National institute of standards and technology

Assignment Help Basic Computer Science
Reference no: EM13829844

Problem:

The National Institute of Standards and Technology (NIST) replaced the former NIST Special Publication 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems with NIST Special Publication 800-37 Revision 1, Guide for Applying Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach. The NIST document changed from a certification and accreditation framework to a risk management framework because information security management systems should be regularly reviewed, updated, and maintained. It makes more sense to follow a security life cycle approach (continuous monitoring) versus a single one-time static certification/accreditation approach.

For this task, you will be using NIST Special Publication 800-37 Revision 1, Guide for Applying Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach and the attached "Healthy Body Wellness Center Risk Assessment" case study.
You have been hired to apply the NIST's risk management framework to the Healthy Body Wellness Center's information systems. You know that the organization has recently had a risk assessment completed that includes recommendations for implementing security controls and mitigating risks. In your new role, a team of people will be assigned to help you with the task. The first job you are tasked with is creating a to-do list for the specific tasks outlined in each of the six steps in the risk management framework (RMF).

Task:

A. Discuss key elements that need to be addressed as part of the risk management framework by completing the attached "RMFTo-Do List."

B. Create a white paper that compares the ISO 27002, COBIT, NIST, and ITIL frameworks by doing the following:

1. Discuss how each framework is most commonly used.

2. Analyze the purpose of each framework design.

3. Evaluate the strengths of each framework.

4. Evaluate the weaknesses of each framework.

5. Discuss the certification and accreditation process for the frameworks.

6. Discuss when you would choose to use each framework (e.g., ISO 27002 versus COBIT, NIST, or ITIL).

C. When you use sources, include all in-text citations and references in APA format.

Additional Information:

This problem is from Computer Science and it deals with risk management framework which can be applied to Federal Information Systems. A case study of Healthy Body Wellness Center Risk Assessment has been referred to. NIST or National Institute of Standards and Technology has undergone risk assessment as well as several recommendations have been suggested.

Total Word Limit: 2637 Words

Reference no: EM13829844

Questions Cloud

Ten principles to aid the quest for peace in the middle east : Ten Principles to Aid the Quest for Peace in the Middle East
Prepare a powerpoint presentation on doping in sports : The question is a presentation and it is clarify the doping in sports and why it should be discouraged. As we know, that sports are here not just for winning, but sports are here to inculcate sportive spirit among people.
Determine the materials and activities reflect best practice : Critique the materials and activities that you have available for teaching phonics and determine whether these materials and activities reflect the best practices.
Analyzing different social views of healthy human sexuality : Write a paper of 1,000 to 1,250 words analyzing different social and cultural views of healthy and unhealthy human sexuality
National institute of standards and technology : The National Institute of Standards and Technology (NIST) replaced the former NIST Special Publication 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems with NIST Special Publication
Syntactic rule proposed by chomsky : Which of the following is NOT a kind of syntactic rule proposed by Chomsky
Explores about new implementations in primary education : The question is about sociology and it is explores about new implementations in primary and secondary education between K-8. These new implementations include nutritional and dietary health instructions.
Global funds improving the healthcare system of ghana : What role do outside entities such as Non Governmental Organizations (NGOs), Global Funds, and the pharmaceutical industry play in improving the healthcare system of Ghana, and how effective are they in addressing chronic illnesses in Ghana
Making it eco-friendly : When you hear the term "making IT eco-friendly", explain how this is related to Information Technology and the environment.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd