply shop stocks a variety of different items to satisfy the needs of both amateur and professional artists. In each case described below, what is the appropraite inventory control model that the store should use to manage the replenish..
Demonstrate input validation using regular expression : Design, implement, test, and debug a C# program to demonstrate input validation using regular expression.
What are the major advantages to utilizing diversity : Read the article, "The On-the-Ground Reality of Women Leaders." Based on the content of this article and your personal experiences, what do believe are the major challenges facing diversity of culture and gender in the workplace today?
Identify it security controls that should be implemented : Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization (The organization is from Project 1).
Difference between independent and dependent demand : In MRP, what is the difference between independent and dependent demand? If your company makes two products using the same resources, what factors lead to the case where it is not the most profitable to produce more of the most profitable item per un..
Management team as the founder of new venture : Management Team As the founder of a new venture, examine your team-building skills to lead a new venture team. In a three- to four-page paper, not including the title and reference pages, identify key characteristics of individuals you would select t..
Predict the target group of your communication plan : Outline the approach that you would use to conduct research and interpret the situational analysis for your hometown. Determine the main goals and objectives of your proposed communication plan. Predict the target group of your communication plan.
How many passengers were on the titanic : How many passengers were on the Titanic? What percentage of passengers perished on the Titanic? What percentage passengers survived the sinking of the Titanic?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Privacy and social media

Privacy and Social Media-With the increasing use of social media, many employers are considering new ways in which to screen potential employees

  Define each of the following mis tps dss and ai

Information systems typically support different work models. You have been asked to create a report on what work models exist, and which model is most applicable to your organization. Include the following information in your report: Define each o..

  Important information about technology questionshow has

important information about technology questionshow has technology impacted the workplace? how has technology impacted

  Use the given information to develop a load profile

The computer keyboard assembly area has five employees who work 40 hours each week. Use this information to develop a load profile. What recommendations do you have?

  Shopping for virtual products in virtual stores

Kimberly-Clark Corp: Shopping for Virtual Products in Virtual Stores. CASE SUMMARY: Summarize the top three points in the case in your own words

  Describing various event categories

Write a two-and-a-half-page report describing various event categories and event-based transactions that are used by the network management systems to bring an alarm, event, or alert to the network manager's attention

  Describe to the management what is involved in sdn

CIS3003 2016 Assignment. Research and describe to the management what is involved in SDN (Software Defined Networks) approach to network management.  In your explanation provide a description of the benefits of the process, benefits to the organis..

  Warehouse managementwarehousing management and the proper

warehouse managementwarehousing management and the proper security of it stored goods. warehousing has a critical part

  Stretegic alliance agreements

Are supply chain management and the establishment of strategic alliance agreements with select suppliers more conducive to private sector organizations

  Supply chain management identify appropriate technology

supply chain management identify appropriate technology tools for manufacturing healthcare and retailreview the

  Analyzing what to improve and how to improve

If your problem involves process design/improvement, analysis of the problem may include describing the process in details using actual information and analyzing what to improve and how to improve. If actual information is not available, you shoul..

  Potential vulnerabilities and risks the unitc system

Discuss the potential vulnerabilities and risks the UNITC system may be exposed to from the cloud and sub-systems - explain the rational for each issue. Justify your decision with reference to standard practices. Reference the standard practices.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd