Describe the rmf and how it relates to the cia concepts

Assignment Help Management Information Sys
Reference no: EM132092840

There are many different threats to the confidentiality, integrity, and availability of data-at-rest. Some threats affect one of these security risks (like confidentiality only), and some threats affect more than one or even all of these risks.

Assume that a security model and threat assessment is needed for the protection of information in a hypothetical company.

In 1/2- to 1-pages, describe the RMF and how it relates to the CIA concepts and expands on them. Explain how this framework is used to address the need to protect information in the company.

Create a table in your Microsoft® Word document listing a minimum of five threats to the company using the column headers Threat to Data-at-Rest, Confidentiality/Integrity/Availability, and Suggestion on Countering the Threat.

In the Threat to Data-at-Rest column, list the threat.

In the Confidentiality/Integrity/Availability column, identify whether each of the following are affected:

Confidentiality

Integrity

Availability

Some or all of the three (Confidentiality, Integrity, and/or Availability)

In the Suggestions on Countering the Threat column, enter suggestions on how to counter each threat listed.

Reference no: EM132092840

Questions Cloud

What is the common theme running : What is the common theme running through all American law-administrative, civil, and criminal?
Determine the impact of testing activities : Explain the necessity of practicing the DR plan. Describe the different kinds of tests that cann be performed. Explain reasons for testing.
Make a release application for mr hampton : You are employed by Hammerstein and Rice Solicitors and have been instructed to make a release application for Mr Hampton
Limits on liability-duty and proximate cause : The plaintiffs attended a showing of a movie at a movie theater in a shopping mall. At the conclusion of the movie, the plaintiffs
Describe the rmf and how it relates to the cia concepts : There are many different threats to the confidentiality, integrity, and availability of data-at-rest.
Determine the conceptual model that you would use : Examine whether using a touch-screen monitor, a tablet, or using a mouse to select menu items to place an order would be most efficient.
How tribunals are legally and functionally different : And the ways in which these make tribunals more effective than courts, and the ways they can be said to be less effective?
Plea of guilty to the manslaughter of thomas : Roger, age 22, has entered a plea of guilty to the manslaughter of Thomas. The circumstances of the offence are as follows:
Highly profitable venture in bustling suburban : Highly profitable venture in bustling suburban shopping centre with turnover of $20,000 per month.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Research a recent threat to the security of an e-commerce

Research a recent threat (discovered within the last 12 months) to the security of an e-commerce operation.

  Evaluate and include the reliability and availability

Evaluate and include the Reliability and Availability, Time and Resources to Implement, Ease of Use and Advantages and Disadvantages.

  Provide an analysis on how the cloud conceptual model ties

Provide an analysis on how the cloud conceptual model ties in with the traditional on-premise model. Research an SOA approach and the benefits of its adoption. Would an SOA approach be the right approach for rebuilding the supply chain program? Pro..

  How enterprise resource planning systems mitigate risk

Explain how Enterprise Resource Planning (ERP) Systems mitigate risk and assist in organizational decision making.

  Write an introductory statement of the company

Determine information technology personnel roles that would be in place in order to start the business venture - information technology strategic plan

  How clear was the intent of the discussion

Write a 1,400- to 1,750-word summary of your responses to the following after completing the collaborative Week 3 discussion associated with the "Planning a Playground and "Politics of Sociology" videos: How clear was the intent of the discussion

  Explain the data warehouses and data marts

Write a one- to two-page (250-500 word) paper that discusses the differences between data warehouses and data marts.

  Compare and contrast the different types of idps technology

Compare and contrast the different types of IDPS technology and describe any prior experience using any of the tools.

  Any idea how to open and convert pod file to ms project

Any idea how to open and convert POD file to MS project

  Analyze the current uses of http and https

Identify the various uses for HTTP and HTTPS, and justify the use of one over the other. Include two examples to demonstrate the use of each protocol.

  Briefly describe the objective of the project

IT 270 IT Project Management Assignment. Video Store Project - Case Study Description. Briefly describe the objective of the project

  How has the internet supported growth of e-business

How has Internet supported the growth and opportunity of e-business? You are doing an excellent job on determining differences between eBusiness and eCommerce.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd