Explain the overall rmf process to the board

Assignment Help Computer Engineering
Reference no: EM132164810

Question: After receiving your briefing of the threat analysis, the Executive Board has an increased interest in your security program. The CEO has asked for an overview of your plan for implementing the fixes to the problems. You advise that risk management is a continuous process but offer a briefing on the framework and some of the immediate "fixes" that will be implemented in the initial projects.

Based on your research for Unit 3:

• Explain the overall RMF process to the board and how it will improve security overtime.

• Select the categorization of the corporate network using the Low-Moderate-High impact levels for confidentiality, integrity, and availability and brief that decision to the board.

• Give some examples of planned fixes to improve security for those areas.

• Explain how this effort will require financial and organizational support.

• Explain how the impact levels selected for categorization will aid in resource allocation.

The requirements for your assignment are:

• 1-2 page APA paper excluding title and reference pages

• Provide at least two references and in-text citations in APA format

• College level writing

Reference no: EM132164810

Questions Cloud

Prepare the general journal entry to record this transaction : Assuming same facts as in (a) except that fair value information for assets exchanged is not determinable. Prepare general journal entry to record transaction
The number of new mothers staying in the unified ward : They believe that by doing so they will be able to reduce the number of new mothers staying in the unified ward.
Explain the various control strategies : Explain the various control strategies such as detection and prevention and explain how each will be used. Provide insight into some of the methods and tools.
Advantages of stating well-defined corporate strategies : Question - What are two advantages and two disadvantages of stating well-defined corporate strategies in the annual report
Explain the overall rmf process to the board : After receiving your briefing of the threat analysis, the Executive Board has an increased interest in your security program. The CEO has asked for an overview.
What is the maximum price per share : What is the maximum price per share A should offer B in order to take it over given the aforementioned information
Write a python script that builds an html file : Write a Python script that builds an HTML file of your own design. Add an image tag into your HTML and link it to an image on your hard drive.
What are the reasons this company-organization is ethical : Identify a company in the media or with which you are familiar that operates ethically. What are the reasons this company/organization is ethical?
Would the same policy work for any server in your network : Would the same policy work for any server in your network? The SCW allows a security policy to be applied now or later. Why might a network administrator.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Evaluate this operating system and the packaged software

Install and document a Linux distribution to your hard drive. Evaluate this operating system and the packaged software. Promote the open source movement.

  Design a to perform various matrix operations

Design a to perform various matrix operations. class A matrix is a set of numbers arranged in rows and columns. Therefore, every element of a matrix has a row position and a column position.

  Write the type definitions for all the data types

Write the type definitions for all the data types that are needed to implement your design.

  Estimating average access time of system

The hit ratio for read accesses only is 0.9. A write-through procedure is used. Explain the average access time of system taking only memory read cycles?

  Design a hardware filter that would prevent any peripheral

During an IACK cycle, a peripheral may supply one of 256 possible vector numbers. This includes numbers from 0 to 63 that do not apply to vectored interrupts.

  Define the chinese remainder theorem and its application

Define the Chinese remainder theorem and its application. Define quadratic congruence and the importance of QRs and QNRs in solving quadratic equations.

  What is an obvious medium of implementation

The implementation is some interface that can be accessed to query the information. What is an obvious medium of implementation

  Obtain the phasor representations of the given two signals

In degrees the phase should be 15.74°. Examine the plots in Fig. to see whether you can identify the cosine waves x1(t), x2(t), and x3(t) = x1(t) + x2(t).

  Compare the differences in the atom methodology

Compare and contrast the differences in the ATOM methodology for large versus small projects. Analyze the key reasons why it is important to address.

  Evalute the results of a search engine

Can any one help me on the correct way of calculate the precision and recall values to evalute the results of a search engine?

  Write a test client to test all your methods in your class

A constructor with one parameter, an array of 10 strings (representing one element for each of the fields above), the only instance variable.

  How many bits are used for the byte offset

Design a 64KB 8-way set associative cache that has 32 words per blocks and 4 bytes per word (MIPS type).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd