Draft the required system security plan for a system

Assignment Help Computer Network Security
Reference no: EM131669376 , Length: 3

Project: System Security Plan

Company Background & Operating Environment -

The assigned case study and attachments to this assignment provide information about "the company."

  • Use the Baltimore field office as the target for the System Security Plan.
  • Use Verizon FiOS as the Internet Services Provider.

Policy Issue & Plan of Action -

A recent risk assessment highlighted the need to formalize the security measures required to protect information, information systems, and the information infrastructures for the company's field offices. This requirement has been incorporated into the company's risk management plan and the company's CISO has been tasked with developing, documenting, and implementing the required security measures. The IT Governance board also has a role to play since it must review and approve all changes which affect IT systems under its purview.

The CISO has proposed a plan of action which includes developing system security plans using guidance from NIST SP-800-18 Guide for Developing Security Plans for Federal Information Systems. The IT Governance board, after reviewing the CISO's proposed plan of action,voted and accepted this recommendation. In its discussions prior to the vote, the CISO explained why the best practices information for security plans from NIST SP 800-18 was suitable for the company's use. The board also accepted the CISO's recommendation for creating a single System Security Plan for a General Support Systemsince, in the CISO's professional judgement, this type of plan wouldbest meet the"formalization" requirement from the company's recently adopted risk management strategy.

Your Task Assignment -

As a staff member supporting the CISO, you have been asked to research and then draft the required system security plan for a General Support System. In your research so far, you have learned that:

  • A general support system is defined as "an interconnected set of information resources under the same direct management control that shares common functionality." (See NIST SP 800-18)
  • The Field Office manager is the designated system owner for the IT support systems in his or her field office.
  • The system boundaries for the field office General Support System have already been documented in the company's enterprise architecture (see the case study).
  • The security controls required for the field office IT systems have been documented in a security controls baseline (see the controls baseline attached to this assignment).

Research:

1. Review the information provided in the case study and in this assignment, especially the information about the field offices and the IT systems and networks used in their day to day business affairs.

2. Review NIST's guidance for developing a System Security Plan for a general support IT System.  This information is presented in NIST SP 800-18.

3. Review the definitions for IT Security control families as documented in Federal Information Processing Standard (FIPS) 200: Minimum Security Requirements for Federal Information and Information Systems(see section 3).

4. Review the definitions for individual controls as listed in Appendix F Security Control Catalog in NIST SP 800-53 Security and Privacy Controls for Federal Information Systems and Organizations.

Attachment:- Assignment Files.rar

Reference no: EM131669376

Questions Cloud

Describe the policy for its effectiveness of the time : Describe the policy for its effectiveness of the time. Discuss the historical perspective of the time when the policy was discussed.
Principal portion of the first payment : Mortgages have an APR (annual percentage rate - a stated rate) of 7.56%. Payments and compounding are monthly.
Check the four population standard deviations are same : Assume that all distributions are normal, the four population standard deviations are approximately the same, and the data were collected independently.
What was the cash coverage ratio for the year : The firm paid $3,866 in total interest expense and deducted $2,545 in depreciation expense. What was the cash coverage ratio for the year?
Draft the required system security plan for a system : As a staff member supporting the CISO, you have been asked to research and then draft the required system security plan for a General Support System
What is the company net income : Shelton, Inc., has sales of $21 million, total assets of $18.3 million, and total debt of $9.5 million. Assume the profit margin is 9 percent.
Present value of each of the cash-flows : Calculate the present value of each of the following cash-flows.
What kind of influence can 3d printing bring : What kind of influence or future influence can 3D Printing bring to supply-chain management?
What is the payback period of a perpetuity : 1. What is the discount factor for a cash flow received in 10 periods if the discount rate is 8%?

Reviews

len1669376

10/5/2017 8:08:00 AM

Topic: IT Security Plan for Field Office. Detailed Question: Needs to be about 2-3 pages. Use the following guidance to complete the System Security Plan using the template from Appendix A of NIST SP 800-18. Sections 1 through 10 will contain information provided in the assigned case study. You may need to “interpret” that information when writing the descriptions. “Fill in the blanks” for information about the company or its managers which is not provided in the case study, i.e. names, email addresses, phone numbers, etc.). Make sure that your fictional information is consistent with information provided in the case study (name of company, locations, etc.).

len1669376

10/5/2017 8:07:54 AM

Use a professional format for your System Security Plan. Your document should be consistently formatted throughout and easy to read. Common phrases do not require citations. If there is doubt as to whether or not information requires attribution, provide a footnote with publication information or use APA format citations and references.

len1669376

10/5/2017 8:07:49 AM

You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. Submit your System Security Plan in MS Word format (.docx or .doc file) for grading using your assignment folder. (Attach the file.)

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd