Identify and prioritize it security controls

Assignment Help Management Information Sys
Reference no: EM13751229

Case Study-Identify Requirements

Instructions

Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization

Step 1: Review the selected case study and describe at least10 issues related to security, interoperability, and operations.

Step 2: Prioritize and articulate the selected requirements based on immediate need, security posture, complexity, resource availability, and cost.

Step 3: Identify at least 4 applicable government regulations/ standards that govern how the requirements must be met, implemented, or measured. Provide rationale for why these are applicable.

Step 4: Using NIST Special Publication 800-53 select at least 4 security controls that relate to these issues and describe how these controls enhance the security posture or facilitates the secure implementation of these requirements.

Reference no: EM13751229

Questions Cloud

Importance of internal controls in general : As the new accounting manager for a water district, you have been asked to evaluate the internal controls utilized by your new employer. You find that the following controls are in place. Please define and explain the importance of internal cont..
True about a partnership : 1. The ability of one partner to enter into a contract binding all other partners is termed:
Discusses the role of the leaders in this case study : Case Study: A System Approach, Review the case study in the article, Texas Health Harris Methodist-Cleburne: A System Approach to Surgical Improvement. Discusses the role of the leaders in this case study
Cost of capital for analyzing capital expenditures : Would you recommend that ExxonMobil use a single company- wide cost of capital for analyzing capital expenditures in all its business units? Why or why not?
Identify and prioritize it security controls : Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization
Discuss internal technical risks and legal risks : Different firms utilize various approaches to categorizing risks. For our purposes, we will use the following risk categories: External - Predictable Risks, Internal Non-Technical Risks, Internal Technical Risks, and Legal Risks.
Create table that shows various required hardware components : Case Study - Director's Requirements", Create a table that shows the various required hardware components. The table should have all the necessary columns, rows, and column headings to show the following
Call premium of the bond : Consider a bond with a 5.2 percent coupon rate and a yield to call of 6.1 percent. The bond currently sells for $1,086. If the bond is callable in 5 years, what is the call premium of the bond?
Industry-economy environment-future outlook : Provide an in-depth look into your business. Use the language of business to give detail of your industry, economy environment, future outlook and unique selling advantage. Talk about your product or services and the demographic you wish to market..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd