Security controls that relate to these issues

Assignment Help Management Information Sys
Reference no: EM13761736

Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization (The organization is from Project 1)

Step 1: Review the selected case study and describe at least10 issues related to security, interoperability, and operations.

Step 2: Prioritize and articulate the selected requirements based on immediate need, security posture, complexity, resource availability, and cost.

Step 3: Identify at least 4 applicable government regulations/ standards that govern how the requirements must be met, implemented, or measured. Provide rationale for why these are applicable.

Step 4: Using NIST Special Publication 800-53 select at least 4 security controls that relate to these issues and describe how these controls enhance the security posture or facilitates the secure implementation of these requirements.

Reference no: EM13761736

Questions Cloud

Advantages and the advantages of dynamic pricing : What are the advantages and the advantages of dynamic pricing to the companies that use it? To the customers of the companies that use it?
Manufacturer recently reduced the setup cost : Annual demand is 900 units. Cost to produce the unit is $250, carrying cost is 10% per year. The manufacturer recently reduced the setup cost from $200 to $12.50. What is his new EOQ? If the company’s goal is to move to a single piece lot size, what ..
What elements of the production and delivery of the product : Imagining yourself to be the customer, construct a House of Quality to provide the organization with your perspectives on what the important dimensions of quality are and how well the organization is currently meeting your needs. Determine what eleme..
Write paper on dantes inftrno and rubaiyat of omar khayyam : Write a paper on the Dante's Inftrno and the Rubaiyat of Omar Khayyam. Discuss what that particular element tells us about Dante's essential beliefs or attitudes.
Security controls that relate to these issues : Using NIST Special Publication 800-53 select at least 4 security controls that relate to these issues and describe how these controls enhance the security posture or facilitates the secure implementation of these requirements
Social performance of organizations : The current world economy is increasingly becoming integrated and interdependent; as a result, the relationship between business and society is becoming more complex.
Information technology security for small business : Then write an information security white paper that can be used to market your firm's security consulting services to small businesses in the Washington, DC, area. Your white paper must:
Subnets broadcast address : Pick a network address from the list below. Everybody must pick a unique network address and number of subnet. The new subnet mask after the subnetting
Describe what hacking of memory or hacking of ram means : Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Differences of blackberry- wireless pda and raid echnology

Differences of Blackberry- wireless PDA and RAID echnology - Describe some of the features of the BlackBerry and what sets the RIM Blackberry apart from other wireless PDA solutions.

  Retailer profits supplier profits supply chain totalsyou

retailer profits supplier profits supply chain totalsyou are a retailer. you buy a part at the wholesale price of 6.00

  A applying your knowledge of project management identify

a applying your knowledge of project management identify lessons that can be learned from the above troubled project.

  Disadvantages of a lock down environment in iti need

disadvantages of a lock down environment in iti need assistance with figuring out some disadvantages a business may

  Information technologycapital investmentinformation

information technologycapital investmentinformation technology now accounts for about 35 to 50 percent of total

  Show the role of cio in previous decades

Summarize role of CIO - Show the role of CIO in previous decades. How has that role changed? How is it expected to change in the future.

  Identifying and explaining how the breach occurred

Read the list of suggested resources to find URLs for news stories and reports for your chosen topic. Then find 3 to 5 additional sources on your own. identifying and explaining how the breach occurred (or suspicions by authorities as to how it may..

  Km systemsplease assist in explaining a successful

km systemsplease assist in explaining a successful knowledge management system.please include the followinga.

  Explain the concepts of flow of control

Write a 2 page research paper (excluding title and reference pages) on Flow of Control. Explain the concepts discussed in the textbook using at least an example not included in the textbook.

  The performance chain and key components are discussedshow

the performance chain and key components are discussed.show the performance chain as it applies to your organization or

  Privacy raised by using information systems

Information systems - List three potential concerns related to privacy raised by using information systems.

  Research methodology explained in this solutiondemand for

research methodology explained in this solutiondemand for china rmb currency and will specifically focus on demand for

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd