Reference no: EM13758932
Bank Solutions Inc. - Bank Solutions - Project 2 NIST
Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization (The organization is from Project 1)
Step 1: Review the selected case study and describe at least10 issues related to security, interoperability, and operations.
Step 2: Prioritize and articulate the selected requirements based on immediate need, security posture, complexity, resource availability, and cost.
Step 3: Identify at least 4 applicable government regulations/ standards that govern how the requirements must be met, implemented, or measured. Provide rationale for why these are applicable.
Step 4: Using NIST Special Publication 800-53 select at least 4 security controls that relate to these issues and describe how these controls enhance the security posture or facilitates the secure implementation of these requirements.
Step 5.The deliverable for this assignment is a minimum 5 page, double-spaced paper using Times New Roman 12 font and APA style format. It will also include a minimum of 5 references. The Title/Cover page, illustrations (tables/charts/graphs), or references are not part of the page count but required.. Also the grading rubric can provide more details to include in the paper. The instructor may provide an APA style template to use for this paper.
What do you want to do with business management degree
: What do you want to do with business management degree and how will it help you impact others?" "Who in your life has motivated you to work for this degree and how have they impacted you?"
|
Advantages and disadvantages of social networking
: Analyze how the university might integrate at least two social media and networking technologies to accomplish their goals. Your analysis must cover the advantages and disadvantages of social networking
|
News article regarding denial of service attack
: Research via the internet and find recent news article regarding denial of service attack, or distributed denial of service attack.Summarize the article using at least 500 words.The key to this assignment is to demonstrate your understanding of th..
|
Tay-sachs disease
: Tay-Sachs disease and provide a discussion of the information you would share with the couple about Tay-Sachs and possible implications for future children.
|
Identify and prioritize it security controls
: Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization
|
How can you link assessment findings to intervention
: How can you link assessment findings to intervention? How can assessment information be used to create effective educational programs for children age birth - 8 years with ASD?
|
Provide a list of security activities or controls
: List a security program in each level and provide a list of security activities or controls applied in these levels. Support your list with real world application data
|
Analyze instructional strategies, models that you might use
: Analyze at least three instructional strategies, models, or programs that you might use when working in your field with an individual with ASD. Why would you expect these approaches to be effective?
|
Why is it important to document change requests
: Why is it important to document change requests? What happens if a development team doesn't? When a project is late, do you think that adding more people to do the work helps or not? Justify your answer
|