Write a summary of the benefits of adopting nists rmf

Assignment Help Management Information Sys
Reference no: EM131913877

Assignment

Applicant Essay for an Internship in Cybersecurity

More and more hiring actions start with a written essay from job candidates followed by a telephone "screening" interview. For this week's discussion topic, you will take on the role of an applicant for an internship in a CISO organization. You are at the first stage in the application process -- writing the essay. Your assigned topic is:

Why should a large company (>1000 employees) adopt the NIST Risk Management Framework to manage IT risks?

The application review committee is a group of managers (both technical and non-technical) who depend upon IT security to protect their business operations (including intellectual property, company strategic and financial information, and customer data). The purpose of the essay is two fold. First, the review committee is looking for the ability to think critically and analyze a relevant problem, in this case, the business need for a risk management framework and risk management program. Second, the review committee is looking for applicants who can communicate effectively in writing for both technical and non-technical audiences.

Write a 3 to 5 paragraph application essay that addresses the points listed below and which responds fully to the required topic. Your essay should not exceed 500 words so be concise, accurate, and clear in your essay.

Your essay should include:

1. Definitions and discussions of threats which could impact confidentiality, integrity, and availability of information, information systems, and networks.

2. Discussion of what it means to manage IT related risks in an organization-wide manner (why is there a business need for an IT risk management framework and IT risk management process). (See section 2.1 of the RMF)

3. Identification and discussion of the RMF process -- addressing all 6 steps. (see Figure 2-2 in the RMF)

4. A summary of the benefits of adopting NIST's RMF as the company's risk management framework for IT risk management.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your article.

Reference no: EM131913877

Questions Cloud

How is riskless hedge used in the black scholes opm : How is a “riskless hedge” used in the Black Scholes OPM? In the Black-Scholes OPM, what happens to the value of a put option if variance increases?
Ranking the assets based on their expected risk : Rank the following assets based on their expected return. Then repeat the exercise, this time ranking the assets based on their expected risk.
What are some layout impacts of technological breakthroughs : How has the use of the assembly line by the industry changed over time? What are some layout impacts of technological breakthroughs?
Volatility for stock increases the value of option on stock : Explain why an increase in volatility for a stock increases the value of an option on the stock.
Write a summary of the benefits of adopting nists rmf : Write a summary of the benefits of adopting NIST's RMF as the company's risk management framework for IT risk management.
Reasons for volatility in the stock market : Given the current scenario, what would be your advice to someone, who's in their 60's, and is interested in investing in stocks?
Calculate the projects npv and put it in appropriate cell : Complete the spreadsheet by writing the missing numbers in the empty cells. Calculate the project's NPV and put it in the appropriate cell.
Capital gain-yield to maturity remains unchanged : what will be the approximate capital gain of this bond over the next year if its yield to maturity remains unchanged?
Systematic risk and not total risk : Why do we contend that only systematic risk and not total risk is important?

Reviews

Write a Review

Management Information Sys Questions & Answers

  What are the major elements of a total compensation package

You are talking with another student who is complaining about having to learn the systems development life cycle because he or she is not going to work in an IT department. Would you agree with this student? What would you say to this student to t..

  Explain the complexities of auditing a cloud computing

Explain the complexities of auditing a cloud computing deployment that uses the public model

  What is your opinion of social media and social networking

What are some privacy issues with social media and social networking? Are there privacy issues? Do you think the expectation of privacy should be different for internet versus face to face real world discussions? Why or why not?

  Iso description and analysisinternational standards

iso description and analysisinternational standards organization questionsfind out more about iso 9000 from the web. 1.

  What type of organizational culture inhibit whistle blowing

If you have worked for an organization that had internal auditors, IGs, or inspectors, were they effective? Were they welcome? What, in your experience, was done well and what was done poorly with such internal auditors and inspectors?

  Communication affect employees motivation

How can a manager's communication affect employees' motivation? Give an example of a time when a manager's communications increased members' motivation.

  Computer applications- clipart

Computer Applications- clipart - Explore the Internet to discover at least two additional sites (other than Microsoft) that offer clipart, either free or for a price.

  Summarize the different types of data storage technology

Examine the benefits and drawbacks of each format for users. Determine whether you agree or disagree that Blu-ray was the superior choice technologically over HD-DVD. Provide a rationale for your response.

  Creating separate web sites for each country

Companies creating separate Web sites for each country in which they do business is called _____ of a Web site

  Brief description of what the assessment measures

A brief description of what the assessment measures. How accurately the assessment portrayed the writer's style and why

  Determine the operational and enterprise systems

Determine the operational and enterprise systems that support wireless and mobile technologies for each company. Provide a rationale for your response.

  Demonstrate the use of conditional and looping structures

The Java application should also meet these technical requirements: The application should have at least one class, in addition to the application's controlling class. The source code must demonstrate the use of conditional and looping structures

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd