Explain the nist cybersecurity framework core

Assignment Help Computer Network Security
Reference no: EM133432881 , Length: Words Count:1400

Assignment:

Question 1

  1. Develop a three-level classification system for your email communications. Consider the type of emails you send and receive. Take into consideration who should be able to view, save, print, or forward your email. For each classification, decide how you will label your emails to communicate the assigned classification. For each classification, develop handling standards.
  2. Multiple information systems are used to process, transmit, store, and back up email. Identify as many systems as possible involved in each step. For each system identified, document the person or position you would expect to be the information system owner. Is it necessary to provide them with a copy of your classification system or handling standards? Why or why not?
  3. Sometimes information system owners have different priorities. For example, your Internet service provider (ISP) by law has the right to view/open all documents that are stored on or passed through its systems. The ISP may choose to exercise this right by scanning for viruses or checking for illegal content. Suppose you have sent emails that could cause you harm if they were disclosed or compromised. As the information owner, what are your options?

Five hundred word minimum not more than seven hundred.

Question 2.

  • Explain how the NIST Cybersecurity Framework Core is aimed to structure a list of activities to reach certain cybersecurity outcomes and include examples of guidance to achieve such outcomes.
  • Explain which parts can be used as guidance to generate an incident response program and practice.
  • Explore the informative references in each category. Do you find any that overlap? Did you find any that contradict each other?

Five hundred word minimum not more than seven hundred.

Reference no: EM133432881

Questions Cloud

Explain fake news could affect of political elections : What can companies like Facebook and Twitter do to stop users from spreading fake news? What can we, as consumers, do? What do you think would work.
Relationship between science and technology : Explain how this event contributes to better understanding of the relationship between science and technology.
Describe the way you plan on implementing the policy : You will select a policy and describe the way you plan on implementing the policy. Your policy must clearly state what is allowed vs not allowed.
Do you think routing is powerful in mvc : Do you think routing is powerful in MVC? Explain how the routing is managed and why do we need them. Use examples to support your argument.
Explain the nist cybersecurity framework core : Explain how the NIST Cybersecurity Framework Core is aimed to structure a list of activities to reach certain cybersecurity outcomes.
Explain why primitive datatypes work : Explain why primitive datatypes work as explained above. Give a code example that demonstrates this behavior.
Discuss the appropriate tools used in forensic investigation : What tools are in the dream toolbox? Provide a detailed list of those tools, including tools for cross-validation. What are benefits and disadvantages of each?
Discuss security vulnerabilities : Write about 2000 words report to discuss security vulnerabilities, and their proposed solution while emphasising ethical, professional and legal practices.
How can the criminal justice system and law enforcement : How can the criminal justice system and law enforcement prepare for the future of cybercrime?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Encrypt an input string of lowercase letters

It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.

  Homeland security it department

What specific improvements should be made and why should each be made now instead of later? What residual risk will remain after safety measures are in place.

  Confusion and diffusion in cryptographic system

Describe the difference between confusion and diffusion in a cryptographic system. Explain why strong cryptosystems today employ both.

  Use a two-stage transposition technique to encrypt

Use a two-stage transposition technique to encrypt the following message using the key "Decrypt". Ignore the comma and the period in the message

  Protect organization information assets

Do you think having security that complies with regulatory requirements is sufficient to protect an organization's information assets?

  Describe the objectives and main elements of a cirt plan

Describe the objectives and main elements of a CIRT plan and analyze the manner in which a CIRT plan fits into the overall risk management approach of an organization and how it supports other risk management plans.

  Describe how a route discovery process works

Describe how a route discovery process works - Discuss the circumstances which might lead an organisation to use subnetting or alternatively to use

  Managing scope creep in project management

Consider the relationship between providing business value and managing scope creep in project management

  Stack frame allocated to function includes four regions

Stack frame allocated to a function includes four regions. what addresses are return address and the first argument stored, respectively?

  Describe how each is countered bya particular feature of ssl

Describe how each is countered bya particular feature of SSL - In practice, would you expect a secure design or implementation to impose the two properties on M? Explain.

  Describe worst practices that avoided when selecting an epp

Name and briefly describe three "best practices" that should be used when acquiring (purchasing) an EPP. Name and briefly describe three "worst practices" that should be avoided when selecting an EPP.

  Explain your method of attack and operation of the law

Explain your method of attack and operation within reasonable parameters of the law. Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd