Reference no: EM132092840
There are many different threats to the confidentiality, integrity, and availability of data-at-rest. Some threats affect one of these security risks (like confidentiality only), and some threats affect more than one or even all of these risks.
Assume that a security model and threat assessment is needed for the protection of information in a hypothetical company.
In 1/2- to 1-pages, describe the RMF and how it relates to the CIA concepts and expands on them. Explain how this framework is used to address the need to protect information in the company.
Create a table in your Microsoft® Word document listing a minimum of five threats to the company using the column headers Threat to Data-at-Rest, Confidentiality/Integrity/Availability, and Suggestion on Countering the Threat.
In the Threat to Data-at-Rest column, list the threat.
In the Confidentiality/Integrity/Availability column, identify whether each of the following are affected:
Confidentiality
Integrity
Availability
Some or all of the three (Confidentiality, Integrity, and/or Availability)
In the Suggestions on Countering the Threat column, enter suggestions on how to counter each threat listed.
What is the common theme running
: What is the common theme running through all American law-administrative, civil, and criminal?
|
Determine the impact of testing activities
: Explain the necessity of practicing the DR plan. Describe the different kinds of tests that cann be performed. Explain reasons for testing.
|
Make a release application for mr hampton
: You are employed by Hammerstein and Rice Solicitors and have been instructed to make a release application for Mr Hampton
|
Limits on liability-duty and proximate cause
: The plaintiffs attended a showing of a movie at a movie theater in a shopping mall. At the conclusion of the movie, the plaintiffs
|
Describe the rmf and how it relates to the cia concepts
: There are many different threats to the confidentiality, integrity, and availability of data-at-rest.
|
Determine the conceptual model that you would use
: Examine whether using a touch-screen monitor, a tablet, or using a mouse to select menu items to place an order would be most efficient.
|
How tribunals are legally and functionally different
: And the ways in which these make tribunals more effective than courts, and the ways they can be said to be less effective?
|
Plea of guilty to the manslaughter of thomas
: Roger, age 22, has entered a plea of guilty to the manslaughter of Thomas. The circumstances of the offence are as follows:
|
Highly profitable venture in bustling suburban
: Highly profitable venture in bustling suburban shopping centre with turnover of $20,000 per month.
|