Identify it security controls that should be implemented

Assignment Help Management Information Sys
Reference no: EM131711667

Project 1 Detailed Assignment Description

Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization (The organization is from Project 1)

Step 1: Review the selected case study and describe at least10 issues related to security, interoperability, and operations.

Step 2: Prioritize and articulate the selected requirements based on immediate need, security posture, complexity, resource availability, and cost.

Step 3: Identify at least 4 applicable government regulations/ standards that govern how the requirements must be met, implemented, or measured. Provide rationale for why these are applicable.

Step 4: Using NIST Special Publication 800-53 select at least 4 security controls that relate to these issues and describe how these controls enhance the security posture or facilitates the secure implementation of these requirements.

The deliverable for this case study assignment will be a minimum 5 page, double-spaced paper using Times New Roman 12 font and APA style formatting for citations and references. It will also include a minimum of 5 references. The Title/Cover page, illustrations (tables/charts/graphs), or references are not part of the page count but are required for the assignment. The grading rubric provides additional details as to what should be included in the paper. Your instructor may provide an APA style template to use for this paper.

Project 2 Detailed Assignment Description

Select one of the security technologies you identified in either P1 or P2. Research and evaluate its capabilities, costs, maintenance requirements, flexibility, and feasibility for implementation. The analysis should include pros and cons, potential barriers to success, vulnerabilities eliminated or reduced, convergence issues, first adopters (if the technology is new), and any other issues you deem important to consider. Use the technical evaluation methodology information obtained and discussed in previous courses.

The deliverable for this assignment will be a minimum 5 page, double-spaced paper using Times New Roman 12 font and APA style formatting for citations and references. It will also include a minimum of 5 references. The Title/Cover page, illustrations (tables/charts/graphs), or references are not part of the page count but are required for the assignment. The grading rubric provides additional details as to what should be included in the paper. Your instructor may provide an APA style template to use for this paper.

Attachment:- Case-Study-GAP-Analysis.rar

Reference no: EM131711667

Questions Cloud

Discuss the major characteristics of your detailed audit : Discuss the major characteristics of your detailed audit finding report and how you would distribute the report to each group.
Explain why you feel you were not successful : Share one example of a goal you set for yourself in the past that you did not successfully accomplish.
Discuss disease control is important in any industry : Health management and disease control is important in any industry. Do you think a strict biosecurity program at a swine farm is necessary or can it be ignored
Journalize the transactions in accounts of jones corporation : Journalize the following transactions in the accounts of Jones Corporation using the direct-write off method of handling uncollectible accounts
Identify it security controls that should be implemented : Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations that apply to this organization.
Discuss judean domestic policies : The activities of the prophets of the Bablylonian period are played out against the background of and in full engagement with both Judean domestic policies
Emerging economies to embark on strategic alliances : What are the driving forces for firms in emerging economies to embark on strategic alliances? Focus in ONE reason and explain it deep.
How the person had been particularly helpful to new employee : To study the effects of primacy and recency, two groups were chosen randomly from a large sociology class. Both groups read a two-page description of a person.
Review the academic writing expectations checklist : Review the Academic Writing Expectations Checklist to guide your writing

Reviews

Write a Review

Management Information Sys Questions & Answers

  Why hids would be appropriate to use as security measure

Please find an example of a system (or type of system) that you would recommend protecting with host-based IDS.

  Determining the competitive value of information technology

Identify three factors to consider in determining the competitive value of information technology. Justify the selected factors. Of the factors selected, determine if each factor is applicable to all businesses and industries, and explain why or why ..

  Insert a graph or chart displaying total costs graphically

Insert a graph or chart displaying total costs graphically. List software operating systems and applications for each device and their costs.

  Perform a crude analysis to show the interactivity

Create a behavioral state machine for each of the complex classes in the class diagram. Perform a CRUDE analysis to show the interactivity of the objects in the system

  Discuss about the speculate on the role of the cio

Speculate on the role of the CIO in a specific industry (i.e., manufacturing, insurance, higher education, government, and distribution) when implementing green IT. Describe three notable actions that the CIO should engage in and briefly explain h..

  Describe what functions should it perform for the company

In what ways can the business benefit from a Web site? What functions should it perform for the company (e.g., marketing, sales, customer support, internal communications, etc.)?

  Evaluate the competitive applications of technology

Evaluate the competitive applications of technology

  Create the primary key and foreign keys using a uml class

A prestigious university has recently implemented a consolidation strategy that will require it to centralize their student records. In order to move forward, the local university will need to develop a data model that will retain student records ..

  Describe how information systems can support

Describe how information systems can support each of the following competitive strategies and identify the major type/types of information system/systems that exists/exist in the organisation you are working in, or any other organization you are de..

  The challenges associated with searching in textual document

Examine the challenges associated with searching in textual documents and database querying. Describe how the five-stage search framework.

  Research on the mcclelland theory of needs

McClelland believes that individuals are motivated by achievement, power, and affiliation, yet they tend to favor one over the others.

  Explain role and impact of e business and edi

Explain Role and Impact of E Business and EDI. How 3PLs use the ICT to provide information and on-line services to their customers?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd