National security systems model

Assignment Help Basic Computer Science
Reference no: EM133066621

The Committee on National Security Systems (CNSS) Model identifies the nine interacting factors that influence the security of any resource. The nine key factors are:

1. Policy: which deals with info security policies in place

2. Education: which deals with education of users on security related issues

3. Technology: which covers the technology used to implement security measures

4. Confidentiality: confidentiality of info/data

5. Integrity: addresses measures in place to ensure data integrity

6. Availability: to ensure authorized users access to information in usable format

7. Storage: issues dealing with data storage

8. Processing: issues that cover the processing and handling of data

9. Transmission: covers issues related to factors that influence transmission of data

Assume you are responsible for implementing a security program within your own organization or another organization of your choice. Apply the CNSS model by identifying the interacting factors you will need to address within this organization. You will need to think about the employees, customers, and all other stakeholders. Address each of the nine key factors and which ones you would need focus on, providing a brief description for each of these factors. The deliverable for this activity should be a brief paragraph for each factor to be included in the model.

Reference no: EM133066621

Questions Cloud

Corporate risk management plan : You must design a corporate risk management plan for NCU-FSB as part of their corporate security program.
Kinds of big data collected by organizations : Describe the kinds of big data collected by the organizations described in this case. Identify three decisions that were improved by using big data.
What was the role of management in attack : What was the role of management in this attack? What would be your recommendations to prevent such an attack from occurring in the future?
Explain when manual patching is primarily : Explain when manual patching is primarily used and discuss two risks associated with this practice.
National security systems model : The Committee on National Security Systems (CNSS) Model identifies the nine interacting factors that influence the security of any resource.
Production network : Describe the compensating controls you would recommend to protect your systems given that the patch would not be used on your production network
Windows server environment : Your IT manager is determined to use Kubernetes within the Windows Server environment. determine if hardening approaches will be effective against cyberattacks
Prioritize each of server versions : Explain how you will prioritize each of the server versions that require an upgrade. Describe the steps you would take to ensure continued operations.
Design phase of project life cycle : Create a document that includes your case design workflow with the stages and steps.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd