Identification of the eighteen candidate security control

Assignment Help Management Information Sys
Reference no: EM132027303

Security Assessment for an enterprise must be incorporated into the Software Development Life Cycle (SDLC) in order to be a secure, integrated process.

Testing of selected security controls ensures that applications meet business requirements, function as planned, and protect associated data securely from attack.

A security assessment of the targeted environment identifies vulnerabilities that may cause a security breach and specifies the security controls that mitigate the vulnerabilities.

Refer to NIST SP 800-53 rev 4 for identification of the eighteen candidate security control families and associated security controls.

Choose five distinct security control families as specified in SP 800-53 rev 4, click on the chosen familites, and create a spreadsheet that identifies the following criteria for each family:

Control ID

Control Name

Vulnerability

Provide a short paragraph for each family describing the testing procedure that will mitigate the vulnerability.

Example:

Family - Identification and Authentication

Control ID - IA-2

Control Name - Identification and Authentication (Organizational Users)

Vulnerability - Illegal user access

Submit your assignment using the Assignment Files tab.

Reference no: EM132027303

Questions Cloud

Roles and needs affect the process of teamwork : What are some examples of different roles and needs within a team? How can these roles and needs affect the process of teamwork?
To loan or not to loan : Harry Edwards is the loan officer at High Plains Bank, a small bank located in a town of 3,000 people in rural Oklahoma.
Identify the internal and external processes : Identify the internal and external processes used by auditors for your chosen organization from your Week One assignment.
How large of a sales increase can the company achieve : Paladin Furnishings generated $2 million in sales during 2016, and its year-end total assets were $1.5 million.
Identification of the eighteen candidate security control : Security Assessment for an enterprise must be incorporated into the Software Development Life Cycle (SDLC) in order to be a secure, integrated process.
What are some factors in selecting a strong team : Why is the management team so important to a new business and what are some factors in selecting a strong team?
Desired treatment or perspectives might you encounter : As a manger of a business, what differences in desired treatment or perspectives might you encounter?
Describe evolution of health care information technology : Describe the evolution of health care information technology by identifying key technological advancements in each decade, beginning with the 1960s.
How do we know what different groups or individuals need : How do we know what different groups or individuals need? Perhaps instead of using the golden rule, we could use the platinum rule, which states

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd