Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Assignment: Company Background & Operating Environment

The assigned case study and attachments to this assignment provide information about "the company."

• Use the Baltimore field office as the target for the System Security Plan
• Use Verizon FiOS as the Internet Services Provider

Policy Issue & Plan of Action

A recent risk assessment highlighted the need to formalize the security measures required to protect information, information systems, and the information infrastructures for the company's field offices. This requirement has been incorporated into the company's risk management plan and the company's CISO has been tasked with developing, documenting, and implementing the required security measures. The IT Governance board also has a role to play since it must review and approve all changes which affect IT systems under its purview.

The CISO has proposed a plan of action which includes developing system security plans using guidance from NIST SP-800-18 Guide for Developing Security Plans for Federal Information Systems. The IT Governance board, after reviewing the CISO's proposed plan of action, voted and accepted this recommendation. In its discussions prior to the vote, the CISO explained why the best practices information for security plans from NIST SP 800-18 was suitable for the company's use. The board also accepted the CISO's recommendation for creating a single System Security Plan for a General Support System since, in the CISO's professional judgement, this type of plan would best meet the "formalization" requirement from the company's recently adopted risk management strategy.

Your Task Assignment

As a staff member supporting the CISO, you have been asked to research and then draft the required system security plan for a General Support System. In your research so far, you have learned that:

• A general support system is defined as "an interconnected set of information resources under the same direct management control that shares common functionality." (See NIST SP 800-18)

• The Field Office manager is the designated system owner for the IT support systems in his or her field office.

• The system boundaries for the field office General Support System have already been documented in the company's enterprise architecture (see the case study).

• The security controls required for the field office IT systems have been documented in a security controls baseline (see the controls baseline attached to this assignment).

Research:

1. Review the information provided in the case study and in this assignment, especially the information about the field offices and the IT systems and networks used in their day to day business affairs.

2. Review NIST's guidance for developing a System Security Plan for a general support IT System. This information is presented in NIST SP 800-18. Pay special attention to the Sample Information System Security Plan template provided in Appendix A.

3. Review the definitions for IT Security control families as documented in Federal Information Processing Standard (FIPS) 200: Minimum Security Requirements for Federal Information and Information Systems (see section 3).

4. Review the definitions for individual controls as listed in Appendix F Security Control Catalog in NIST SP 800-53 Security and Privacy Controls for Federal Information Systems and Organizations. You should focus on those controls listed in the security controls baseline provided with this assignment.

Write:

1. Use the following guidance to complete the System Security Plan using the template from Appendix A of NIST SP 800-18.

a. Sections 1 through 10 will contain information provided in the assigned case study. You may need to "interpret" that information when writing the descriptions. "Fill in the blanks" for information about the company or its managers which is not provided in the case study, i.e. names, email addresses, phone numbers, etc.). Make sure that your fictional information is consistent with information provided in the case study (name of company, locations, etc.).

b. Section 11 should contain information about the field office's Internet connection Do not include the table. Use the business Internet Services Provider listed at the top of this assignment file. Describe the system interconnection type in this section and service level agreement.

c. Section 12 should contain information derived from the case study. You will need to identify the types of information processed in the field office and then list the laws and regulations which apply. For example, if the case study company processes or stores Protected Health Information, then this section must include information about HIPAA. If the company processes or stores credit card payment information, then this section must include information about the PCI-DSS requirements.

d. Section 13 of the SSP will take the most editing time. Use the information about required security controls as provided security controls baseline.

i. Create 3 sub sections (13.1 Management Controls, 13.2 Operational Controls, and 13.3 Technical Controls). You must provide a description for each category (see the definitions provided in Annex 11.B Minimum Security Controls in NIST SP 800-100 Information Security Handbook: A Guide for Managers).

ii. Using the information provided in the security controls baseline, place the required control families and controls under the correct sub section.

iii. Use the exact names and designators for the security control families and individual security controls. BUT, you MUST paraphrase any and all descriptions. Do NOT cut and paste from NIST documents.

e. Section 14: use the due date for this assignment as the plan complete date.

f. Section 15: leave the approval date blank. You will not have any other text in this section (since the plan is not yet approved).

2. Use a professional format for your System Security Plan. Your document should be consistently formatted throughout and easy to read.

3. Common phrases do not require citations. If there is doubt as to whether or not information requires attribution, provide a footnote with publication information or use APA format citations and references.

4. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without

(a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.

Attachment:- Attachments.rar

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92291552
  • Price:- $60

Priced at Now at $60, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Question suppose we have a disk with capacity 98304 gb if

Question : Suppose we have a disk with capacity 98.304 GB, if number of platters 16, an average of 300 sectors per track and 20,000 tracks per surface. Then calculate the number of bytes per sector.

Need help with a java program that takes two arrays a and b

Need help with a Java program that takes two arrays a and b of length 5 storing int values, and returns the dot product of a and b. That is, it returns an array c of length n such that c[i]=a[i]*b[i].

Take a tour of your building on campus or at work what is

Take a tour of your building on campus or at work. What is secured at night when workers are absent? Record the location and type of physical access control devices. How do these access controls change at night when work ...

Its almost election day and the election officials need a

It's almost election day and the election officials need a program to help tally election results. There are two candidates for office-Polly Tichen and Ernest Orator. The program's job is to take as input the number of v ...

Suppose you are given a connected graph g with edge costs

Suppose you are given a connected graph G, with edge costs that are all distinct. Prove that G has a unique minimum spanning tree.

Tell us about the starbucks corp what it does and makes

Tell us about the Starbucks Corp. what it does, and makes; publically traded or privately owned; how big, etc. 'what' is; it is exposition. Although who is the founders and history of the company; and its sense of social ...

On microsoft word what would be the advantage of using the

On Microsoft word, what would be the advantage of using the dialog box over setting various tabs directly on the ruler line? In what types of typing tasks would you find using the ruler line helpful?

Question what is the relation between virtual memory a

Question : What is the relation between virtual memory, a memory map, physical memory and swapping to secondary memory? The response must be typed, single spaced, must be in times new roman font (size 12) and must follow ...

Question suppose you want to back up a huge file to a cd-r

Question : Suppose you want to back up a huge file to a CD-R. You can do this by splitting the file into smaller pieces and backup up those pieces separately. Write a utility program named FileSplitter that splits a larg ...

Questions1 suppose you have single connected linkedlist try

Questions: 1. Suppose you have single connected linkedlist. Try to print the list from tail to head using recursive thinking. 2. Explain what is the max heap data structure? 3. Suppose I have a linkedlist data structure. ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As