The weakest areas of the cyber security policy

Assignment Help Computer Network Security
Reference no: EM13769912

1. Is the organization you selected for the learning portfolio FIPS 200 compliant? Why or why not?
(My organization wasU.S Department of Health and Human Services)

2. From a FIPS 200 perspective, what are the weakest areas of the cyber security policy associated with the organization you selected? Discuss at least two weak areas and describe why.

3. If you were the Federal CIO what would you do about organizations that are not FIPS 200 compliant? Why?

Reference no: EM13769912

Questions Cloud

Describe the three principles of direct manipulation : Describe the three (3) principles of direct manipulation and give examples as to how they are used in video game controls. Analyze video game-type interfaces and discuss three (3) reasons why video game-type interfaces would not be effective for re..
Therapy that identifies and replaces thoughts : Shemp feels sad because people do not think he is as good a comedian as Moe. In talking to his therapist, Shemp discovers that his belief that everyone should adore him is self-defeating. Therapy that identifies and replaces such thoughts is most lik..
Component of strategic management process : Describe at least five issues that may require a management policy as a component of its strategic management process
How we understand distinct characterizations of dionysus : How might we understand the very distinct characterizations of Dionysus in Bacchae and Frogs as portraits of the same god?
The weakest areas of the cyber security policy : From a FIPS 200 perspective, what are the weakest areas of the cyber security policy associated with the organization you selected? Discuss at least two weak areas and describe why.
Keys to success in multinational companies : It is widely known that Knowledge Management Systems are the key to success in multinational companies. Imagine that you are a Vice President of a company that is ramping up to go global.
Create a change-management plan : Create a change-management plan. Put yourself in the position of a consultant making recommendations to the CEO of the organization
What are some advantages and disadvantages of internet : What are some advantages and disadvantages of internet based experiments? In what type of situation would internet experiments be preferred to laboratory experiments? In what type of situations would laboratory experiments be preferred to internet ex..
Define the web server on the dmz : Around the same time these meetings were occurring, one network administrator at the company noticed anomalous traffic on port 80 of the Web Server on the DMZ. The edge router's logs showed that the traffic started six months ago and ended five mo..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Comprise a brief description of how to comprise

write a 1400- to 2100-word paper that describes the security authentication process. discuss how this and other

  Users in your organization are concerned about performance

users in your organization are concerned about performance and network security. after a meeting with your

  Explaining characteristic of san or a nas configuration

Storage Area Networks (SAN) and Network Attached Storage (NAS) each give high capacity file storage. For the following list, indicate whether the list item is more characteristic of a SAN or a NAS configuration.

  Determine plaintext and key from vigenere cipher

Below are ciphertext from Vigenere cipher. Determine plaintext and key. Give a clearly written description of steps you followed to decrypt each ciphertext.

  Paper about cyber security and identify assess and propose

Please refer to the latest document about cyber security and identify assess and propose: Risk related indicators and governance solutions, vulnerability assessment for cyber security

  Case study - personal computer security threats

Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack.

  How http and smtp figure into organizational security

Users are familiar with some network services like HTTP (Hypertext Transport Protocol) - the Web; and SMTP. Tell us more about these services. How do they figure into organizational security? Elaborate with specifics.

  For this application you will determine how your computer

for this application you will determine how your computer is connected through a network. you do not have to actually

  Campus ip addressing redesign understand the spread sheet

understand the spread sheet and redesign the present ipv4 network design and the attatchments gives the detailed

  Listing the pros and cons of each solution

Explain a paragraph how that can be an issue. Research U.S. Federal Regulations that govern exporting encryption technology on the Internet for more information on this topic if necessary.

  Udp programs to establish a secure communication channel

Write UDP programs allowing two parties to establish a secure communication channel and perform a security analysis for the key exchange protocol

  Identify physical security methods and the role

Identify physical security methods and the role they play in a network security plan. Compare and contrast the advantages and disadvantages of the physical security methods you identified.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd