Explain control domain and how it maps to your chosen scope

Assignment Help Computer Networking
Reference no: EM131909395

Discussion

This discussion focuses on mapping cloud security controls to existing frameworks or regulations.

You will need to create 1 new thread AND post AT LEAST 2 comments on other students' threads. Here's how to get started:

Download the Cloud Security Alliance (CSA) Cloud Controls Matrix spreadsheet. (A quick Internet search should give you the address of the most current version for download.) Under the "Scope Applicability" heading, select a category that is applicable to the organization for which you work. For example, if your organization handle personal medical data and uses the COBIT framework, you could choose either COBIT or HIPAA/HITECH. Once you select a category, choose row from "Control Domain" (that no other student has already selected!) Then, create a new thread in this week's discussion with the title from column B (i.e. CCM V3.0 Control ID.) Explain the control domain, how it maps to your chosen scope, and specifically what your organization does to implement the stated control.

If you don't know which scope applies to your organization, just use the University of the Cumberlands (UC) as your organization. As a university, we are under the domain of FERPA, So, is you choose UC, you would need to choose a Control Domain and explain how it maps to FERPA, and how UC implements the controls.

So, here's an example. Let's suppose I work for a large on-line retailer. We handle payment cards and are therefore under PCI DSS requirements. I'll select BCR-03 control ID (Business Continuity Planning.) So I would create a new thread in this week's discussion with the title "BCR-03." Then I'd explain what BCR-03 is, what it maps to in PCI DSS (4.1, 4.1.1, 9.1, 9.2), and then I'd explain what my organization does to comply with this control requirement.

Once you create your new thread, you need to find AT LEAST 2 other threads from other students and comment on their threads. Make sure your comments are more than "I agree", or "Good post."

Reference no: EM131909395

Questions Cloud

What turns people into terrorists : What turns people into terrorists? That question might sound simple, but it's at the heart of the struggle to prevent terrorist attacks.
Consider a regression that uses the square of the residuals : Consider a regression that uses the square of the residuals from the first regression above as the dependent variable and has a constant term
Think about your future role in public policy : Think about your future role in public policy and the ways in which you might effect positive social change.
Think about a policy change you might propose : Think about which public policy area needs to be addressed or which public policy you feel is most important to change, and then propose a policy change.
Explain control domain and how it maps to your chosen scope : Explain the control domain, how it maps to your chosen scope, and specifically what your organization does to implement the stated control.
When does diversity not matter when working with clients : Explain the process for clients who refuse to pay for services after therapy. When does diversity not matter when working with clients?
Electronics produce the new satellite radio receiver : What is the payback period of the project? What is the profitability index of the project? Should ABC Electronics produce the new satellite radio receiver?
Calculate the Genworth NDI for the borrowers : Using the Excel or Online version of the Genworth Serviceability Calculator, calculate the Genworth NDI for the borrowers
Financial break-even points for wettway sailboat : Use the above expression to find cash, accounting and financial break-even points for Wettway Sailboat.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain comprehensive disaster recovery plan for network

Explain a comprehensive disaster recovery plan for hypothetical network consisting of 20 desktop computers in domain network with 2 network servers and 2 application servers.

  Differences between lan and wan operating systems

What are the predominant network operating systems in use today? What are the differences between LAN and WAN operating systems

  Performance of different network-layer routing algorithms

Performance of different network-layer routing algorithms - develop a program that will evaluate the performance of three different routing protocols

  Define the term subnet mask

Define the term subnet mask. What do the bits in the mask whose values are binary 0 tell you about the corresponding IP address(es)? Include an example illustrate your answer.

  What happened in an emergency before cell phones

What happened in an emergency before cell phones

  What kind of powers does president have which permit him or

address the following in 1000-1.250 words what type of powers does the president have that allow him or her to create

  Category of the taxonomy does pgp mitigate

Which category of the taxonomy does PGP mitigate that is not mitigated by just encrypting the SMTP traffic between MTAs?

  Rch and explain network analysis tool which can

you are the new network administrator for a small hospital in your local city. network availability and security are

  Develop a network representation of the given problem

MGMT 430- What is the schedule and what is the total billing? Develop a network representation of the problem. You may reference the Network Diagram Template.

  Define switched backbone networks

You are the network administrator for a small manufacturing firm that runs Ethernet. You are currently using hubs and repeaters for connectivity but have decided to upgrade to a Layer 2 (L2) switched infrastructure.

  Describe essential characteristics to the cloud

Describe essential characteristics to the cloud. Do some research on the topic and provide four substantive reference that supports this type of functionality.

  Explain public-key cryptography standard

Explain in detail how PKCS (Public-Key Cryptography Standard), when combined with the RSA algorithm, can thwart Eve's attempt at discovering the encrypted figure.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd