Explain the nist cybersecurity framework core

Assignment Help Computer Network Security
Reference no: EM133432881 , Length: Words Count:1400

Assignment:

Question 1

  1. Develop a three-level classification system for your email communications. Consider the type of emails you send and receive. Take into consideration who should be able to view, save, print, or forward your email. For each classification, decide how you will label your emails to communicate the assigned classification. For each classification, develop handling standards.
  2. Multiple information systems are used to process, transmit, store, and back up email. Identify as many systems as possible involved in each step. For each system identified, document the person or position you would expect to be the information system owner. Is it necessary to provide them with a copy of your classification system or handling standards? Why or why not?
  3. Sometimes information system owners have different priorities. For example, your Internet service provider (ISP) by law has the right to view/open all documents that are stored on or passed through its systems. The ISP may choose to exercise this right by scanning for viruses or checking for illegal content. Suppose you have sent emails that could cause you harm if they were disclosed or compromised. As the information owner, what are your options?

Five hundred word minimum not more than seven hundred.

Question 2.

  • Explain how the NIST Cybersecurity Framework Core is aimed to structure a list of activities to reach certain cybersecurity outcomes and include examples of guidance to achieve such outcomes.
  • Explain which parts can be used as guidance to generate an incident response program and practice.
  • Explore the informative references in each category. Do you find any that overlap? Did you find any that contradict each other?

Five hundred word minimum not more than seven hundred.

Reference no: EM133432881

Questions Cloud

Explain fake news could affect of political elections : What can companies like Facebook and Twitter do to stop users from spreading fake news? What can we, as consumers, do? What do you think would work.
Relationship between science and technology : Explain how this event contributes to better understanding of the relationship between science and technology.
Describe the way you plan on implementing the policy : You will select a policy and describe the way you plan on implementing the policy. Your policy must clearly state what is allowed vs not allowed.
Do you think routing is powerful in mvc : Do you think routing is powerful in MVC? Explain how the routing is managed and why do we need them. Use examples to support your argument.
Explain the nist cybersecurity framework core : Explain how the NIST Cybersecurity Framework Core is aimed to structure a list of activities to reach certain cybersecurity outcomes.
Explain why primitive datatypes work : Explain why primitive datatypes work as explained above. Give a code example that demonstrates this behavior.
Discuss the appropriate tools used in forensic investigation : What tools are in the dream toolbox? Provide a detailed list of those tools, including tools for cross-validation. What are benefits and disadvantages of each?
Discuss security vulnerabilities : Write about 2000 words report to discuss security vulnerabilities, and their proposed solution while emphasising ethical, professional and legal practices.
How can the criminal justice system and law enforcement : How can the criminal justice system and law enforcement prepare for the future of cybercrime?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd