SlideShare a Scribd company logo
1 of 2
Download to read offline
"Security Standards" Please respond to the following: A number of organizations exist to define
information security standards. Explain the importance of standards organizations with regard to
both information systems and information systems security. Provide a rationale for your
response. Determine two (2) specific concerns that you believe exist for cloud deployments, and
ascertain whether or not data breaches, such as the Snowden Incident have heightened concerns.
Justify your answer.
Solution
Information security for information systems are key for sustaining the organization and its
identity in the information technology environment. As per the continues improvement on
sustaining system, information systems security standardization was created huge importance to
secure the organization information and to maintain certain guidelines to mitigate problems.
The following standard organizations provide guidelines and required certifications for business
organizations to ensure the security of information systems.
American National Standards Institute (ANSI)
Global Engineering Documents
British Standards Institute (BSi)
British Standard 7799 (BS7799)
Center for Internet Security (CIS)
Institute of Electrical and Electronic Engineers (IEEE)
IEEE standards that relate to Security
International Information Systems Security Certification Consortium, Inc. (ISC)2
International Organization for Standardization (ISO)
ISO/IEC 17799:2000
ISO 17799 Community Forum
Internet Architecture Board (IAB)
Internet Assigned Numbers Authority (IANA)
National Institute of Standards and Technology (NIST)
Computer Security Resource Center (CSRC)
Guide to NIST Information Security Documents
Federal Information Processing Standard 200 (FIPS 200)
Federal Information Processing Standard 201 (FIPS 201-1)
Guide for Developing Security Plans for Federal Information Systems
Federal Desktop Core Configuration (FDCC)
National Security Agency (NSA)
Rationale: It is always recommend to apply at least to follow any of the applicable
standardization guidelines, in order to keep sustainable information systems in organization.
Standardization always says and improves the security and controls on allowing security
breaches to our MIS.
Recent times could computing has become the predominant growth for small and medium scale
organization to mitigate the cost of implementation on information systems. Security of the same
and allowing access to external agents is so critical which is directly granting access to important
data. Like the above standard guidelines tell us to maintain the NDAs, system access controls.

More Related Content

Similar to Security Standards Please respond to the following A number of .pdf

S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
ย 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
ย 
Assignment ContentThe director of IT has indicated that th.docx
Assignment ContentThe director of IT has indicated that th.docxAssignment ContentThe director of IT has indicated that th.docx
Assignment ContentThe director of IT has indicated that th.docxelinoraudley582231
ย 
Standards & Framework.ppt
Standards & Framework.pptStandards & Framework.ppt
Standards & Framework.pptkarthikvcyber
ย 
ISO/IEC 27032 โ€“ Guidelines For Cyber Security
ISO/IEC 27032 โ€“ Guidelines For Cyber SecurityISO/IEC 27032 โ€“ Guidelines For Cyber Security
ISO/IEC 27032 โ€“ Guidelines For Cyber SecurityTharindunuwan9
ย 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxStevenTharp2
ย 
5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On InternetAna Meskovska
ย 
PCI Compliance white paper
PCI Compliance white paper PCI Compliance white paper
PCI Compliance white paper HelpSystems
ย 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...Cohesive Networks
ย 
DojoSec FISMA Presentation
DojoSec FISMA PresentationDojoSec FISMA Presentation
DojoSec FISMA Presentationdanphilpott
ย 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Mukesh Chinta
ย 
CMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to Know
CMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to KnowCMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to Know
CMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to KnowPECB
ย 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data LeakagePatty Buckley
ย 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security TutorialNeil Matatall
ย 
Metholodogies and Security Standards
Metholodogies and Security StandardsMetholodogies and Security Standards
Metholodogies and Security StandardsConferencias FIST
ย 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management ActMichelle Singh
ย 
Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16Dave Darnell
ย 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Mukesh Chinta
ย 
Bhadale group of companies quality standards catalogue
Bhadale group of companies quality standards catalogueBhadale group of companies quality standards catalogue
Bhadale group of companies quality standards catalogueVijayananda Mohire
ย 

Similar to Security Standards Please respond to the following A number of .pdf (20)

S nandakumar
S nandakumarS nandakumar
S nandakumar
ย 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
ย 
Assignment ContentThe director of IT has indicated that th.docx
Assignment ContentThe director of IT has indicated that th.docxAssignment ContentThe director of IT has indicated that th.docx
Assignment ContentThe director of IT has indicated that th.docx
ย 
Standards & Framework.ppt
Standards & Framework.pptStandards & Framework.ppt
Standards & Framework.ppt
ย 
ISO/IEC 27032 โ€“ Guidelines For Cyber Security
ISO/IEC 27032 โ€“ Guidelines For Cyber SecurityISO/IEC 27032 โ€“ Guidelines For Cyber Security
ISO/IEC 27032 โ€“ Guidelines For Cyber Security
ย 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
ย 
5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet
ย 
PCI Compliance white paper
PCI Compliance white paper PCI Compliance white paper
PCI Compliance white paper
ย 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
ย 
DojoSec FISMA Presentation
DojoSec FISMA PresentationDojoSec FISMA Presentation
DojoSec FISMA Presentation
ย 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
ย 
CMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to Know
CMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to KnowCMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to Know
CMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to Know
ย 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
ย 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security Tutorial
ย 
Metholodogies and Security Standards
Metholodogies and Security StandardsMetholodogies and Security Standards
Metholodogies and Security Standards
ย 
Cybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdfCybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdf
ย 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
ย 
Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16
ย 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
ย 
Bhadale group of companies quality standards catalogue
Bhadale group of companies quality standards catalogueBhadale group of companies quality standards catalogue
Bhadale group of companies quality standards catalogue
ย 

More from fsenterprises

Why do you believe money laundering is a difficult fraud to investig.pdf
Why do you believe money laundering is a difficult fraud to investig.pdfWhy do you believe money laundering is a difficult fraud to investig.pdf
Why do you believe money laundering is a difficult fraud to investig.pdffsenterprises
ย 
Which of the following is a characteristic of Baroque instrumental m.pdf
Which of the following is a characteristic of Baroque instrumental m.pdfWhich of the following is a characteristic of Baroque instrumental m.pdf
Which of the following is a characteristic of Baroque instrumental m.pdffsenterprises
ย 
What was the energy that was not passed on to the next trophic le.pdf
What was the energy that was not passed on to the next trophic le.pdfWhat was the energy that was not passed on to the next trophic le.pdf
What was the energy that was not passed on to the next trophic le.pdffsenterprises
ย 
What sort of religious ideas does the megalith Stonehenge suggest A.pdf
What sort of religious ideas does the megalith Stonehenge suggest A.pdfWhat sort of religious ideas does the megalith Stonehenge suggest A.pdf
What sort of religious ideas does the megalith Stonehenge suggest A.pdffsenterprises
ย 
What are successful approaches to forecasting and creating a needed .pdf
What are successful approaches to forecasting and creating a needed .pdfWhat are successful approaches to forecasting and creating a needed .pdf
What are successful approaches to forecasting and creating a needed .pdffsenterprises
ย 
Were writing code for a project that dynamically allocates an arra.pdf
Were writing code for a project that dynamically allocates an arra.pdfWere writing code for a project that dynamically allocates an arra.pdf
Were writing code for a project that dynamically allocates an arra.pdffsenterprises
ย 
What are the major challenges for managing health care information t.pdf
What are the major challenges for managing health care information t.pdfWhat are the major challenges for managing health care information t.pdf
What are the major challenges for managing health care information t.pdffsenterprises
ย 
Using the Tustin equivalence with the prewarping method, fnd the dis.pdf
Using the Tustin equivalence with the prewarping method, fnd the dis.pdfUsing the Tustin equivalence with the prewarping method, fnd the dis.pdf
Using the Tustin equivalence with the prewarping method, fnd the dis.pdffsenterprises
ย 
Use Java programming Thank you very much Programing requirement for.pdf
Use Java programming Thank you very much Programing requirement for.pdfUse Java programming Thank you very much Programing requirement for.pdf
Use Java programming Thank you very much Programing requirement for.pdffsenterprises
ย 
Translate the following C++ code segment into Mic-1 IJVM machine lan.pdf
Translate the following C++ code segment into Mic-1 IJVM machine lan.pdfTranslate the following C++ code segment into Mic-1 IJVM machine lan.pdf
Translate the following C++ code segment into Mic-1 IJVM machine lan.pdffsenterprises
ย 
Transactions On September 1 of the current year, Joy Tucker estab.pdf
Transactions On September 1 of the current year, Joy Tucker estab.pdfTransactions On September 1 of the current year, Joy Tucker estab.pdf
Transactions On September 1 of the current year, Joy Tucker estab.pdffsenterprises
ย 
To correct the vision of a person who is nearR sighted, we use a div.pdf
To correct the vision of a person who is nearR sighted, we use a div.pdfTo correct the vision of a person who is nearR sighted, we use a div.pdf
To correct the vision of a person who is nearR sighted, we use a div.pdffsenterprises
ย 
The height of the water in the tank pictured below 7 ft. The tank is.pdf
The height of the water in the tank pictured below 7 ft. The tank is.pdfThe height of the water in the tank pictured below 7 ft. The tank is.pdf
The height of the water in the tank pictured below 7 ft. The tank is.pdffsenterprises
ย 
Suppose that a classroom has 4 light bulbs. The probability that eac.pdf
Suppose that a classroom has 4 light bulbs. The probability that eac.pdfSuppose that a classroom has 4 light bulbs. The probability that eac.pdf
Suppose that a classroom has 4 light bulbs. The probability that eac.pdffsenterprises
ย 
Real Estate Finance essay questionWhy did observers at first belie.pdf
Real Estate Finance essay questionWhy did observers at first belie.pdfReal Estate Finance essay questionWhy did observers at first belie.pdf
Real Estate Finance essay questionWhy did observers at first belie.pdffsenterprises
ย 
Provide your key points of Setup Reducation Provide your key points.pdf
Provide your key points of Setup Reducation  Provide your key points.pdfProvide your key points of Setup Reducation  Provide your key points.pdf
Provide your key points of Setup Reducation Provide your key points.pdffsenterprises
ย 
Please help. C++ The program is an interactive program th.pdf
Please help. C++ The program is an interactive program th.pdfPlease help. C++ The program is an interactive program th.pdf
Please help. C++ The program is an interactive program th.pdffsenterprises
ย 
please answer this case using down picturein business ethics emplo.pdf
please answer this case using down picturein business ethics emplo.pdfplease answer this case using down picturein business ethics emplo.pdf
please answer this case using down picturein business ethics emplo.pdffsenterprises
ย 
Al has three times as much money as Bill. Bill has two times as much.pdf
Al has three times as much money as Bill. Bill has two times as much.pdfAl has three times as much money as Bill. Bill has two times as much.pdf
Al has three times as much money as Bill. Bill has two times as much.pdffsenterprises
ย 
A SURVEY is a tool used to collect information about a population. L.pdf
A SURVEY is a tool used to collect information about a population. L.pdfA SURVEY is a tool used to collect information about a population. L.pdf
A SURVEY is a tool used to collect information about a population. L.pdffsenterprises
ย 

More from fsenterprises (20)

Why do you believe money laundering is a difficult fraud to investig.pdf
Why do you believe money laundering is a difficult fraud to investig.pdfWhy do you believe money laundering is a difficult fraud to investig.pdf
Why do you believe money laundering is a difficult fraud to investig.pdf
ย 
Which of the following is a characteristic of Baroque instrumental m.pdf
Which of the following is a characteristic of Baroque instrumental m.pdfWhich of the following is a characteristic of Baroque instrumental m.pdf
Which of the following is a characteristic of Baroque instrumental m.pdf
ย 
What was the energy that was not passed on to the next trophic le.pdf
What was the energy that was not passed on to the next trophic le.pdfWhat was the energy that was not passed on to the next trophic le.pdf
What was the energy that was not passed on to the next trophic le.pdf
ย 
What sort of religious ideas does the megalith Stonehenge suggest A.pdf
What sort of religious ideas does the megalith Stonehenge suggest A.pdfWhat sort of religious ideas does the megalith Stonehenge suggest A.pdf
What sort of religious ideas does the megalith Stonehenge suggest A.pdf
ย 
What are successful approaches to forecasting and creating a needed .pdf
What are successful approaches to forecasting and creating a needed .pdfWhat are successful approaches to forecasting and creating a needed .pdf
What are successful approaches to forecasting and creating a needed .pdf
ย 
Were writing code for a project that dynamically allocates an arra.pdf
Were writing code for a project that dynamically allocates an arra.pdfWere writing code for a project that dynamically allocates an arra.pdf
Were writing code for a project that dynamically allocates an arra.pdf
ย 
What are the major challenges for managing health care information t.pdf
What are the major challenges for managing health care information t.pdfWhat are the major challenges for managing health care information t.pdf
What are the major challenges for managing health care information t.pdf
ย 
Using the Tustin equivalence with the prewarping method, fnd the dis.pdf
Using the Tustin equivalence with the prewarping method, fnd the dis.pdfUsing the Tustin equivalence with the prewarping method, fnd the dis.pdf
Using the Tustin equivalence with the prewarping method, fnd the dis.pdf
ย 
Use Java programming Thank you very much Programing requirement for.pdf
Use Java programming Thank you very much Programing requirement for.pdfUse Java programming Thank you very much Programing requirement for.pdf
Use Java programming Thank you very much Programing requirement for.pdf
ย 
Translate the following C++ code segment into Mic-1 IJVM machine lan.pdf
Translate the following C++ code segment into Mic-1 IJVM machine lan.pdfTranslate the following C++ code segment into Mic-1 IJVM machine lan.pdf
Translate the following C++ code segment into Mic-1 IJVM machine lan.pdf
ย 
Transactions On September 1 of the current year, Joy Tucker estab.pdf
Transactions On September 1 of the current year, Joy Tucker estab.pdfTransactions On September 1 of the current year, Joy Tucker estab.pdf
Transactions On September 1 of the current year, Joy Tucker estab.pdf
ย 
To correct the vision of a person who is nearR sighted, we use a div.pdf
To correct the vision of a person who is nearR sighted, we use a div.pdfTo correct the vision of a person who is nearR sighted, we use a div.pdf
To correct the vision of a person who is nearR sighted, we use a div.pdf
ย 
The height of the water in the tank pictured below 7 ft. The tank is.pdf
The height of the water in the tank pictured below 7 ft. The tank is.pdfThe height of the water in the tank pictured below 7 ft. The tank is.pdf
The height of the water in the tank pictured below 7 ft. The tank is.pdf
ย 
Suppose that a classroom has 4 light bulbs. The probability that eac.pdf
Suppose that a classroom has 4 light bulbs. The probability that eac.pdfSuppose that a classroom has 4 light bulbs. The probability that eac.pdf
Suppose that a classroom has 4 light bulbs. The probability that eac.pdf
ย 
Real Estate Finance essay questionWhy did observers at first belie.pdf
Real Estate Finance essay questionWhy did observers at first belie.pdfReal Estate Finance essay questionWhy did observers at first belie.pdf
Real Estate Finance essay questionWhy did observers at first belie.pdf
ย 
Provide your key points of Setup Reducation Provide your key points.pdf
Provide your key points of Setup Reducation  Provide your key points.pdfProvide your key points of Setup Reducation  Provide your key points.pdf
Provide your key points of Setup Reducation Provide your key points.pdf
ย 
Please help. C++ The program is an interactive program th.pdf
Please help. C++ The program is an interactive program th.pdfPlease help. C++ The program is an interactive program th.pdf
Please help. C++ The program is an interactive program th.pdf
ย 
please answer this case using down picturein business ethics emplo.pdf
please answer this case using down picturein business ethics emplo.pdfplease answer this case using down picturein business ethics emplo.pdf
please answer this case using down picturein business ethics emplo.pdf
ย 
Al has three times as much money as Bill. Bill has two times as much.pdf
Al has three times as much money as Bill. Bill has two times as much.pdfAl has three times as much money as Bill. Bill has two times as much.pdf
Al has three times as much money as Bill. Bill has two times as much.pdf
ย 
A SURVEY is a tool used to collect information about a population. L.pdf
A SURVEY is a tool used to collect information about a population. L.pdfA SURVEY is a tool used to collect information about a population. L.pdf
A SURVEY is a tool used to collect information about a population. L.pdf
ย 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
ย 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
ย 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
ย 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
ย 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
ย 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
ย 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
ย 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
ย 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
ย 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
ย 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
ย 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
ย 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
ย 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
ย 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
ย 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)โ€”โ€”โ€”โ€”IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)โ€”โ€”โ€”โ€”IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)โ€”โ€”โ€”โ€”IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)โ€”โ€”โ€”โ€”IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
ย 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
ย 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
ย 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
ย 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
ย 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
ย 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
ย 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
ย 
Model Call Girl in Bikash Puri Delhi reach out to us at ๐Ÿ”9953056974๐Ÿ”
Model Call Girl in Bikash Puri  Delhi reach out to us at ๐Ÿ”9953056974๐Ÿ”Model Call Girl in Bikash Puri  Delhi reach out to us at ๐Ÿ”9953056974๐Ÿ”
Model Call Girl in Bikash Puri Delhi reach out to us at ๐Ÿ”9953056974๐Ÿ”
ย 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
ย 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
ย 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
ย 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
ย 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
ย 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
ย 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
ย 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
ย 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
ย 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
ย 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
ย 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)โ€”โ€”โ€”โ€”IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)โ€”โ€”โ€”โ€”IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)โ€”โ€”โ€”โ€”IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)โ€”โ€”โ€”โ€”IMP.OF KSHARA ...
ย 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
ย 

Security Standards Please respond to the following A number of .pdf

  • 1. "Security Standards" Please respond to the following: A number of organizations exist to define information security standards. Explain the importance of standards organizations with regard to both information systems and information systems security. Provide a rationale for your response. Determine two (2) specific concerns that you believe exist for cloud deployments, and ascertain whether or not data breaches, such as the Snowden Incident have heightened concerns. Justify your answer. Solution Information security for information systems are key for sustaining the organization and its identity in the information technology environment. As per the continues improvement on sustaining system, information systems security standardization was created huge importance to secure the organization information and to maintain certain guidelines to mitigate problems. The following standard organizations provide guidelines and required certifications for business organizations to ensure the security of information systems. American National Standards Institute (ANSI) Global Engineering Documents British Standards Institute (BSi) British Standard 7799 (BS7799) Center for Internet Security (CIS) Institute of Electrical and Electronic Engineers (IEEE) IEEE standards that relate to Security International Information Systems Security Certification Consortium, Inc. (ISC)2 International Organization for Standardization (ISO) ISO/IEC 17799:2000 ISO 17799 Community Forum Internet Architecture Board (IAB) Internet Assigned Numbers Authority (IANA) National Institute of Standards and Technology (NIST) Computer Security Resource Center (CSRC) Guide to NIST Information Security Documents Federal Information Processing Standard 200 (FIPS 200) Federal Information Processing Standard 201 (FIPS 201-1) Guide for Developing Security Plans for Federal Information Systems Federal Desktop Core Configuration (FDCC)
  • 2. National Security Agency (NSA) Rationale: It is always recommend to apply at least to follow any of the applicable standardization guidelines, in order to keep sustainable information systems in organization. Standardization always says and improves the security and controls on allowing security breaches to our MIS. Recent times could computing has become the predominant growth for small and medium scale organization to mitigate the cost of implementation on information systems. Security of the same and allowing access to external agents is so critical which is directly granting access to important data. Like the above standard guidelines tell us to maintain the NDAs, system access controls.