Nist security models

Assignment Help Basic Computer Science
Reference no: EM131257611

NIST Security Models

The design of a security awareness program depends on many factors. One important factor is how the organization will develop and distribute security information. Determining whether the strategies and implementation of an SAP are set centrally or are decided on at a lower level will have a significant impact on the success or failure of the program.

For this Discussion, you will evaluate security models based on a specific organization and its business model. Review Chapter 3 of NIST SP800-50 in this unit's Learning Resources to gain a deeper understanding of the three security models.

The organization you base your security model evaluation on will be determined by the first letter of your last name as listed below:

Wal-Mart A-C
Apple Computer D-F
A small, "mom-and-pop," hardware store G-I
The Kraft Group J-L
The United Nations M-O
The Louvre Museum P-R
Walden University S-U
Fiat Group Automobiles V-Z

Post a 300- to 500-word evaluation of which of the security models defined in NIST SP800-50 you would recommend for your organization. Include in your evaluation a description of your assigned organization and a detailed explanation of your recommended security awareness model. Justify the model you recommended. Include your research on the organization and explain any assumptions you made about the organization to come to this conclusion.

Reference no: EM131257611

Questions Cloud

How evidence-based research influences healthcare industry : Write a 900- to 1,250-word paper that discusses the following: Inform the reader of your chosen innovation and provide background information/history about it. Explain how evidence-based research influences the healthcare industry
Income tax expense-deferred income taxes-income tax payable : Following is information concerning the difference between Guilbert Corporation's taxable income and its GAAP income. Prepare the journal entry to record income tax expense, deferred income taxes, and income tax payable for 2014.
Weaknesses of a security awareness program : A security plan is only as strong as the awareness program that introduces and illuminates it to the employees of an organization. In order to develop strong SAPs, you must develop a broad understanding of techniques and best practices for their d..
Pros and cons of hiring multi craft maintenance personnel : What are the advantages and disadvantages of giving more responsibility for machine maintenance to the operator? - Discuss the pros and cons of hiring multi-craft maintenance personnel.
Nist security models : The design of a security awareness program depends on many factors. One important factor is how the organization will develop and distribute security information. Determining whether the strategies and implementation of an SAP are set centrally or..
Explain reid objection to locke account of personal identity : What is Wiggins' argument that seems to show we can have (at least) two objects of the same sort in the same place at the same time? Be sure to include in your explanation an explanation of why Tibbles at t3 is not identical to Tib at t3.
Define power distance in one sentence : Please define Power Distance in one sentence and summarize the differences (if any) in Power Distance among Russia, Venezuala, Japan and Bhutan
What is the main agenda of the two groups you researched : What is the main agenda of the two groups you researched? What role has each interest group played in American politics? Provide two examples for each group.
Specific social networking features : Based on what you learned in this chapter, write about 200 words in which you describe current developments in social networking that Lego will need to understand as it decides whether to continue, remove, or modify the social networking features ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Organizing function of management

Discuss and explain the company function of management as it relates to at least two of the organizational resources:

  Analyze employee evaluations in your department

In this project, you will analyze employee evaluations in your department. As manager, you evaluated employees on five criteria: Productivity, Work Quality, Initiative, Working Relations, and Writing Skills.

  Relationship of the corporate strategy to the it alignment

What is the relationship of the corporate strategy to the IT alignment of that strategy? Should the corporate strategy determine the IT alignment, or should the strategy support the IT alignment? Why?

  Servlet to return randomly chosen greeting

Write a servlet that returns a randomly chosen greeting from a list of five different greetings.

  What do these results imply for models selected by results

Considering that a larger penalty coefficient causes an information criterion to prefer a smaller model, what do these results imply for models selected by these three criteria? Repeat for n = 100 and n = 1000. Do the conclusions change?

  Which implementation of the adt dictionary are efficient

Which implementation of the ADT dictionary would be most efficient as a symbol table?

  General solution of the wave equation

After proving that this is an hyperbolic PDE show that its general solution (without Cauchy data) is similar to the general solution of the wave equation (uxx - v2uyy) with v equal to the propagation speed.

  Case study of financial analysis and operating ratios

In this assessment you will use the income statement and balance sheet information identified below and evaluate the firm's financial condition based on three profitability ratios: a) Total Margin, b) Return on Assets and c) Return on Equity.  You..

  Which logic equations should be valid

Which one of the subsequent four logic equations would be valid for the o6 output of a decoder with address lines a0, a1, a2 and outputs o0, o1, o2, o3, o4, o5, o6, o7?

  What are the main software modules of a ddbms

Discuss the main functions of each of these modules in the context of the client-server architecture.

  Write a complete java method called sumnums

1. Write a complete Java method called sumNums that takes no parameters and returns an integer. The method uses a do-while loop to ask the user to enter a series of positive integer values and keeps a running total. Use a sentinel (-1) to allow the u..

  Focusing on return on investment

Why is it important to analyze profitability, specifically focusing on return on investment? Invoke the breakdown of ROI in thinking about your response.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd