Identify and prioritize it security controls

Assignment Help Computer Network Security
Reference no: EM13758932

Bank Solutions Inc. - Bank Solutions - Project 2 NIST

Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization (The organization is from Project 1)

Step 1: Review the selected case study and describe at least10 issues related to security, interoperability, and operations.

Step 2: Prioritize and articulate the selected requirements based on immediate need, security posture, complexity, resource availability, and cost.

Step 3: Identify at least 4 applicable government regulations/ standards that govern how the requirements must be met, implemented, or measured. Provide rationale for why these are applicable.

Step 4: Using NIST Special Publication 800-53 select at least 4 security controls that relate to these issues and describe how these controls enhance the security posture or facilitates the secure implementation of these requirements.

Step 5.The deliverable for this assignment is a minimum 5 page, double-spaced paper using Times New Roman 12 font and APA style format. It will also include a minimum of 5 references. The Title/Cover page, illustrations (tables/charts/graphs), or references are not part of the page count but required.. Also the grading rubric can provide more details to include in the paper. The instructor may provide an APA style template to use for this paper.

Reference no: EM13758932

Questions Cloud

What do you want to do with business management degree : What do you want to do with business management degree and how will it help you impact others?" "Who in your life has motivated you to work for this degree and how have they impacted you?"
Advantages and disadvantages of social networking : Analyze how the university might integrate at least two social media and networking technologies to accomplish their goals. Your analysis must cover the advantages and disadvantages of social networking
News article regarding denial of service attack : Research via the internet and find recent news article regarding denial of service attack, or distributed denial of service attack.Summarize the article using at least 500 words.The key to this assignment is to demonstrate your understanding of th..
Tay-sachs disease : Tay-Sachs disease and provide a discussion of the information you would share with the couple about Tay-Sachs and possible implications for future children.
Identify and prioritize it security controls : Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization
How can you link assessment findings to intervention : How can you link assessment findings to intervention? How can assessment information be used to create effective educational programs for children age birth - 8 years with ASD?
Provide a list of security activities or controls : List a security program in each level and provide a list of security activities or controls applied in these levels. Support your list with real world application data
Analyze instructional strategies, models that you might use : Analyze at least three instructional strategies, models, or programs that you might use when working in your field with an individual with ASD. Why would you expect these approaches to be effective?
Why is it important to document change requests : Why is it important to document change requests? What happens if a development team doesn't? When a project is late, do you think that adding more people to do the work helps or not? Justify your answer

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain the difference between the client and the server

What is the difference between the client and the server. What is the difference between server-side and client-side scritping? Why are they separate

  Compare x.509 pki and pgp pki in different aspects

Compare X.509 PKI and PGP PKI in different aspects, e.g. Certs format, user identification, key management, scalability, usage, applications, business models, etc.

  Security risks associated with social networking sites

Discusses the security risks associated with social networking sites

  How does it affect performance and security

Sector level hard disk encryption is one of the most interesting problems of all. Assume that AES-128 is used to encrypt your local hard disk. What mode will you use? CBC or ECB?

  How rtsp vary from http in keeping client state information

How does RTSP differ from HTTP (a) in maintaining client state information; (b) in terms of in-band, out-of-band traffic?

  What do you see as the role of computer forensics in

question 1 what do you see as the role of computer forensics in recovering from cyber attacks?question 2 how might

  Technical versus soft skills

Suppose that there is some consensus with basic premise that most skills can be learnt, which would you expect to be the more productive task,

  Create an overloaded constructor

Create the statements to make an overloaded constructor for the class named Car. The constructors should support 0, 1, or 2 arguments. The 1st argument will denote engine size and contain an Integer.

  How system derive secret key for des from user-s password

Known risks of the UNIX password system, it has been recommended that the system be replaced by an alternative system that uses public key cryptography, RSA for example. How might the system derive the secret key for DES from the user's login pas..

  Use prevention-detection and recovery to secure records

Iit is highly desirable that whoever treats you has access to your record. Using your justification how would you use prevention, detection and recovery to secure the records?

  Explain the various strategies to prevent such cyber warfare

Need a 1000 word paper on the various recent/news on the United States (particular the group known as Anonymous and Lulzsec).

  A firewall works by blocking incoming

A firewall works by blocking incoming requests. Explain how a firewall can distinguish between two incoming requests allowing one while denying the other??

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd