What kind of controls can be used to reduce or mitigate risk

Assignment Help Computer Network Security
Reference no: EM133205742 , Length: Wrod Count: 500 words.

Discussion Post: Cybersecurity Framework

You have explained why the company needs to employ a cybersecurity framework based on NIST and families of control that are described in the NIST SP 800-53. I agree with you that the company is lacking in internal controls and what kind of controls can be used to reduce or mitigate the mentioned risk? This discussion was for you to recommend IT security controls and you recommended implementing NIST but I would have added more details. For example, to prevent such incidents and using NIST families of controls, AU (Audit and Accountability) and CP (Contingency Planning) should be used to deter such deficiencies. In more detail, audit management software can be used to leave records of events that occurred. This will deter criminal activities by using company IT assets. Also, I want to point out that using a proper business memorandum format to address the recommendation per assignment's description.

Reference no: EM133205742

Questions Cloud

What is the remaining margin : If the price falls to $70 per share, what is the remaining margin?If the maintenance margin is 30%, will she receive a margin call?
Describe the history and social lens for analysis : 1. Describe the history and social lens for analysis. 2. Compare the two lenses in relation to voting rights and what are there similarities?
What should mark have done : Read the case study McRoy Aerospace and answer questions - What should Mark have done if Jack still was not able to resolve the problem
What is the economic order quantity : Resolute Health dispenses 350,000 bottles of brand name pharmaceutical annually. The optimal safety stock (which is on hand initially) is 500 bottles.
What kind of controls can be used to reduce or mitigate risk : I agree with you that the company is lacking in internal controls and what kind of controls can be used to reduce or mitigate the mentioned risk?
Define the relevant geographic market : Is it appropriate to think of all of Australia as a single geographic market for natural gas? If so, explain why.
Examine major influences that organizational culture have : Organizational Culture Discussion - Examine the major influences that organizational culture can have on organizational ethical decision making
What continues to challenges and opportunities for military : What continues to be challenges and opportunities for the military, and how do they remain agile and flexible to the ever changing interests, needs and enemies.
Managing commercial contracts : Based on the material that we have studied in this course, give this person three tips that will help them be effective in their new position

Reviews

Write a Review

Computer Network Security Questions & Answers

  Problem regarding the cyber-attack

This exercise is to identify and characterize assets. Imagine there is a severe natural calamity in your area and your personal vehicles have been rendered immobile. The local mayor is running school buses on their routes to evacuate residents and..

  Information and communication technology infrastructure

In this Group Project, assume that you and the members of your group are top managers of a big international company spread over several continents. You decide to rebuild/expand your company's Information and Communication Technology infrastructur..

  Threats to wireless networks and countermeasures

ITC595 - Discuss how your own posts contributed to this knowledge and discuss whether or not the summary presented by your peers is accurate

  What tools chris used to take pictures of kayak prototypes

This project will have you validating forensic images, processing the data forensically by conducting key word searches and locating graphic files, as well as, finding EXIF data in the photos to determine what tools Chris used to take pictures of ..

  Analyze considerations for performing risk analysis

Analyze some of the possible additional considerations that may be necessary for performing risk analysis on critical infrastructure that handle hazardous.

  Analyze how coppa and cipa are similar and different

Analyze how COPPA and CIPA are similar and how they are different, and explain why there is a need for two different acts. Describe what you believe are the most challenging elements of both COPPA and CIPA to implement in order to be compliant.

  Identity the elements of a security policy

In preparation of your review, you have been asked to identity the elements of a security policy and describe how those elements protect against such an attack.

  Discuss the steps necessary to make electronic evidence

Identify and discuss the steps necessary to make electronic evidence admissible in court and identify various crimes and incidents that are involved in electronic forensic investigations.

  Creating whitelist

Calculated and recorded when you either complete or cancel the lab. If you save your lab, the score is held until you resume the lab and cancel or complete it

  Potential physical vulnerabilities and threats

Identify and analyze any potential physical vulnerabilities and threats that require consideration.

  Ip security and attacksnbspbased on your understanding of

ip security and attacksnbspbased on your understanding of networking concepts create a 2- to 3-page report in a

  Develop a security plan and recommendation memo to the cio

Develop a Security Plan and Recommendation Memo to the CIO

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd