Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

You have been hired as a security specialist by a company to provide methods and recommendations to create a more secure environment for company data.Write a 1- to 2-page recommendation paper outlinin

You have been hired as a security specialist by a company to provide methods and recommendations to create a more secure environment for company data.

Write a 1- to 2-page recommendation paper outlining methods the company should consider to protect access to data, including recommendations for policies to be enacted that will increase data security.

In Ch. 1, "Introduction to Information Security," of Elementary Information Security, you read about National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and how it expands on the CIA concepts.

Assume that a security model is needed for the protection of information in your class. 

In a 1/2- to 1-page paper, describe the RMF and how it relates to the CIA concepts and expands on them. Explain how this framework is used to address the need to protect information in your class.

Show more
  • @
  • 1533 orders completed
ANSWER

Tutor has posted answer for $12.00. See answer's preview

$12.00

**** customers *** business ****** are ****** * threat on ***** ******** *** data; **** has *** ** effective method *** data ** ** to ****** *** integrity ** ****** **** *** ********* ************ **** ********** ** **** ********* ********** ** *** event **** *** ********* *** ***** security ***** **** **** ******** There *** several approaches and ******* that *** **** to ******* ********* and ******** is **** ****** Data backup ** very ********* *** a ******** *** **** a ******** ** enables *** had to **** * **** ** *** **** data *** ****** at * ********* ******** ******* can ** ****** full back up or ********** ****** **** ** ***** ******* ****** ** ** ** ******* ******** information **** ***** ** a ************** ** of *** ********** ** **** windows **** ** and ****** **** ******* ********** **** ****** **** **** ** ********** *** ** used to ******* **** *** files ****** ** * *********** *** ************* ******** because ** **** * *********** ** ********* *** ********** *********** *** ******** ******* * **** should **** ** *** certification ***** ** ****** ****** by ****** certified ************ ***** *** to protect ******** **** is ** *** ** hide ** **** ************* **** ** * ******* **** ** **** to **** a **** ****** * **** *** example * **** ******* can ** hidden within * jpg ***** ** * ****** picture *** **** ** always ********* first **** ****** ****** *** ***** ******* ** **** **** ** ******** is StegoMagic *** free *** ** *** ******* **** *********** and **** it in either *** ** a TXT ******* *** ***** ********** framework) **** side ** **** **** CIA ******** **** ** because ** ***** ** identify risk and *** ******* **** **** tend to ***** ***** are **** ******* that can ****** *** CIA to which ** full is confidentiality ********* *** ************ **** raises *** question of ***** **** ** **** ********* **** a ******* ***** to focus ** so **** **** can be **** to ******** *** **** **** *** be ******** ****** the processThrough *** RMF ***** *** ****** *** very ********* ************* **** ** ** **** and ** used ** specify *** ******** ***** **** ****** ** ********* *** ***** that are of much significance **** ** **** ** ******** that the **** *** been able ** ******** ***** *** ****** ** each **** **** ************ *** risk ** how they will *****

Click here to download attached files: data protection.doc
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question