Reference no: EM13787212
Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization (The organization is from Project 1)
Step 1: Review the selected case study and describe at least10 issues related to security, interoperability, and operations.
Step 2: Prioritize and articulate the selected requirements based on immediate need, security posture, complexity, resource availability, and cost.
Step 3: Identify at least 4 applicable government regulations/ standards that govern how the requirements must be met, implemented, or measured. Provide rationale for why these are applicable.
Step 4: Using NIST Special Publication 800-53 select at least 4 security controls that relate to these issues and describe how these controls enhance the security posture or facilitates the secure implementation of these requirements.
Step 5: Paper must be a minimum of 5 pages, in APA format, with at least 5 references.
Determine general security architecture for the company
: Determine the most important assets of the company, which must be protected, Determine general security architecture for the company
|
How you assist organization in accomplishing their goals
: Where they are: The organization's current security and how they handle emergency situations, Where they should be: Where the organization should be with the level of their security and emergency management, How you'll get there: How you will assist ..
|
Define security technique that aims to expose flaws
: Fuzzing" is a security technique that aims to expose flaws in error handling by providing invalid, random, or unexpected data as inputs to computer systems. Here "system" is used generically, and should be read as "function call, program, or shell..
|
What are the salient situational factors
: What are the salient situational factors.
|
Identify and prioritize it security controls
: Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization
|
Develop a treatment plan for mike
: Review "The Case of Mike". Develop a treatment plan for Mike. Discuss the importance of goal setting within the therapeutic relationship and explain how this is related to the process of implementation
|
Explain the huffman trucking virtual organization
: Which of these roles would be installed in the Huffman Trucking Virtual Organization. State your reasoning for each server role that you would install.
|
Describe the types of negotiations
: Describe the types negotiations
|
Documented evidence of psychiatric issues
: John Hinckley, Jr. and the documented evidence of psychiatric issues leading to his controversial insanity defense in the shooting of President Ronald Reagan
|