security professional please be one 1

User Generated

Bzne4335

Computer Science

Description

Using the five vulnerabilities you described last week, consider the impact to your entity if the vulnerability is exploited.  Based on the impact prioritize the security controls to fix the vulnerability.  Explain what are the top three controls you think should be implemented and why.

toyProject1.doc

Unformatted Attachment Preview

Toy Project Security Controls Salon’s Entity Threats and Vulnerabilities NIST 800-53 Ver. 4 Security Controls Hacker RA-5 VULNERABILITY SCANNING. Control: The organization: a. checks for discrepancy in the information system and applications. Dishonest Employees. AC-7 UNSUCCESSFUL LOGIN ATTEMPTS Control: The information system: a. Restricts the number of attempts. b. Automate the number of attempts. c. Account will be locked automatic. d. The login will be delayed. Spam from Email SI-8 SPAM PROTECTION Control: The organization: a. Protection mechanisms at the entry and exit level of the workstations. b. Action will be taken for unsolicited messages that are passed across. c. Frequent updation of the spam protection mechanisms. . Spyware/Malware downloads AT-1 SECURITY AWARENESS AND TRAINING POLICY AND PROCEDURES Control: Selecting, reviewing, and updating the reviews. a. Properly formatted security awareness and training policy. The training policy determines responsibility and compliance. b. To enhance the security implementation and controls of training. Floods CP-9 INFORMATION SYSTEM BACKUP Control: The organization: a. Provides the back-up for the user-level information. b. Provides the backup for the system level information. ; Tornadoes SC-5 - DENIAL OF SERVICE PROTECTION Control: Restricts the effect of denial services. Network outage MA-2 CONTROLLED MAINTENANCE Control: The organization: a. Major task is the preparation, documentation, reviewing the records. b. Approval of all the activities that is required for the maintenance and determining the location of equipmental service. Chemical liquid leak IR-2 INCIDENT RESPONSE TRAINING Control: Immediate training to the system users those who are assigned with the roles and responsibilities. a. Prior to providing authorization to the information system. b. Changing the information required in the information systems. Power outage. PE-11 EMERGENCY POWER Control: Providing uninterrupted power supply. Periodic transform of information, transition of the information. . Electrical Fire EMERGENCY SHUTOFF Control: The organization: a. Ability for reducing the power capability by individual system. b. Provides shutoff switches for emergency or devices in the location. c. Prevents unauthorized power shutoff through unauthorized activation.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer


Anonymous
Awesome! Made my life easier.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags