National institute of standards and technology

Assignment Help Basic Computer Science
Reference no: EM13829844

Problem:

The National Institute of Standards and Technology (NIST) replaced the former NIST Special Publication 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems with NIST Special Publication 800-37 Revision 1, Guide for Applying Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach. The NIST document changed from a certification and accreditation framework to a risk management framework because information security management systems should be regularly reviewed, updated, and maintained. It makes more sense to follow a security life cycle approach (continuous monitoring) versus a single one-time static certification/accreditation approach.

For this task, you will be using NIST Special Publication 800-37 Revision 1, Guide for Applying Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach and the attached "Healthy Body Wellness Center Risk Assessment" case study.
You have been hired to apply the NIST's risk management framework to the Healthy Body Wellness Center's information systems. You know that the organization has recently had a risk assessment completed that includes recommendations for implementing security controls and mitigating risks. In your new role, a team of people will be assigned to help you with the task. The first job you are tasked with is creating a to-do list for the specific tasks outlined in each of the six steps in the risk management framework (RMF).

Task:

A. Discuss key elements that need to be addressed as part of the risk management framework by completing the attached "RMFTo-Do List."

B. Create a white paper that compares the ISO 27002, COBIT, NIST, and ITIL frameworks by doing the following:

1. Discuss how each framework is most commonly used.

2. Analyze the purpose of each framework design.

3. Evaluate the strengths of each framework.

4. Evaluate the weaknesses of each framework.

5. Discuss the certification and accreditation process for the frameworks.

6. Discuss when you would choose to use each framework (e.g., ISO 27002 versus COBIT, NIST, or ITIL).

C. When you use sources, include all in-text citations and references in APA format.

Additional Information:

This problem is from Computer Science and it deals with risk management framework which can be applied to Federal Information Systems. A case study of Healthy Body Wellness Center Risk Assessment has been referred to. NIST or National Institute of Standards and Technology has undergone risk assessment as well as several recommendations have been suggested.

Total Word Limit: 2637 Words

Reference no: EM13829844

Questions Cloud

Ten principles to aid the quest for peace in the middle east : Ten Principles to Aid the Quest for Peace in the Middle East
Prepare a powerpoint presentation on doping in sports : The question is a presentation and it is clarify the doping in sports and why it should be discouraged. As we know, that sports are here not just for winning, but sports are here to inculcate sportive spirit among people.
Determine the materials and activities reflect best practice : Critique the materials and activities that you have available for teaching phonics and determine whether these materials and activities reflect the best practices.
Analyzing different social views of healthy human sexuality : Write a paper of 1,000 to 1,250 words analyzing different social and cultural views of healthy and unhealthy human sexuality
National institute of standards and technology : The National Institute of Standards and Technology (NIST) replaced the former NIST Special Publication 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems with NIST Special Publication
Syntactic rule proposed by chomsky : Which of the following is NOT a kind of syntactic rule proposed by Chomsky
Explores about new implementations in primary education : The question is about sociology and it is explores about new implementations in primary and secondary education between K-8. These new implementations include nutritional and dietary health instructions.
Global funds improving the healthcare system of ghana : What role do outside entities such as Non Governmental Organizations (NGOs), Global Funds, and the pharmaceutical industry play in improving the healthcare system of Ghana, and how effective are they in addressing chronic illnesses in Ghana
Making it eco-friendly : When you hear the term "making IT eco-friendly", explain how this is related to Information Technology and the environment.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How would you ensure that the diagnosis is correct

There is a diagnosis of a bad video card on a client's computer made by another technician. The client would like to have a new video card installed on the desktop. How would you ensure that the diagnosis is correct

  You are to design and develop three html5 pages

You are to design and develop three HTML5 pages themed on Manchester. The pages should be optimised for delivery on a tablet, and should contain the following:

  Explain specific challenges of facing designer

Explain specific challenges of facing the designer, specifically with regard to limitations of hardware, software and interface design two paragraph each.

  Disaster recovery and business continuity policies

Disaster Recovery and Business Continuity Policies

  Consider three lans interconnected by two routers

Consider three LANs interconnected by two routers as shown in Figure below. Assign IP addresses to all of the interfaces. For Subnet 1 use addresses of the form 192.168.1.xxx; for Subnet 2 use addresses of the form 192.168.2.xxx; and for Subnet..

  User experience framework

The user experience framework also informs about the relationship between a conceptual model and a user's understanding of it for past, current, and future systems. The case study actually consists of two studies

  Explaining discrete-time system which moves between states

A decision maker observes a discrete-time system which moves between states {s1,s2,s3,s4} according to the following transition probability matrix?

  Create a name class of three string objects

Provide methods and operators for reading and writing Persons and for allowing the retrieval and changing of components of a Person (Name and Address)

  Create an array of ten doubles

Java program that reads temperature data from the user and displays statistical data about those temperature. Create an array of ten doubles. How do you even start this? This is a basic java course.

  Mainframes are perceived as being more robust

QUESTION 1 Mainframes are perceived as being more robust than n-tier server architectures. True False

  Explain how backups are taken using microsoft access

Explain how backups are taken using Microsoft Access. What are the issues that must be considered before starting the backup? When an Access database is restored from backup, what issues need to be considered regarding the data?

  Essay on the topic of digital divide crosses borders

Digital divide crosses all borders, culturally and geographically, discuss how the digital divide affects society in 2014.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd