Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

Cybersecurity Questions

In 2-3 brief paragraphs, discuss the pros and cons of FISMA.

 A. Describe and discuss the objectives of policy-makers

B. Describe and discuss the general problems that limit the effectiveness of documents that try to govern Cybersecurity.

C. Discuss ideas that there are for improving national security in light of these issues?

Need Two scholarly references in APA 6th Edition.

FISMA implementation

A. If you are (or were) working for a federal government agency, discuss how well does (or did) your workplace follow FISMA and categorize assets based on FIPS199?

B. Who is responsible for following FIPS 200 and SP800-53 recommendations?

C. Discuss how well have they been implemented?

Need Two scholarly references in APA 6th Edition.

Adherence to FISMA and NIST Recommendations

State whether you agree or disagree with the following statement and explain your reasoning: "Not all federal agencies need to follow FISMA or NIST recommendations for maintaining cybersecurity. After all, if the cyber-infrastructure of the Equal Employment Opportunity Commission (EEOC) is attacked, no real harm is done to anyone except the complainants."

Need Two scholarly references in APA 6th Edition.

Show more
ANSWER

Tutor has posted answer for $20.00. See answer's preview

$20.00

******** *** ****** paperTopic *** *** brief paragraphs ******* *** **** *** **** ** FISMA In ******* ** *** pros *** **** ********* ** ***** ** ** ******* * ********** *********** ******** ********** as well as *********** *** the ******* ********** ** ***** ** these ******* ***** ******** *** ********** of *********** security to the ** ******* and ******** ******** ***** ********* raises *** ***** ** ********* ** *********** ******** ****** ***** ******** ***** The controls **** are selected ***** an ********* **** ** ********** ****** ** ******** ******** pioneers FISMA *** *** ***** to ******* *** ****** of ************** *** budget Despite *** ***** advantages ***** are *********** ************* ** **** **** are ****** ** FISMA *** ** *** **** that it *** not **** **** ********** ** strengthening **** **** information ******** Some of *** factors **** **** **** *** ** explain **** ****** *** embedded ** the ****** that *** ******* ******** have *********** complexity ******** ***** ****** ***** The second ****** propounds **** *** *** ***** ** unfunded ************* ** *** pre-existing ******* *** ***** ****** ******* **** the ACT is unclear and ****** ** ********** **** *** *********** securityA ******** and ******* *** objectives ** ************* *** **** ********* of * policy ***** is ** *** as * ****** for *** ******* ** ********* *********** by ***** consultation *** ******** *** ** ****** *** extract from this *********** *********** ***** ***** ***** ******* ***** Policy makers *** ******** ** ****** ****** **** engage ** ************ to accomplish **** **** ****** ******* information *** be ******** ** ********* ** ****** policy makers *** ******** ** carry *** ******** ******* *** ******* ****** ****** ****** **** have adequate ****** ** be able to ensure *** *********** of ********* ******** **** includes the ability ** ******* statistical *********** ** able to write policy ********* ** ** appropriate language *** seek *** information **** ******* ******* the ************ ****** ***** Eeten ***** ** *** context of cyber ******** the objective ** ****** ****** is ** define how * ********** ********** meets *** ***** *********** *** *** *** policies implementedB ******** and discuss *** ******* ******** **** ***** *** ************* ** documents that *** ** ****** ***** ******** ********* **** *** ** ****** ***** ******** *** ***** limited ** problems ***** ************* ******** their ************* One ******* ******* with *** ********* ** ** ************* bureaucratic ****** ******** ***** ******** ***** **** ****** *** ********** *** ***** ** ********** both ****** *** ******* information ******* through the creation and ********* of several ********* for example *** ***** reporting process *** current ******** that *** ******** cyber ******** *** ***** *********** ** *** ********** they *** ****** ** ***** *** effectiveness ** ********* ******** & ******** ***** **** ** focus is ******* major problem which ** ********* by ******** procedures ** well as ***** ***** ****** ** terms ** ******** *** ********* (Dourado ***** Castillo 2015) In most cases specific ********* that govern ***** ******** ** *** explain *** **** **** ** ** **** ********* ***** ********* *** worst ** *** ** *** **** that they ** not ******* *** **** fit **** *********** national ***** ******** In addition *** ***** **** metrics for ******* milestones *** performance ******** *** *** ***** ********** ** *** strategy ********* ******** ****** Discuss ***** **** ***** *** *** improving national security ** light of ***** ********* ***** ** *** ***** ****** ***** *** many ***** **** *** *** ********* ******** ******** *** ******* *** ********* ** a ****** ******** *** ********* ** enable ************* to ******** their current cyber security ******* ******** ***** ****** ***** *** ***** security *** come ** with ************* *** the ******* ** improvement within **** ********** ******* ***** & Wentz ***** Communications ****** be ******** *** the ******** as **** ** ******** *************** ******* ********** ****** ******* *** ************ *** down ************ ******** **** self ********** ************* ********** ***** ********* ** flexibility ********* ********* and ************* (Luiijf Besseling ***** ***** ***** ** is important ** note **** increasing ********* ** ********** **** not ******* * ****** **** *** been built ** ****** *********** *** ********* *** ********** should ********* *** ********* ** the dynamic ****** of ***** ******** ********** for ******** infrastructure ******* declassification ** *********** ********** ***** cyber ************ 2 ***** *************** ** you *** *** ***** ******* *** * federal ********** ****** ******* *** well does *** **** your ********* ******* FISMA and ********** ****** based ** *********** ****** carries *** ******** assessments ** *** risks *** ********* of **** ***** could ** ****** ** unauthorized ****** *** ********** ********** or *** ************ ** the *********** systems ******* 2012) ******** training ** **** **** *** ********* ** illuminating ******* of *** information ******** ******* and different obligations ** consenting ** the policies *** ******** ********** ******* *** *********** reporting *** ******** ** the ******** *********** **** been *********** ********** and ** addition ********** are ***** ** danger *********** *** ****** *** ****** ******** *** data ******** dangers ** ******** ******** ********** **** ******* *** ****** ******** three goals *** *********** *** information frameworks *************** ** ******** to save ******** ************ for **** ****** and ********** ******* ***** **** ************ *** ******* *** *** ********* of ********** ******** *** restrictive **** ******* integrity *** ****** ******** ******* ********** **** ********** ** annihilation **** ******* ******** ******** *********** *** *********** ** **** ** authenticity *** ************ ********** **** ***** is an ********* and ********** ****** to *** *********** of ***** *** ** responsible *** ********* **** *** *** ******** ******************* ****** ** responsible *** ********* FIPS 200 *** ******** ****** & ******** 2012) **** contains at least ********* security prerequisites *** the ********** *********** *** **** frameworks *** ************* given introduces a **** based ******** **** ******** program ***** addresses *** ****** of ************** ********* *** specialized ******* of ******** *************** *************** accessibility of the ********** **** and ** ******** *** **** ****************** *** ******** ** **** *** ******* ******** *********** through *** application ** ******** ******** ***** are ******** in accordance with the NIST ******** ******* 2015) Agencies *** ******** **** *** *********** to ****** ***** ******** ******* ******** by ********* *** recommendations and conditions **** *** ***** ** * ********** standard ********* activities are ********* *** *** application ** the ******* ******** ************* ** ************ controls *** *** ****** ******* parametersC ******* *** **** have **** **** *************** agency has ******* *** *********** ****** access *** authorized ***** as **** ** ********* that *** ** ****** of the ********** ***** ******* ***** ** regards to ***** *** ************** *** *********** systems ***** *** **** ********* *** ******** ** order ** **** it possible ** ******* ******* *********** *** report ************ *********** ****** ************* ****** usually assesses information ******* ******** control in ***** ** ********* *** effectiveness **** up **** ******* *** *** purpose of ********** ************ and ******** *** ****** *************** ******* ***** *** ********* of *********** ******* with ********** systems ** ***** ******* ****** ***** *** ********** ***** * ************ ****** **** ***** ****** to the consortium’s information ************** ** ***** ******* *** ***** or ******** **** the ********* statement and ******* **** ********** **** *** federal ******** need ** ****** FISMA ** **** *************** *** maintaining cyber ******** ***** *** ** *** ******************** of *** ***** ********** *********** ********** (EEOC) ** attacked ** **** **** ** **** to ****** ****** *** ************** disagree with *** ***** ********** **** ** ******* all ******* ******** are ******** ** ****** **** *** **** *************** for *********** ***** security ******* 2016) ***** ******** all *** federal agencies ** implement ** information ******** program ***** **** * **** ***** ******** in ********* and employing ******** ******** In *** implementation ** the ******* government ******** *** ******** ** ***** ********* ***** *** *********** specific harm **** ***** **** to abuseThe ******* to ********* *** programs *** lead to **** ************ ** *** ******** *** ******* ** **** ** a result of **** information ******** ******* ******* ***** The ********** greatly ********* the ********** of a ******** ****** ***** ****** ** **** with attacks **** *** ******** ******** ** *** **** *** ******* in 2009 ********** ******* ******* shut **** *** ******** ** *** ** department ** ************** the ******** ********** *** *** ******* ***** ********** **** *** **** ** * ****** **** **** ******** many major government ******** Despite *** ******* on ******* ******** *** ***** ***** ** well ** *** ******** *** ********** ** ******* *** *** ****** ** their *********************** J * ***** ***** * J ****** Cybersecurity: *********** ********** externalities and ****** options ****************** ****** 33 ***************** * ***** * Dynes * ***** ******* * (2010) Protecting ******** information infrastructure: Developing cybersecurity ****** 83-91Dourado E ***** Castillo A ***** 6 *** **** ******* ************* ******* ******** of ************ Approach Retrieved from ******** ** ******* ***************************************************************************************************** * * ***** Philpott * * (2012) ***** and *** **** management framework: *** *** ******** ** ******* cyber ******** New York: ************* * * ****** ******** to cyber *********** ******* Monterey CA: ***** ************ ****** ************** * D ****** ***** ********** *** **** Practices: Beyond Compliance New ***** CRC *********** * * ***** * * ***** Wentz * * ****** ********** *** national ******** *** ***** ******* *********** S ****** ********* with ******** ********** and Standards ******** ******** 39-58Luiijf * ********* K ***** ***** * * ****** ******** ******** ***** ******** ********** ************* ******* ** ******** *************** ********** * ****** * ********* for Analyzing ******* *********** *** *********** Security Digital ************ * ****** Assessing *** ******* that ********* compliance with the ******* *********** ******** ********** *** **** UniversityWhite * ****** The ******* Information ******** ********** *** ** 2002: * Potemkin Village ******* *** ****** *******

or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question