National institute of standards and technology

Assignment Help Basic Computer Science
Reference no: EM13829844

Problem:

The National Institute of Standards and Technology (NIST) replaced the former NIST Special Publication 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems with NIST Special Publication 800-37 Revision 1, Guide for Applying Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach. The NIST document changed from a certification and accreditation framework to a risk management framework because information security management systems should be regularly reviewed, updated, and maintained. It makes more sense to follow a security life cycle approach (continuous monitoring) versus a single one-time static certification/accreditation approach.

For this task, you will be using NIST Special Publication 800-37 Revision 1, Guide for Applying Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach and the attached "Healthy Body Wellness Center Risk Assessment" case study.
You have been hired to apply the NIST's risk management framework to the Healthy Body Wellness Center's information systems. You know that the organization has recently had a risk assessment completed that includes recommendations for implementing security controls and mitigating risks. In your new role, a team of people will be assigned to help you with the task. The first job you are tasked with is creating a to-do list for the specific tasks outlined in each of the six steps in the risk management framework (RMF).

Task:

A. Discuss key elements that need to be addressed as part of the risk management framework by completing the attached "RMFTo-Do List."

B. Create a white paper that compares the ISO 27002, COBIT, NIST, and ITIL frameworks by doing the following:

1. Discuss how each framework is most commonly used.

2. Analyze the purpose of each framework design.

3. Evaluate the strengths of each framework.

4. Evaluate the weaknesses of each framework.

5. Discuss the certification and accreditation process for the frameworks.

6. Discuss when you would choose to use each framework (e.g., ISO 27002 versus COBIT, NIST, or ITIL).

C. When you use sources, include all in-text citations and references in APA format.

Additional Information:

This problem is from Computer Science and it deals with risk management framework which can be applied to Federal Information Systems. A case study of Healthy Body Wellness Center Risk Assessment has been referred to. NIST or National Institute of Standards and Technology has undergone risk assessment as well as several recommendations have been suggested.

Total Word Limit: 2637 Words

Reference no: EM13829844

Questions Cloud

Ten principles to aid the quest for peace in the middle east : Ten Principles to Aid the Quest for Peace in the Middle East
Prepare a powerpoint presentation on doping in sports : The question is a presentation and it is clarify the doping in sports and why it should be discouraged. As we know, that sports are here not just for winning, but sports are here to inculcate sportive spirit among people.
Determine the materials and activities reflect best practice : Critique the materials and activities that you have available for teaching phonics and determine whether these materials and activities reflect the best practices.
Analyzing different social views of healthy human sexuality : Write a paper of 1,000 to 1,250 words analyzing different social and cultural views of healthy and unhealthy human sexuality
National institute of standards and technology : The National Institute of Standards and Technology (NIST) replaced the former NIST Special Publication 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems with NIST Special Publication
Syntactic rule proposed by chomsky : Which of the following is NOT a kind of syntactic rule proposed by Chomsky
Explores about new implementations in primary education : The question is about sociology and it is explores about new implementations in primary and secondary education between K-8. These new implementations include nutritional and dietary health instructions.
Global funds improving the healthcare system of ghana : What role do outside entities such as Non Governmental Organizations (NGOs), Global Funds, and the pharmaceutical industry play in improving the healthcare system of Ghana, and how effective are they in addressing chronic illnesses in Ghana
Making it eco-friendly : When you hear the term "making IT eco-friendly", explain how this is related to Information Technology and the environment.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Differences between scholarly resources and popular resource

Detail how you will be most effective and efficient in finding resources that fit your research needs.

  What are the primary components

What are the primary components that comprise an Oracle relational database management system? Identify at least 1 Bible verse that explains how we should facilitate relationships with each other. Expound upon this importance.

  Write a method that accepts a stringbuilder object

Write a method that accepts a StringBuilder object as an argument and converts all occurrences of the lowercase letter ‘t' in the object to uppercase.

  Find wan organizations

Find WAN organizations (ISPs) that will connect you to the Internet or connect your offices. What services do they offer? What costs are involved?

  Describe emerging technologies and trends

What technologies do you see becoming mainstream in the next 18 months, 5 and 10 years.

  Write a program prompts user to enter the first digits

Need help to write problem displaying ISBN(international standard book numbers). Question as follows:

  The dash cell phone company chargs customers a basic

The Dash Cell Phone Company charges customers a basic rate of $5 per month to send text messages. Additional rates are as follows:

  Explain what side effect is the expression contains

Give an example in C++ of an expression whose value depends upon the evaluation order. Show the orders that produce different values and the values they produce. Explain what side effect is the expression contains.

  Display the total sales with ah dollar sign

Display the total sales with ah dollar sign and two decimal places. I have no idea how to code this add button.The code has to work for Visual Basic. Thank you.

  How asymptotic notation can be used to rank the efficiency

To illustrate how asymptotic notation can be used to rank the efficiency of algorithms, use the relations "Ì" and "=" to put the orders of the following functions into a sequence, where e is an arbitrary real constant, 0

  Footer element describes content appears bottomtrue or false

The footer element describes content that usually appears at the bottom of the content or section element. True or False

  Give remediation recommendation for potential vulnerability

Provide a remediation recommendation for a potential vulnerability found with the use of the "eval" function in a static analysis report.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd