How compensating controls can ensure non-compliant system

Assignment Help Basic Computer Science
Reference no: EM132926172

In this assignment you will be conducting a risk assessment. This will not be a technical risk assessment, but an assessment of your hypothetical organization/business. For your organization/business, take the NIST Cybersecurity Framework controls and reduce them to system configuration requirements and system test cases with pass/fail criteria. Refer to the "Framework for Improving Critical Infrastructure Cybersecurity," located within the Course Materials. Then, include the following in a report:

Question 1: Describe when some controls cannot be implemented (such as on a personal laptop).

Question 2: Explain what is to be done in each case identified above to compensate for controls that cannot be implemented (e.g., create an identification authentication scheme).

Question 3: Demonstrate how compensating controls can ensure the non-compliant system can continue to operate within the secured and compliant environment.

Reference no: EM132926172

Questions Cloud

Discuss the product life cycle and apply to walt disney : Discuss the product life cycle and apply this to Walt Disney's introducing the OTT streaming channels for the best price, and providing quality content
What would be its cash receipts in May : Assume that Sequoia's collection period is 45 days. What would be its cash receipts in May? What would be its accounts receivable balance at the end of May
Meaning of organisational culture and characteristics : Organisational communication can be horizontal, upward, and downward. Discuss
What is the current rate on a four-year Treasury security : Liquidity Premium Hypothesis Based on economists forecasts and analysis, Using the liquidity premium hypothesis, what is the current rate on a four-year
How compensating controls can ensure non-compliant system : Demonstrate how compensating controls can ensure the non-compliant system can continue to operate within the secured and compliant environment.
What are some solutions in selecting a strategy : What are some Solutions in selecting a strategy? What is Important for a Technical Recovery Plan and Crisis Management Plan?
What is one share of this stock : Afterwards, the dividend is expected to increase by 3.25 percent annually. What is one share of this stock worth to you currently
What vital functions need to be included in the plan : What vital functions need to be included in the plan. Can you easily identify the most vital functions? What happens to the business if one or more functions
Determine amount of cost of goods manufactured : During FY 2020 Annapolis Manufacturing had total manufacturing costs are $610,000. Determine amount of Cost of Goods Manufactured

Reviews

Write a Review

Basic Computer Science Questions & Answers

  External environments affect college enrollment

Question: What are three trends that external environments affect college enrollment?

  Lastname and firstname of employees

Write a SQL Statement to list the LastName and FirstName of employees who have worked on a property in Seattle. Use a SUBQUERY only.

  Explain why data security is important

Name and briefly describe three methods of breaching data security. Which do you think is potentially the most serious? Explain.

  Improper file or directory permissions

Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions,

  Develop risk management framework

Create a new thread. As indicated above, if Blue Wood Chocolate and Kilgore Custom Milling are to develop a risk management framework,

  Annual profitability prior to calculation

Purchase price for the company is set as 4.5 times net earnings profit, computed as average annual profitability prior to calculation of the manager

  Explain local telephone calls-long distance telephone calls

Will distinction between local telephone calls and long distance telephone calls ever disappear? What may cause this to happen?

  How do data mining and predictive analytics work

Should secondary use of consumer provided data be available without notice to the consumer? How do data mining and predictive analytics work?

  What is the hard part of this collusive agreement

a. What is the "hard" part of this collusive agreement? Explain. b. Do you think it would be "easier" or "harder" if it were the "Organization of the Wheat

  About the Prototyping

The client wants a prototype. What are some of the concerns or recommendations you have for the client and for your company leaders?

  Effects falling oil and gas prices on the gasoline

(a) Discuss the effects falling oil and gas prices on the gasoline equilibrium quantity and price; and, (b) what price do you expectregular gasoline will be in Pullman WA on October 15, 2015 and on December 15, 2015 and explain why.

  Formula for the amount of insurance

Write down a formula for the amount of insurance that Sally will buy as a function of the cost p per dollar of insurance. What is the price elasticity

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd