Write your response on baseline security settings

Assignment Help Computer Engineering
Reference no: EM132217096

Question: The effect amounts of FIPS 199 have to be focused while drawing the device boundaries as well as when selecting the baseline protection settings. The baseline security settings may be customized based on the danger assessment and regional problems such as:

The procedure for exclusively assigning info assets on the info system talks about the system 's safety measures boundary. Organizations include flexibility in determining what constitutes the info process. If a group of info resources is set as the info system, then the materials needs to be under the command of exact same immediate management. It's in addition doable for any info process to comprise several subsystems. A subsystem is identified as the main element or maybe subdivision of the info process (Carroll, 2000).

FIPS 200 present the seventeen minimum security requirements for info systems. An organization should meet minimum security requirements in this image standard by applying security settings depending on the designated influence amounts of the info systems. An organization has the freedom to change the control baseline according to the terms & problems. The altering activities include:

Scoping guidance has a company with specific conditions and terms on the implementation as well as applicability of specific security controls. Security plans really should decide which security controls applied scoping direction & constitute a definition of the type of considerations, that were created. These regulators will be the functional, management or maybe complex controls used by a company in lieu of agreed settings in the excessive, low-security and moderate control baselines that provide comparable/equivalent defense with the info process (Mudimigh, 2003).

References: Carroll, J. M. (2000). Making use: scenario-based design of human-computer interactions. MIT press.

Al-Mashari, M., & Al-Mudimigh, A. (2003). ERP implementation: lessons from a case study. Information Technology & People, 16(1), 21-33.

Information related to above question is enclosed below:

Attachment:- Responseneeded.rar

Reference no: EM132217096

Questions Cloud

Prepare an income statement for the year : Prepare an income statement for the year using absorption costing. Prepare a contribution format income statement for the year using variable costing
Why using the balanced scorecard is strategic measure : Explain why using the balanced scorecard is a strategic measure to help a health care institution be successful and stay competitive.
Spending millions on celebrity athletic team endorsements : Nike is one of the largest and most profitable sporting equipment providers in the world, spending Millions on Celebrity athletic team endorsements.
Requirements to be categorized as one of these partnerships : Use specific facts to prove why you think this company fulfills the requirements to be categorized as one of these partnerships.
Write your response on baseline security settings : The effect amounts of FIPS 199 have to be focused while drawing the device boundaries as well as when selecting the baseline protection settings.
Who are the poor : Who are the poor? How do they become the poor?
When chief brody is speaking with the mayor : Many of you may have seen the movie Jaws (1975). This movie raises some ethical issues when Chief Brody is speaking with the mayor,
Effectiveness of unstructured interviews : Theoretical problems are some of the bottlenecks that hamper the effectiveness of unstructured interviews. How can researchers overcome
Identify the weaknesses in internal control : identify the weaknesses in Internal Control. Peyton Electronics, Inc (PEI) is a small wholesale discount supplier of electronic instruments and parts.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd