Security measures required to protect information

Assignment Help Basic Computer Science
Reference no: EM132514376

A recent risk assessment highlighted the need for Red Clay to formalize the security measures required to protect information, information systems, and the information infrastructures for the company's headquarters and field offices. The CISO has proposed a plan of action which includes developing system security plans using guidance from NIST SP-800-18 Guide for Developing Security Plans for Federal Information Systems.

The CISO asked you to prepare a two page, draft briefing paper (5-7 paragraphs) for the IT Governance Board and Red Clay Renovations Board of Directors that introduces Security Control Classes and Security Control Families related to Red Clay risks. This audience is familiar with financial controls but has not yet been introduced to the use of controls in the context of IT security. You should leverage their knowledge in your explanations of the control classes and families. If necessary, research "financial controls" as well as IT security controls before writing this briefing paper.

Your draft briefing paper should include the following items:

An introduction telling the IT Governance Board and the Red Clay Board of Directors the purpose of the draft briefing paper.

A description of each control class (managerial, operation, and technical). THEN, write a descriptive paragraph explaining how three these specific control classes will work together to protect the Red Clay Renovations IT Infrastructure for the Wilmington, DE Offices (Headquarters).

From the below table, choose one family control from each of the management, operational, and technical control classes.

Write a description of each family control, THEN write a descriptive paragraph explaining how each family control will work to protect Red Clay's IT infrastructure.

Select two sub-family controls (i.e., AC1 and AC6) from each family control. THEN, write a descriptive example of how this sub-family-control will protect the Red Clay infrastructure. Your examples should relate to the Red Clay case study.

Family Control

Family Control

Family Control

Control Class - Management

Planning

Risk Assessment

Program Management

Control Class - Technical Control

Access Controls

Identification & Authentication

System & Communication Protections

Control Class - Operational Control

Awareness & Training

Contingency Planning

Incident Response

Provide in-text citations and references for 3 or more authoritative sources. 

Reference no: EM132514376

Questions Cloud

ENGT5220 Low Impact Manufacturing Assignment : ENGT5220 Low Impact Manufacturing Assignment Help and Solution, De Montfort University - Assessment Writing Service - Assignment - The Circular Economy
Digital forensic methods to solve crimes : Law enforcement professionals and investigators use digital forensic methods to solve crimes every day.
Organization behavior class : In the final minutes of the movie "Scent of a Woman", Frank Slade, a blind retired Lt. Colonel, US Army, played by Al Pacino, addresses the Headmaster
Calculate new break-even point for commercial division : Compute the companywide break-even point in dollar sales. Do you agree with the intern's decision to allocate the common fixed expenses to the Commercial
Security measures required to protect information : A recent risk assessment highlighted the need for Red Clay to formalize the security measures required to protect information,
Specific risks in the population : As an Advanced Practice Nurse, you will care for patients who are at risk for specific diseases. Please pick one chronic or infectious disease specific
Word paper regarding cpoe : Write a 350- to 700-word paper regarding CPOE. Include the following:
Strongest objection to moral isolationism : After reading Midgley's article, what do you think is her strongest objection to moral isolationism? Does that objection refute moral isolationism?
Idea of working in teams in it industry : Why do you think some people resist the idea of working in teams (in IT industry) and how would you deal with their resistance?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd