How do you think this guidance will affect

Assignment Help Computer Engineering
Reference no: EM133694419

Background

With the rise of cyber attacks that have affected critical infrastructure as well as resulted in massive data breaches of US citizen's personal data, the White House, via Executive Order, has issued the National Cybersecurity Strategy (March 2023). The purpose of this document is to provide an outline for how all government agencies, and private industries that work with these government agencies, need to approach cybersecurity. As you will read, this strategy addresses software security in a few areas. For this discussion, you will get familiar with these sections and the requirements put forth, and discuss their merits.

Instructions

In the March 2023 National Cybersecurity Strategy (attached below), read sections:

Collectively Defend Federal Civilian Agencies (page 17)
Strategic Objective 3.3: Shift Liability for Insecure Software Products and Services (page 20, 21)
After reading these sections, review the NIST Secure Software Development Framework (attached below) to familiarize yourself with the specific guidelines.

Using the discussion board, create an original post answering the following questions:

How do you think this guidance will affect how organizations approach application security? Also, what specific guidelines do you think will be the most difficult to implement?

Reference no: EM133694419

Questions Cloud

Explain how xss can create threats such as providing cookie : Explain how XSS can create threats such as providing cookie information to an attacker or to be used in a man-in-the-middle attack.
How is setting up graphics different in racket : How is setting up graphics different in Racket than in other languages such as Python or Java? Do you like or dislike the method of writing code in Racket vs
Evaluate the concepts of completeness and consistency : Evaluate the concepts of completeness and consistency related to software requirements.
Implement a 3 bit synchronous up : Implement a 3 bit synchronous up/down counter that stops counting when it reaches the minimum/maximum count. For example, if the count
How do you think this guidance will affect : How do you think this guidance will affect how organizations approach application security? Also, what specific guidelines do you think will be the most
Connection between religious belief and good behavior : Is there a necessary connection between religious belief and good behavior?
Characteristic of god did you find to be most problematic : Which characteristic of God did you find to be the most problematic and why? Which one did you find most interesting out of Kant and why?
How does it contribute to human well-being : Stephen Asma suggests that religion offers a unique psychological benefit not provided by science.
Is it problematic for the religious meanings of the day : How do you respond to the fact that, from the very beginning, the celebration of the birth of Jesus was fused with preexisting winter celebrations?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd