Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Project: System Security Plan

Company Background & Operating Environment -

The assigned case study and attachments to this assignment provide information about "the company."

  • Use the Baltimore field office as the target for the System Security Plan.
  • Use Verizon FiOS as the Internet Services Provider.

Policy Issue & Plan of Action -

A recent risk assessment highlighted the need to formalize the security measures required to protect information, information systems, and the information infrastructures for the company's field offices. This requirement has been incorporated into the company's risk management plan and the company's CISO has been tasked with developing, documenting, and implementing the required security measures. The IT Governance board also has a role to play since it must review and approve all changes which affect IT systems under its purview.

The CISO has proposed a plan of action which includes developing system security plans using guidance from NIST SP-800-18 Guide for Developing Security Plans for Federal Information Systems. The IT Governance board, after reviewing the CISO's proposed plan of action,voted and accepted this recommendation. In its discussions prior to the vote, the CISO explained why the best practices information for security plans from NIST SP 800-18 was suitable for the company's use. The board also accepted the CISO's recommendation for creating a single System Security Plan for a General Support Systemsince, in the CISO's professional judgement, this type of plan wouldbest meet the"formalization" requirement from the company's recently adopted risk management strategy.

Your Task Assignment -

As a staff member supporting the CISO, you have been asked to research and then draft the required system security plan for a General Support System. In your research so far, you have learned that:

  • A general support system is defined as "an interconnected set of information resources under the same direct management control that shares common functionality." (See NIST SP 800-18)
  • The Field Office manager is the designated system owner for the IT support systems in his or her field office.
  • The system boundaries for the field office General Support System have already been documented in the company's enterprise architecture (see the case study).
  • The security controls required for the field office IT systems have been documented in a security controls baseline (see the controls baseline attached to this assignment).

Research:

1. Review the information provided in the case study and in this assignment, especially the information about the field offices and the IT systems and networks used in their day to day business affairs.

2. Review NIST's guidance for developing a System Security Plan for a general support IT System.  This information is presented in NIST SP 800-18.

3. Review the definitions for IT Security control families as documented in Federal Information Processing Standard (FIPS) 200: Minimum Security Requirements for Federal Information and Information Systems(see section 3).

4. Review the definitions for individual controls as listed in Appendix F Security Control Catalog in NIST SP 800-53 Security and Privacy Controls for Federal Information Systems and Organizations.

Attachment:- Assignment Files.rar

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92478077

Have any Question?


Related Questions in Computer Network & Security

Toms income is 480and he spends it on two goods x and y his

Tom's income is $480and he spends it on two goods, X and Y. His utility function is U = XY. Both X and Y sells for $8 per unit.   a. Use lagrangian function to calculate Tom's utility-maximizing purchases of X and Y.  b. ...

Question calculate the total time required to transfer a

Question: Calculate the total time required to transfer a 1.5-MB file in the following cases, assuming an RTT of 80 ms, a packet size of 1 KB data, and an initial 2 × RTT of "handshaking" before data is sent: (a) The ban ...

Content analysis assignmentoverviewthis assignment has

Content Analysis Assignment Overview This assignment has three major aims: - To help students gain good understanding of theoretical and practical material. - To encourage students to use content analysis summaries to pr ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Short answers1 the discussion question to debate is how

Short Answers: 1. The discussion question to debate is how have companies like Apple, Microsoft and the big providers (ATT, Verizon, Sprint, etc) impacted communication today? 2. Technology wise what do you imagine for t ...

Question suppose public-key cryptography is used to encrypt

Question : Suppose public-key cryptography is used to encrypt the communications between Alice and Bob. Alice's public key is eA, private key is dA; Bob's public key is private key is de. Now Bob wants to send a message ...

Part - athe assignmentwrite a critique review of the

Part - A The assignment Write a critique / review of the following paper: Mark Pollitt Eoghan Casey David-Olivier Jaquet-Chiffelle Pavel Gladyshev, "A Framework for Harmonizing Forensic Science Practices and Digital/Mult ...

The software company niksoft is selling a new defense

The software company NikSoft is selling a new defense against DDoS attacks. Their software looks at the source IP address on all incoming packets, and if it finds any IP address that accounts for more than 1% of traffic ...

Overview of network security assessment - security

Overview of Network Security Assessment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

Assignment -need project made by packet truce follow the

Assignment - Need project made by packet Truce. Follow the given report and please don't make the project big and video will describe full project in details and with configuration. Project - Design and Implementation of ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As