Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Sample Cybersecurity Profile (System Security Plan)

Overview

Every organization must create a cybersecurity profile (system security plan (SSP)) for all of its major and minor information systems. The cybersecurity profile documents the current and planned controls for the system and addresses security concerns that may affect the system's operating environment. The cybersecurity profile includes security categorizations and security controls, and is included in the certification and accreditation package. For this project, you will create a sample cybersecurity profile describing the security posture for HHS (Dept of Health & Human Service).


Learning Objectives

After completing this project, students will be able to



Select and incorporate appropriate management, technical, and operational security controls into a system security plan.
Integrate and evaluate management, technical, and operational controls in the context of an information security program.
Develop a sample System Security Plan for an information system.


Deliverable

Your sample cybersecurity profile should be at least five full pages, double spaced, 1-inch margins, in New Times Roman 12-pitch font, with a cover page (name, course number, date, title of paper) and a reference page. The cover page and reference page are not included in the five-page minimum. Papers not meeting the five full-page minimum will lose points. You must have at least three sources, correctly formatted per APA guidelines.



Detailed Description of Learning Activity

Read NIST Special Publication 800-53 Rev 4 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, Building Effective Security Assessment Plans.
Review the sample System Security Plan template provided by your instructor.
Select one management, one technical, and one operational control that apply to your selected organization (i.e., Risk Assessment-RA).
Describe each control. Include why these controls are required.
For each management, technical, and operational control, select two family controls (Vulnerability Scanning-RA-5).
Describe each family control, state the implementation status as it relates to your selected organization's security program, and describe how your selected organization implements the control.
Write your sample cybersecurity profile. At a minimum, the profile should include
an Introduction that includes the purpose of your paper and introduces security profiles as they relate to your selected organization
an Analysis section that includes Items 3-6 above
a Conclusion that summarizes what you wrote
Use spell and grammar check before submitting. It is also a good idea to have someone else read your paper. You should also review the grading rubric below to ensure that you have all the graded components.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91072382

Have any Question?


Related Questions in Computer Engineering

Lab assessment questions 1 what is the one thing that a

Lab Assessment Questions: 1. What is the one thing that a virus, a worm, spyware, and malicious code have in common? What are the differences among these three threats: a virus, a worm, and spyware? 2. How often should y ...

Explain a situation using the supply and demand for skilled

Explain a situation using the supply and demand for skilled labor in which the increased number of college graduates leads to depressed wages. Given the rising cost of going to college, explain why a college education wi ...

Scenario you have been asked to setup a lvm volume for the

Scenario: You have been asked to setup a LVM volume for the Sales group. Your task is to use /dev/sdb to create a logical volume named sales_lvm, format it with XFS, and mount under /sales. Make sure the sales group owns ...

From a security standpoint do you believe the apple

From a security standpoint, do you believe the Apple approach of hiding permissions or the Android approach of requiring the user to accept application permissions is a better approach? Why do you feel this way and do yo ...

Suppose that an algorithm takes 30 seconds for an input of

Suppose that an algorithm takes 30 seconds for an input of 224 elements (with some particular, but unspecified speed in instructions per second). Estimate how long the same algorithm, running on the same hardware, would ...

Question suppose you are the analyst charged with

Question : Suppose you are the analyst charged with developing a new system to help senior managers make better strategic decisions. What methodology would you use? How would the business strategy affect your approach? W ...

Question suppose you are now acting as a consultant to an

Question : Suppose you are now acting as a consultant to an organization of your choice that has one or more specific compliance requirements. Considering this scenario, respond to the following: • Describe your selected ...

You randomly sample 50 theaters in the united states you

You randomly sample 50 theaters in the United States. You ask those theaters how much they charge for a large popcorn, and you get a sample mean of $6. Then, you make confidence interval using this data with the lower li ...

You have a senior project you have to write 20 page long

You have a senior project You have to write 20 page long pages. You also have to make a project on a card explain what i m talkiing about. it should CIS program so utilize thre SDLC project management, databases, coding, ...

You are given a test to enter graduate school you must

You are given a test to enter graduate school. You must select 10 of the 13 essay questions to answer to determine your writing skills. How many ways can you select those questions?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As