Nist security models

Assignment Help Basic Computer Science
Reference no: EM131257611

NIST Security Models

The design of a security awareness program depends on many factors. One important factor is how the organization will develop and distribute security information. Determining whether the strategies and implementation of an SAP are set centrally or are decided on at a lower level will have a significant impact on the success or failure of the program.

For this Discussion, you will evaluate security models based on a specific organization and its business model. Review Chapter 3 of NIST SP800-50 in this unit's Learning Resources to gain a deeper understanding of the three security models.

The organization you base your security model evaluation on will be determined by the first letter of your last name as listed below:

Wal-Mart A-C
Apple Computer D-F
A small, "mom-and-pop," hardware store G-I
The Kraft Group J-L
The United Nations M-O
The Louvre Museum P-R
Walden University S-U
Fiat Group Automobiles V-Z

Post a 300- to 500-word evaluation of which of the security models defined in NIST SP800-50 you would recommend for your organization. Include in your evaluation a description of your assigned organization and a detailed explanation of your recommended security awareness model. Justify the model you recommended. Include your research on the organization and explain any assumptions you made about the organization to come to this conclusion.

Reference no: EM131257611

Questions Cloud

How evidence-based research influences healthcare industry : Write a 900- to 1,250-word paper that discusses the following: Inform the reader of your chosen innovation and provide background information/history about it. Explain how evidence-based research influences the healthcare industry
Income tax expense-deferred income taxes-income tax payable : Following is information concerning the difference between Guilbert Corporation's taxable income and its GAAP income. Prepare the journal entry to record income tax expense, deferred income taxes, and income tax payable for 2014.
Weaknesses of a security awareness program : A security plan is only as strong as the awareness program that introduces and illuminates it to the employees of an organization. In order to develop strong SAPs, you must develop a broad understanding of techniques and best practices for their d..
Pros and cons of hiring multi craft maintenance personnel : What are the advantages and disadvantages of giving more responsibility for machine maintenance to the operator? - Discuss the pros and cons of hiring multi-craft maintenance personnel.
Nist security models : The design of a security awareness program depends on many factors. One important factor is how the organization will develop and distribute security information. Determining whether the strategies and implementation of an SAP are set centrally or..
Explain reid objection to locke account of personal identity : What is Wiggins' argument that seems to show we can have (at least) two objects of the same sort in the same place at the same time? Be sure to include in your explanation an explanation of why Tibbles at t3 is not identical to Tib at t3.
Define power distance in one sentence : Please define Power Distance in one sentence and summarize the differences (if any) in Power Distance among Russia, Venezuala, Japan and Bhutan
What is the main agenda of the two groups you researched : What is the main agenda of the two groups you researched? What role has each interest group played in American politics? Provide two examples for each group.
Specific social networking features : Based on what you learned in this chapter, write about 200 words in which you describe current developments in social networking that Lego will need to understand as it decides whether to continue, remove, or modify the social networking features ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the goal of artificial intelligence

ΛWhat is a Cybernetics? What is the goal of artificial intelligence? Which is true regarding BFS? What is a heuristic function? The traveling salesman problem involves n cities with paths connecting the cities. The time taken for traversing through a..

  Problem for the profession and for individual facility

A major problem for the profession and for individual facility managers is that they do not realize or fail to understand how they are perceived within the organization.

  Prove that the ddh problem is not hard relative to g

Let G be a polynomial-time algorithm that, on input 1n, outputs a prime p with ||p|| = n and a generator g of Z∗p . Prove that the DDH problem is not hard relative to G.

  Draw the pipeline execution diagrams

In snippet A, the branch is taken twice and then not taken. In snipped B, first branch is taken once and second branch is also taken once.

  Define a specialized representation language

Define a specialized representation language to describe the activities of a public library. This language will be a set of concepts and relations using conceptual graphs. Do the same thing for a retail business.

  Description of social-political and economic effects

What role does digital technology play in freedom of speech and democracy.

  What is your assessment of the reason behind this fact

Despite many empirical studies that compare inspection favorably to testing, it is still not as widely used as testing. What is your assessment of the reason behind this fact?

  Program for the arduino uno microcontroller

Write a program for the Arduino UNO microcontroller to turn an LED at pin 5on for 1.75 sec, and off for 3.25 sec. one time only. Write a multi-line comment at the top of the program.

  In what decade was the gender gap expanding shrinking

In what decade(s) was the gender gap expanding Shrinking?

  Value in the length field is the length

1. Select one packet. From this packet, determine how many fields there are in the UDP header. (Donot look in the textbook! Answer these questions directly from what you observe in the packettrace.) Name these fields. 2. From the packet content fi..

  Determine the depth from the ground surface

One of which is to measure groundwater table or in other words they are used to determine the depth from the ground surface to groundwater surface.

  File sharing program

Explain what your process was and how the experiment went. Were you successful? What did you learn from the experience ?Experiment choice #1:  File Sharing Program Download a current version a file sharing program such as BitTorrent and use it to dow..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd