
HI6006 Competitive Strategy Editing Service
Delivery in day(s): 4
The paper delves into outlining particular descriptions of cyber security design measures, as prescribed at the National Institute of Standards and Technology (NIST). The baselines for security control are divided into their family names, and the research method seeks to investigate on two categories as follows:
The AC category section refers to the formation of policy and process effectively, for the execution of chosen controls.
It conveys awareness to security and policies of training that hand aims, coverage, roles, and conformism among the organization’s entities.
The section covers administration of policy and processes involving auditing events, checking audit records, storage capacity as well as mitigating failures.
The section covers effectual execution of security controls and CA family regulatory enhancements.
Is in the CM family and reflects on federal law relevant policies and processes.
Belongs to the CP category including contingency programming, conditioning, program examination and updating changes in site.
Belongs to the IA family and involves picking users, symbol marking, resubmission checker, cryptography and service verification.
Belongs to the IR category whose functions include conditioning for incidences reaction, counter measuring and their assessments.
Belongs to the MA family that involve up keeping control, tools, remote upkeep, personnel upkeep as well as time.
Belongs to MP category which include functions to approach media, branding, storage, utilisation, transport and sanitization.
Belongs to the PE family which constitutes of forcible approaches to admission, manipulation on media coverage, publishing, supervision of content, emergency lighting and power generation.
Falls into the PL category involving plans for the network security, updating and behavioral analysis.
Categorised in the PS classes of designing jeopardy positions, covering of individuals, elimination, transfers, conventions and sanctioning.
Is under the RA classes of security classification, scanning of weaknesses, assessing jeopardy and expert surveying
Belonging to SA category which involves assigning resources, life cycle to develop systems (SDLC), procedures for acquisition. Similarly, the section comprises of several necessities behind security including functions, effectiveness, confidence and paper related needs.
Categorised as an SC, it comprises of the application segmentation, distinguishing security parts from non-security parts, portioned out resources of information, coverage from denial of service, provision of resources and communication trustworthiness.
Finally, the SI category includes remedying faults, cover from vicious code, supervision, validation of security operations, integrity in software as well as protection from spam.
[1] Force, J.T. and Initiative, T., 2013. Security and privacy controls for federalinformation systemsand organizations. NIST Special Publication, 800(53), pp.8-13.
[2] Kim, D. and Solomon, M.G., 2016. Fundamentals of information systems security. Jones & Bartlett Publishers.
[3] Mell, P. and Grance, T., 2011. The NIST definition of cloud computing.
[4] Ross, R.S., 2013. Security and Privacy Controls for Federal Information Systems and Organizations [includes updates as of 5/7/13] (No. Special Publication (NIST SP)-800-53 Rev 4)