Describe security architecture

Assignment Help Management Information Sys
Reference no: EM132137776

Answer the following Questions:

1. The official definition used by the US Government, as defined in the Federal Information Security Act (FISA), is "protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality, and availability."

(True/False)

2. The term information assurance, is defined as follows in NIST IR 72980 Revision 2, Glossary of Key Information Security Terms: Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.

(True/False)

3. Describe CIA and when you are considered secured.

4. Which CISSP domain according to your session materials highlights intrusion detection and prevention systems?

5. According to your session materials the Cybersecurity Act (the Act) was enacted on December 18, 2015, and includes a requirement for Federal Inspectors General to generate a report describing agency policies, procedures, and practices for covered systems. List three items the Act requires the report to include:

6. According to your session materials which CISSP domain includes "Security Control Testing?"

7. According to your session material describe the difference between standards, guidelines, and procedures.

8. According to your session materials, organizational risk mitigation strategies reflect a(n) ______________ perspective on what mitigations are to be employed and where the mitigations are to be applied, to reduce information security risks to organizational operations and assets, the Nation, other organizations, and individuals.

9. According to your session materials, risk is a measure of the extent to which an entity is threatened by a potential circumstance or event. What are the two related functions?

10. Describe the four steps in the risk assessment process according to your session materials.

11. According to your session materials, a ________________________ is a management, operational, and/or technical control employed by an organization in lieu of a recommended security control in the low, moderate, or high baselines that provides equivalent or comparable protection for an information system

12. According to one of the class OERs the purpose of the system security plan is to provide detailed security requirements of the system and describe the controls in place or planned for meeting those requirements.

(True/False)

13. What are the steps in a detailed or formal risk analysis according to our session materials?

14. The information flow model is an extension of the state machine concept and serves as the basis of design for both the Biba and Bell-LaPadula models.

(True/False)

15. Describe Defense in Depth according to the materials in session 3.

16. Describe Security Architecture according to your session materials.

17. Describe Business Continuity Planning according to your session materials.

18. Describe COBIT and what it is used for according to your session materials.

19. According to our session materials, which US president described cybersecurity as one of the most important challenges we face as a Nation?

20. According to your session materials how long should your individual risk research paper/project be?

Reference no: EM132137776

Questions Cloud

Calculate the relative proportion of seismic forces : Calculate the base shear V for the structure - Calculate the relative proportion of seismic forces, hence shears and moments to each of the walls
Calculate the real interest rate in singapore : Suppose in Singapore the velocity of money is constant, real GDP grows by 7% per year, the stock on money grows by 10% per year, and the nominal interest rate.
Defines an equivalence relation : Mathematics- Algebraic Geometry Problem - Let K denotes an algebraically closed field - Show that defines an equivalence relation on A2\{0}
What is the consumer surplus : Suppose that a student would go to 1 Blue Jays game if the price were $120, 2 Blue Jays games if the price were $80, 3 Blue Jays games if the price were $50.
Describe security architecture : Which CISSP domain according to your session materials highlights intrusion detection and prevention systems?
Determine effect of increase in total factor productivity : Suppose that the substitution effect of an increase in the wage is always larger than the income effect. Suppose the economy is on the low tax side.
Malware can effect a mac computer : What are some ways malware can effect a mac computer? Can they be prevented?
What is unified threat management : What is Unified Threat Management (UTM) and the services it combines into one device. Does UTM holds true to the principle of defense-in-depth
What is sunny valley market share : Suppose that there are only three types of fruit sold in the United States. Annual sales are 1,200,000 tons of blueberries, 5,400,000 tons of strawberries.

Reviews

Write a Review

Management Information Sys Questions & Answers

  How does a database turn data elements into information

How does a database turn data elements into information? What are the five characteristics common to high-quality information

  Describe the specific types of structured-unstructured data

Describe the specific methods and tools that will be used to provide visualization of the structured and unstructured data for the organization.

  Illustrate how technology can benefit transfer of learning

Illustrate how technology can benefit the transfer of learning. Explain how organizations have utilized technology in learning. Use your research or examples from your experience.

  Example where erp has improved the overall scm

Question about Enterprise Resource Planning (ERP) Systems - Described four ways how ERP could improve overall Supply Chain Management. Provide an example where ERP has improved the overall SCM.

  Create a paper with a strong thesis that about a technology

1st Draft of your paper--- incorporate your quotes well! Create a paper with a strong thesis that both informs the reader about a new technology and talks about the consequences of this new technology.

  How to create a pmo implementation plan

1. How to Create a PMO Implementation Plan .2.WHAT IS PROJECT PORTFOLIO MANAGEMENT?

  What is the overall impact of your application

Write a short paper on the problem you are trying to solve and how your application will address this issue. If you need to create your own class with your own methods, elaborate of what those methods would be. If they are value-returning, what ..

  Explain can companies divide supply chain management

Can companies divide Supply Chain Management (SCM) into upper and lower stream - Some people believe that for management purpose companies can divide their Supply Chain Management

  Describe how you would ensure data security

Describe how you would ensure data security

  Explain two it related projects that would be consistent

Identify two IT - related projects that would be consistent with this plan. Recommend one of the two projects for implementation. (Hint: choose a publicly traded company to ensure that you can find sufficient information to develop the strategic ..

  Using a database for strategic business development

Using a Database for Strategic Business Development chieving Operational Excellence - Building a Relational Database for Inventory Management

  Decision support systems dssdescribe the three primary

decision support systems dssdescribe the three primary components that make up any decision support system dss and how

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd