Need help with a question. Assignment Content 1. Top of Form As the CISO for a health care organization, you are tasked with the following: ·

Need help with a question.

Assignment Content

1.

Top of Form

As the CISO for a health care organization, you are tasked with the following:

· Analyze an information system for determining the selection of security control objectives in order to manage information security risk and apply that gained knowledge to build a security assessment plan.

· Assess information security controls to mitigate risks and secure operations for a specified industry organization.

 

Read the
NewTab Project Profile document and
refer to FIPS Publication 200,

Minimum Security Requirements for Federal Information and Information Systems
.

Part A: Security Assessment Plan

Create a 3- to 4-page security assessment plan (SAP) in Microsoft® Word that includes the following:

· Short summary of the NewTab project

· Description of each of the 11 security control families as documented in FIPS Publication 200 and listed in the NewTab Project Profile

· Priority list of the top 5 security control families of concern, based on their applicability to the NewTab project

· Explanation of your rationale for the top 5 security control families that must be analyzed and assessed in order to determine any vulnerabilities that the NewTab solution may have

 

Part B: Build the POA&M

Based on the list of 7 vulnerabilities provided in the NewTab Project Profile and the information from the SAP you wrote in Part A,
complete a 3- to 4-page POA&M using the
Plan of Action and Milestones (POA&M) Worksheet.

Cite any references according to APA guidelines.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

follow the Instructions in the  attach Documents to complete this work. Follow the Rubric Research Report #1: Data Breach Incident Analysis and

follow the Instructions in the  attach Documents to complete this work. Follow the Rubric Research Report #1: Data Breach Incident Analysis and Report  Scenario  Padgett-Beale Inc.’s (PBI) insurance company, CyberOne Business and Casualty Insurance Ltd, sent an audit team to review the company’s security policies, processes, and plans. The auditors

Can someone complete this for me

Can someone complete this for me ? ID mSysRowId 1 ua06Ftxxo5DT29FEtU6s2GsIH4WBra7Vmm9mzoDmd4hFWmgWHD2q19Uh6gZgjcdYJD5KAfiSoqJNYPVYozboMdrWC5/boC+GqAv6ldlKwK76KrWnq6AoA9zoHkqnmH8kRWOuUZ6tXLQ=-~LyErwg/RbqxliP9sRDATWA==

  Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can

  Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can be used to ensure secure electronic transfer, provide authentication for communications requiring data integrity and stringent proof of identity. The public/private keys created as part of PKI digital certificates can