Choose appropriate security controls

Assignment Help Computer Network Security
Reference no: EM13808836

Choose appropriate security controls from the SAN's 20 critical security controls and choose the remainder of controls that are needed to secure this system from the listing of controls provided from NIST 800-53 rev 4 (see webliography). You will select a total of 10 security controls. List the control by type, mapping them as best as you can to the NIST Control Families (i.e. PE-3, etc. and provide a one sentence description of the function of this control). NOTE: You will address each control in the 20 critical security controls document and determine whether or not the control is appropriate to security the system in the scenario. You will provide a sentence or two on why or why not it should be selected. The 20 critical security controls must be addressed for the scenario but not necessarily selected for the scenario. The rest of the 10 controls you will select can be chosen from the NIST SP 800-53, Rev. 4 controls, from the Access Controls Family (I've provided a list, below, however you will review each of the controls in the document provided in Course Content). For example, if you choose two of the twenty SANS controls, you will select eight of the Access controls for a total of ten controls.

Reference no: EM13808836

Questions Cloud

World of business management : Spend some time doing some research and identify someone who might be considered an "icon" of leadership. Your choice does not have to be limited to the world of business management.
Why communication can be affect by culture and relationships : Explain how and why communication can be affected by the following: Culture and Relationships.
Identify three common challenges in managing data : Identify three common challenges in managing data, and describe one way organizations can address each challenge using data governance
Patterns in making government work : Patterns in Making Government Work
Choose appropriate security controls : Choose appropriate security controls from the SAN's 20 critical security controls and choose the remainder of controls that are needed to secure this system from the listing of controls provided from NIST 800-53 rev 4
Public administrators should be restricted to laid down rule : public administrators should be restricted to only laid down rules in the discharge of their duties as espoused by Max Weber or should they have some amount of discretion. Provide the likely benefits and disadvantages of each scenario and use exam..
Multiple regression to forecast demand of its product : How would a manufacturing company use multiple regression to forecast demand of its product? Give one detailed example
Discuss the importance of the advancements to its success : discuss the importance of these advancements to its success as a mode of storytelling. How might it have been told differently, for better or worse, without these technological advancements?
Eliminate trade restrictions and encourage free trade : Why would a country eliminate trade restrictions and encourage free trade? Using the European Union as an example, identify key changes that took place to encourage free trade.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Wireless-hardware hacking

Research via the internet and find an article in the news regarding wireless hacking, hardware hacking, or other security breach. As security and IT change so rapidly, your article should be no older than 2007 (i.e. Less than 5 years old).

  Case study- ping sweeps and port scans

Case Study: Ping Sweeps and Port Scans, Your boss has just heard about some nefarious computer activities called ping sweeps and port scans

  Give the security levels top secret-secret and confidential

Give the security levels Top SECRET,SECRET,CONFIDENTIAL, and UNCLASSIFIED (order from highest to lowest), and catergories A, B,C, specify what type of access (read,write, both or neither) is allowed in each of the following situations .

  Cybersecurity profile

Every organization must create a cybersecurity profile (system security plan (SSP)) for all of its major and minor information systems. The cybersecurity profile documents the current and planned controls for the system and addresses security conc..

  Internet working equipment

Discuss and explain any of the internet working equipment that you have experience with and the advantages and disadvantages of them.

  Calculates the hash value

Alice is able to intercept the message, and generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's or..

  How will ad organizational units be organized

How will the second site factor into domain controller placement? How will AD sites be configured and how will AD organizational units be organized

  Difference between a rainbow table and a hash lookup table

Explain the difference between a rainbow table and a hash lookup table in respect to trying to compromise a computer system's password? What is reduction function, what does it do, and what is its purpose?

  How asymmetric cryptography is used to provide encryption

Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.

  Assignment on network security

the selection of a virtual private network (VPN) for a midsize network.You shall actually identify the hardware and software needed to meet the network security and users requirements.

  Beat the hacker

A honeypot can be a useful for discovering some of the hacking trends occurring within an organization. Of course, there have to be certain measures placed upon its operation, maintenance, and the reconnaissance information obtained as a result.

  Ecological home network an overview ecological home

ecological home network ltbrgtan overview and ecological home network ltbrgtan overview ecological home network

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd