Reference no: EM133066621
The Committee on National Security Systems (CNSS) Model identifies the nine interacting factors that influence the security of any resource. The nine key factors are:
1. Policy: which deals with info security policies in place
2. Education: which deals with education of users on security related issues
3. Technology: which covers the technology used to implement security measures
4. Confidentiality: confidentiality of info/data
5. Integrity: addresses measures in place to ensure data integrity
6. Availability: to ensure authorized users access to information in usable format
7. Storage: issues dealing with data storage
8. Processing: issues that cover the processing and handling of data
9. Transmission: covers issues related to factors that influence transmission of data
Assume you are responsible for implementing a security program within your own organization or another organization of your choice. Apply the CNSS model by identifying the interacting factors you will need to address within this organization. You will need to think about the employees, customers, and all other stakeholders. Address each of the nine key factors and which ones you would need focus on, providing a brief description for each of these factors. The deliverable for this activity should be a brief paragraph for each factor to be included in the model.
Corporate risk management plan
: You must design a corporate risk management plan for NCU-FSB as part of their corporate security program.
|
Kinds of big data collected by organizations
: Describe the kinds of big data collected by the organizations described in this case. Identify three decisions that were improved by using big data.
|
What was the role of management in attack
: What was the role of management in this attack? What would be your recommendations to prevent such an attack from occurring in the future?
|
Explain when manual patching is primarily
: Explain when manual patching is primarily used and discuss two risks associated with this practice.
|
National security systems model
: The Committee on National Security Systems (CNSS) Model identifies the nine interacting factors that influence the security of any resource.
|
Production network
: Describe the compensating controls you would recommend to protect your systems given that the patch would not be used on your production network
|
Windows server environment
: Your IT manager is determined to use Kubernetes within the Windows Server environment. determine if hardening approaches will be effective against cyberattacks
|
Prioritize each of server versions
: Explain how you will prioritize each of the server versions that require an upgrade. Describe the steps you would take to ensure continued operations.
|
Design phase of project life cycle
: Create a document that includes your case design workflow with the stages and steps.
|