Reference no: EM13929004
Application: Security Evaluation Criteria
Organizations around the world often assess their IS security mechanisms and practices by using the Trusted Computer System Evaluation Criteria (TCSEC) or Information Technology Security Evaluation Criteria (ITSEC). The two standards are similar, though there are distinctions.
Assume that you are the security manager for an organization that writes software. You are reviewing the proposal for a new chat program to be sold for use within an organization. Members of the organization can be physically located anywhere around the world, and your company is promising that all chat communications will be secure.
In a 3- to 4-page report, perform the following:
Compare and contrast the TCSEC and the ITSEC standards.
Determine what features and practices should be included in the design and development of the chat program to qualify it for each of the four TCSEC classes.
Determine what your company would have to do to be considered in each of the seven ITSEC classes.
Identify where the models overlap.
Your report should be written in APA style.
Directly produce any sales but will reduce operating costs
: Thornley Machines is considering a 3-year project with an initial cost of $690,000. The project will not directly produce any sales but will reduce operating costs by $405,000 a year. The project will require $17,000 in extra inventory for spare part..
|
What amount would liken report on the statement
: What amount would Liken report on the statement of cash flows related to the sale of the land?
|
Assume the risk-free rate and the beta remain unchanged
: Stock has a required return of 12%; the risk-free rate is 3.5%; and the market risk premium is 6%. What is the stock's beta? If the market risk premium increased to 7%, what would happen to the stock's required rate of return? Assume the risk-free ra..
|
Explain the basis of any liability in the tort of negligence
: In relation to the energy drinks that were described in the segment, explain the basis of any liability in the tort of negligence that the manufacturers of those drinks might have to Australian consumers.
|
Is security mechanisms and practices
: Organizations around the world often assess their IS security mechanisms and practices by using the Trusted Computer System Evaluation Criteria (TCSEC) or Information Technology Security Evaluation Criteria (ITSEC). The two standards are similar, tho..
|
How does vaccine distribution relate to key operations
: How does vaccine distribution relate to key operations and supply chain management questions including: quality management, new product development and forecasting
|
Ownership of the risk to another party
: Q1. ____ involves allocating ownership of the risk to another party. Q2. A project manager can chart the probability and impact of risks on a ____.
|
A wireless lan for an employee law firm
: A wireless LAN for a 100-employee law firm situated in a two-story office building. The law office uses Windows 7 (64 bit) Operating System laptops running standard MS Office 2010 Products
|
Discuss the key benefits of business ethics
: Discuss the key benefits of business ethics and whether you believe that being ethical leads to better business performance. Provide relevant research and examples to support your thinking
|