Role of ethics in developing the certification package

Assignment Help Computer Network Security
Reference no: EM13755998

The development of the C&A package will be a critical responsibility for the internal federal C&A team. The initiation of the C&A project, analyzing research, preparing the required documents, verifying information, and retaining ethics are all important responsibilities during the development of the C&A package.

In a report of 3-5 pages, provide an explanation of this C&A developmental process. The report should include the following:

• Title page
• Introduction to the paper
• Explanation of what is required to initiate the C&A project, examples of which include the following:

o Creating a contact list
o Holding a kick-off meeting
o Obtaining any existing agency guidelines

• Explanation of the types of research that need to be analyzed, examples of which include the following:

o Documents from the information system developers and administrators
o Previous certification package

• Description of how to represent the required documentation and requirements in the certification package
• Description of the role of ethics in developing the certification package

o An example of an ethics issue: the IS owner wants the certification review team to get the IS certified; therefore, it may be requested for you to compromise your ethics.

• Reference page in APA format

The following documents can be used to assist you with this assignment:

• DOE CIO Guide 205.1-1, Management, Operational, and Technical Controls
• 5 CFR 930, Employees Responsible for the Management of Use of Federal Computer Systems
• The National Institute of Standards and Technology (NIST) special Publication 800-16, Information Technology Security Training Requirements: A Role- and Performance-Based Model, dated April 1998
• Executive Order 13103, Computer Software Piracy, dated September 30, 1998, that requires training on the prevention of software piracy

Reference no: EM13755998

Questions Cloud

Companys current organizational model : Your boss has called you in to tell you that they plan on buying out this firm and integrating their business, and he needs you to develop the internal executive proposal that outlines a plan for integrating the smaller company into your current c..
Differences in how each theory addresses ethics and morality : A description of the differences in how each theory addresses ethics and morality
How mergers and acquisitions have affected the way : Review the following examples of how mergers and acquisitions have affected the way in which companies do business.
Analyze the economic impact of major social problems : Analyze the economic impact of major social problems and issues such as poverty, discrimination, crime, income distribution, the role of government, and other major issues.
Role of ethics in developing the certification package : Description of the role of ethics in developing the certification package and Description of how to represent the required documentation and requirements in the certification package
Compute trend analysis for net revenue and net income : Compute trend analysis for net revenue and net income - Which grew faster during the period, net revenue or net income?
Was the american civil war an inevitable event : In antebellum America, there was a great deal of social and political conflict. What were these conflicts? Was the American Civil War an inevitable event?
Creating an er diagram : Creating an ER diagram, Listing the functional dependencies, confirming that the database is in at least 4NF, Using SQL commands to create the and populate the database (there do not need to be many rows)
Identification of preventative controls : Identification of preventative controls and the development of recovery strategies and Explanation of the information technology (IT) contingency planning process to include an understanding of the required business impact analysis

Reviews

Write a Review

Computer Network Security Questions & Answers

  Groups of people involved with computer security

What are the many groups of people who are involved with computer security? Name the groups and elaborate on their functions.

  Case study on network infrastructure

You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO asks you to explain why you believe it is important to secure the Windows and Unix/Linux servers from known shortcomings and vulnerabilities.

  Write down a 350- to 700-word article review addressing the

write a 350- to 700-word article review addressing the sequential process the article discusses that highlights a

  Protecting intellectual property rights in software

Explain the reason of each of these approaches and explain how each of them can be used to protect property rights in software. Please include any experiences you have had with these methods.

  Problem on ethereal lab

The basic tool for observing the messages exchanged between executing protocol entities is called a packet sniffer. As the name suggests, a packet sniffer captures ("sniffs") messages being sent/received from/by your computer

  An isp has received a block

An ISP has received a block of addresses in which the prefix length (n = 24). The ISP needs to make 8 sub-nets (sub-blocks) of equal sizes from this block. What is the prefix of each sub-block?

  Discuss some of the security threats a company could face

In 1 - 2 pages, discuss some of the security threats a company could face when adding wireless access points (WAPs) to its network. How could the company reduce these risks

  Discuss briefly the use of inheritance blocking and forcing

You are required to show evidence that you can prevent student phone numbers on the user information from being read by anyone other than Dorothy Liddleton and the appropriate section manager.

  Denote the des encryption of the plain text

Find another key that also has this property, and explain the structure of the DES key schedule that permit such keys to exist.

  What is the actual running environment of tool

What is the functionality of the tool and what is the actual running environment (software and hardware) of the tool?

  Develop paper where you address digital forensics tools

Develop a paper where you address three digital forensics tools in the following categories: availability, pricing, platforms supported, technical strengths and weaknesses, etc

  When applying cryptography determine why securing the key

when applying cryptography determine why securing the key is more important than securing plaintext or ciphertext.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd