SlideShare a Scribd company logo
1 of 12
risk-based approach of managing information systems is a
holistic activity that should be fully integrated into every aspect
of the organization, from planning and system development
lifecycle processes to security controls allocation and
continuous monitoring. The selection and specification of
security controls support effectiveness, efficiency, and
constraints via appropriate laws, directives, policies, standards,
and regulations.
The NIST Special Publication 800-37: Guide for Applying the
Risk Management Framework to Federal Information Systems
provides a disciplined and structured process that integrates
information security and risk management activities into the
development lifecycle by identifying the following six steps:
• Step 1 – Use an impact analysis to categorize the system and
the information it processes, stores, and transmits.
• Step 2 – Select the set of initial or baseline security controls
for the system based on the security categorization. Tailor and
supplement the set of baseline security controls according to the
organizational assessment of the risk and the conditions of the
operational environment. Develop a strategy for continuous
monitoring to achieve security control effectiveness. Document
all the controls in the security plan. Review and approve the
security plan.
• Step 3 – Implement the security controls and describe how the
security controls are employed within the system and its
environment of operation.
• Step 4 – Assess the security controls using the appropriate
procedures as documented in the assessment plan. This
assessment determines whether the security controls have been
implemented correctly and will effectively produce the intended
outcome.
• Step 5 – Authorize information system operation if the
estimated risk resulting from the operation is acceptable. The
assessment considers risk to organizational assets and
operations (including mission, functions, image, or reputation),
individuals, and other organizations.
• Step 6 – Monitor the security controls on an ongoing basis.
Monitoring includes assessing control effectiveness,
documenting changes to the system or its environment of
operation, conducting security impact analyses of these
changes, and reporting the security state of the system to
designated officials.
While the risk management framework is adaptable to most
scenarios, it defaults to the traditional IT environment and
requires customization to successfully address the unique
characteristics of cloud-based services and solutions. The
CRMF closely follows the original RMF approach. Table
E.1 shows the aforementioned six steps listed in the right
column, with each step grouped into one of the three main
activities in the left column that collectively comprise the risk
management process:
Table E.1 The six steps are mapped to each of the three
activities comprising the CRMF.
Adopting the approach outlined by these steps enables
organizations to systematically identify their common, hybrid,
and system-specific security controls and other security
requirements for procurement officials, cloud providers, cloud
carriers and cloud brokers alike.
The CRMF can be used to address the security risks associated
with cloud-based systems by incorporating possible outcomes
into the cloud provider’s contractual terms. Performance aspects
of these terms and conditions also need to be represented in the
SLA, which is an intrinsic part of the service agreement
between the cloud consumer and cloud provider. Contractual
terms should, for example, include guarantees concerning the
cloud consumer’s timely access to cloud audit logs and the
details pertaining to the continuous monitoring of the logs.
If permitted by the adopted deployment model, the organization
should implement both the cloud consumer’s set of identified
security controls and the specifically tailored supplemental
security controls. Cloud consumers are advised to request that
cloud providers (and cloud brokers) provide sufficient evidence
to demonstrate that the security controls being used to protect
their IT assets have been correctly implemented.
10/10/2019 Module 5: Critical Thinking
https://csuglobal.instructure.com/courses/13694/assignments/26
8137 1/3
ITS320 Module 5 Critical Thinking
Option #2: Third String in Reverse Order
Assignment Instructions
Write a Python function that will accept as input three string
values from a user. The method will
return to the user a concatenation of the first two strings and
will print the third string in reverse
order. The function is to be called from the main method.
In the main method, prompt the user for the three strings.
Assignment Submission Instructions
Submit a text file containing your Python code into the Module
5 drop box. Name your
file ITS320_CTA5.Option2.py.
10/10/2019 Module 5: Critical Thinking
https://csuglobal.instructure.com/courses/13694/assignments/26
8137 2/3
Criteria Ratings Pts
10.0 pts
10.0 pts
10.0 pts
10.0 pts
Requirements 10.0 to >8.0 pts
Meets Expectation
Includes all of the required
components, as specified in the
assignment, including the
submission of the text file that
contains your Python code in Option
1 OR Option 2.
8.0 to >6.0 pts
Approaches
Expectation
Includes most
of the required
components,
as specified in
the
assignment.
6.0 to >4.0 pts
Below
Expectation
Includes some
of the required
components,
as specified in
the
assignment.
4.0 to >0 pts
Limited
Evidence
Includes few
of the required
components,
as specified in
the
assignment.
Content 10.0 to >8.0 pts
Meets Expectation
Demonstrates strong or adequate
knowledge of creating a Python
function of string values in reverse
order OR third string in reverse order;
correctly represents knowledge from
the readings and sources.
8.0 to >6.0 pts
Approaches
Expectation
Some significant
but not major
errors or
omissions in
demonstration
of knowledge.
6.0 to >4.0 pts
Below
Expectation
Major errors or
omissions in
demonstration
of knowledge.
4.0 to >0 pts
Limited
Evidence
Fails to
demonstrate
knowledge
of the
materials.
Problem
Solving
10.0 to >8.0 pts
Meets Expectation
Demonstrates strong or
adequate thought and
insight in problem solving.
8.0 to >6.0 pts
Approaches
Expectation
Some significant but not
major errors or omissions
in problem solving.
6.0 to >4.0 pts
Below
Expectation
Major errors or
omissions in
problem
solving.
4.0 to >0 pts
Limited
Evidence
Fails to
demonstrate
problem
solving.
Critical
Thinking
10.0 to >8.0 pts
Meets Expectation
Demonstrates strong or
adequate critical thinking in
working through the coding
process.
8.0 to >6.0 pts
Approaches
Expectation
Some significant but
not major errors or
omissions in critical
thinking.
6.0 to >4.0 pts
Below
Expectation
Major errors or
omissions in
critical
thinking.
4.0 to >0 pts
Limited
Evidence
Fails to
demonstrate
critical
thinking.
10/10/2019 Module 5: Critical Thinking
https://csuglobal.instructure.com/courses/13694/assignments/26
8137 3/3
Criteria Ratings Pts
10.0 pts
10.0 pts
Demonstrates
college-level
proficiency in
organization,
grammar and
style.
10.0 to >8.0 pts
Meets Expectation
Project is clearly
organized, well
written, and in
proper format as
outlined in the
assignment. Strong
sentence and
paragraph
structure; few errors
in grammar and
spelling.
8.0 to >6.0 pts
Approaches
Expectation
Project is fairly well
organized and written,
and is in proper format
as outlined in the
assignment. Reasonably
good sentence and
paragraph structure;
significant number of
errors in grammar and
spelling.
6.0 to >4.0 pts
Below Expectation
Project is poorly
organized and does
not follow proper
paper format.
Inconsistent to
inadequate sentence
and paragraph
development;
numerous errors in
grammar and
spelling.
4.0 to >0 pts
Limited
Evidence
Project is not
organized or
well written, and
is not in proper
paper format.
Poor quality
work;
unacceptable in
terms of
grammar and
spelling.
Demonstrates
proper use of
APA style
10.0 to >8.0 pts
Meets Expectation
Project and/or
questions contain
proper APA formatting,
according to the CSU-
Global Guide to Writing
and APA, with no more
than one significant
error.
8.0 to >6.0 pts
Approaches
Expectation
Few errors in APA
formatting,
according to the
CSU-Global Guide
to Writing and APA,
with no more than
two to three
significant errors.
6.0 to >4.0 pts
Below
Expectation
Significant errors
in APA formatting,
according to the
CSU-Global Guide
to Writing and
APA, with four to
five significant
errors.
4.0 to >0 pts
Limited Evidence
Numerous errors in
APA formatting,
according to the
CSU-Global Guide
to Writing and APA,
with more than five
significant errors.
you will be creating a cloud risk management plan. Please do
not submit a paper; please submit a plan. A plain is defined
as an intention or decision about what one is going to do. To
this point, I want to know, what's your plan for managing risks
related to the cloud. The plan is how you plan to manage risks
related to using a third party cloud vendor. The plan must
address the six steps below and include a risk registry. Please
note, your risk registry should not be empty. The NIST
document, this week's lecture, and template from the textbook
on page 448 will help you frame the plan. You may have to
research additional information to put the plan together. Here's
a hint: risk = vulnerability x threat x the likely hood of an
incident occurring.
Step 1: Categorize Information Systems. ...
· Step 2: Select Security Controls. ...
· Step 3: Implement Security Controls. ...
· Step 4: Assess Security Controls. ...
· Step 5: Authorize Information System. ...
· Step 6: Monitor Security Controls.
·

More Related Content

Similar to  risk-based approach of managing information systems is a holistic.docx

Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxtienboileau
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worogglili
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comMcdonaldRyan39
 
CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comRobinson075
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comsholingarjosh63
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comStephenson06
 
member is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxmember is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxwkyra78
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.comjhonklinz11
 
Cst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.comCst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.comBaileyabw
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comrobertleses9
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comdonaldzs56
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comrobertlesew96
 
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582  Effective Communication / snaptutorial.comCmgt 582  Effective Communication / snaptutorial.com
Cmgt 582 Effective Communication / snaptutorial.comHarrisGeorg12
 
CST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comCST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comdonaldzs8
 
CST 630 Exceptional Education - snaptutorial.com
CST 630   Exceptional Education - snaptutorial.comCST 630   Exceptional Education - snaptutorial.com
CST 630 Exceptional Education - snaptutorial.comDavisMurphyA97
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxcarlibradley31429
 
Cst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comCst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comrobertlesew6
 
Cst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.comCst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.comMcdonaldRyan79
 
Cst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comCst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comPrescottLunt385
 
Cst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.comCst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.comDavis11a
 

Similar to  risk-based approach of managing information systems is a holistic.docx (20)

Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docx
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.com
 
CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.com
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.com
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.com
 
member is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxmember is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docx
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.com
 
Cst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.comCst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.com
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.com
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.com
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.com
 
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582  Effective Communication / snaptutorial.comCmgt 582  Effective Communication / snaptutorial.com
Cmgt 582 Effective Communication / snaptutorial.com
 
CST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comCST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.com
 
CST 630 Exceptional Education - snaptutorial.com
CST 630   Exceptional Education - snaptutorial.comCST 630   Exceptional Education - snaptutorial.com
CST 630 Exceptional Education - snaptutorial.com
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
 
Cst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comCst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.com
 
Cst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.comCst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.com
 
Cst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comCst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.com
 
Cst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.comCst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.com
 

More from odiliagilby

Per the text, computers are playing an increasingly important role i.docx
Per the text, computers are playing an increasingly important role i.docxPer the text, computers are playing an increasingly important role i.docx
Per the text, computers are playing an increasingly important role i.docxodiliagilby
 
Pennsylvania was the leader in sentencing and correctional reform .docx
Pennsylvania was the leader in sentencing and correctional reform .docxPennsylvania was the leader in sentencing and correctional reform .docx
Pennsylvania was the leader in sentencing and correctional reform .docxodiliagilby
 
Penetration testing is a simulated cyberattack against a computer or.docx
Penetration testing is a simulated cyberattack against a computer or.docxPenetration testing is a simulated cyberattack against a computer or.docx
Penetration testing is a simulated cyberattack against a computer or.docxodiliagilby
 
Perform an analysis of the social demographic, technological, econ.docx
Perform an analysis of the social  demographic, technological, econ.docxPerform an analysis of the social  demographic, technological, econ.docx
Perform an analysis of the social demographic, technological, econ.docxodiliagilby
 
Perform research and discuss whether text messaging is cheaper or mo.docx
Perform research and discuss whether text messaging is cheaper or mo.docxPerform research and discuss whether text messaging is cheaper or mo.docx
Perform research and discuss whether text messaging is cheaper or mo.docxodiliagilby
 
People in developed nations are fond of warning people in developing.docx
People in developed nations are fond of warning people in developing.docxPeople in developed nations are fond of warning people in developing.docx
People in developed nations are fond of warning people in developing.docxodiliagilby
 
Pease read and incorporate the following articles from the EBSCO h.docx
Pease read and incorporate the following articles from the EBSCO h.docxPease read and incorporate the following articles from the EBSCO h.docx
Pease read and incorporate the following articles from the EBSCO h.docxodiliagilby
 
Peer Review Journal Paper Overview of assignment due 17 April 2014 I.docx
Peer Review Journal Paper Overview of assignment due 17 April 2014 I.docxPeer Review Journal Paper Overview of assignment due 17 April 2014 I.docx
Peer Review Journal Paper Overview of assignment due 17 April 2014 I.docxodiliagilby
 
Perception is all EXCEPT [removed] [removed]Structuring and orga.docx
Perception is all EXCEPT [removed] [removed]Structuring and orga.docxPerception is all EXCEPT [removed] [removed]Structuring and orga.docx
Perception is all EXCEPT [removed] [removed]Structuring and orga.docxodiliagilby
 
Performance Based Factors and Measures for Quality AssessmentWri.docx
Performance Based Factors and Measures for Quality AssessmentWri.docxPerformance Based Factors and Measures for Quality AssessmentWri.docx
Performance Based Factors and Measures for Quality AssessmentWri.docxodiliagilby
 
People. I need some help with this assignment that needs to be done .docx
People. I need some help with this assignment that needs to be done .docxPeople. I need some help with this assignment that needs to be done .docx
People. I need some help with this assignment that needs to be done .docxodiliagilby
 
Perceptions and Causes of Psychopathology PaperPrepare a 1,0.docx
Perceptions and Causes of Psychopathology PaperPrepare a 1,0.docxPerceptions and Causes of Psychopathology PaperPrepare a 1,0.docx
Perceptions and Causes of Psychopathology PaperPrepare a 1,0.docxodiliagilby
 
People are attracted to occupations that complement their personalit.docx
People are attracted to occupations that complement their personalit.docxPeople are attracted to occupations that complement their personalit.docx
People are attracted to occupations that complement their personalit.docxodiliagilby
 
Perception of Pleasure and Pain Presentation3 slides- An explanati.docx
Perception of Pleasure and Pain Presentation3 slides- An explanati.docxPerception of Pleasure and Pain Presentation3 slides- An explanati.docx
Perception of Pleasure and Pain Presentation3 slides- An explanati.docxodiliagilby
 
Pennsylvania v. MarkMark Davis has been charged with Driving W.docx
Pennsylvania v. MarkMark Davis has been charged with Driving W.docxPennsylvania v. MarkMark Davis has been charged with Driving W.docx
Pennsylvania v. MarkMark Davis has been charged with Driving W.docxodiliagilby
 
PBAD201-1501A-02 Public AdministrationTask NamePhase 3 Individu.docx
PBAD201-1501A-02 Public AdministrationTask NamePhase 3 Individu.docxPBAD201-1501A-02 Public AdministrationTask NamePhase 3 Individu.docx
PBAD201-1501A-02 Public AdministrationTask NamePhase 3 Individu.docxodiliagilby
 
Part1 Q1. Classify each of the following as-      (i)qual.docx
Part1 Q1. Classify each of the following as-      (i)qual.docxPart1 Q1. Classify each of the following as-      (i)qual.docx
Part1 Q1. Classify each of the following as-      (i)qual.docxodiliagilby
 
Paul’s Letter to the EphesiansThe First Letter of PeterThe Fir.docx
Paul’s Letter to the EphesiansThe First Letter of PeterThe Fir.docxPaul’s Letter to the EphesiansThe First Letter of PeterThe Fir.docx
Paul’s Letter to the EphesiansThe First Letter of PeterThe Fir.docxodiliagilby
 
Past and FuturePlease respond to the followingImagine back .docx
Past and FuturePlease respond to the followingImagine back .docxPast and FuturePlease respond to the followingImagine back .docx
Past and FuturePlease respond to the followingImagine back .docxodiliagilby
 
Partisan considerations have increasingly influenced the selection.docx
Partisan considerations have increasingly influenced the selection.docxPartisan considerations have increasingly influenced the selection.docx
Partisan considerations have increasingly influenced the selection.docxodiliagilby
 

More from odiliagilby (20)

Per the text, computers are playing an increasingly important role i.docx
Per the text, computers are playing an increasingly important role i.docxPer the text, computers are playing an increasingly important role i.docx
Per the text, computers are playing an increasingly important role i.docx
 
Pennsylvania was the leader in sentencing and correctional reform .docx
Pennsylvania was the leader in sentencing and correctional reform .docxPennsylvania was the leader in sentencing and correctional reform .docx
Pennsylvania was the leader in sentencing and correctional reform .docx
 
Penetration testing is a simulated cyberattack against a computer or.docx
Penetration testing is a simulated cyberattack against a computer or.docxPenetration testing is a simulated cyberattack against a computer or.docx
Penetration testing is a simulated cyberattack against a computer or.docx
 
Perform an analysis of the social demographic, technological, econ.docx
Perform an analysis of the social  demographic, technological, econ.docxPerform an analysis of the social  demographic, technological, econ.docx
Perform an analysis of the social demographic, technological, econ.docx
 
Perform research and discuss whether text messaging is cheaper or mo.docx
Perform research and discuss whether text messaging is cheaper or mo.docxPerform research and discuss whether text messaging is cheaper or mo.docx
Perform research and discuss whether text messaging is cheaper or mo.docx
 
People in developed nations are fond of warning people in developing.docx
People in developed nations are fond of warning people in developing.docxPeople in developed nations are fond of warning people in developing.docx
People in developed nations are fond of warning people in developing.docx
 
Pease read and incorporate the following articles from the EBSCO h.docx
Pease read and incorporate the following articles from the EBSCO h.docxPease read and incorporate the following articles from the EBSCO h.docx
Pease read and incorporate the following articles from the EBSCO h.docx
 
Peer Review Journal Paper Overview of assignment due 17 April 2014 I.docx
Peer Review Journal Paper Overview of assignment due 17 April 2014 I.docxPeer Review Journal Paper Overview of assignment due 17 April 2014 I.docx
Peer Review Journal Paper Overview of assignment due 17 April 2014 I.docx
 
Perception is all EXCEPT [removed] [removed]Structuring and orga.docx
Perception is all EXCEPT [removed] [removed]Structuring and orga.docxPerception is all EXCEPT [removed] [removed]Structuring and orga.docx
Perception is all EXCEPT [removed] [removed]Structuring and orga.docx
 
Performance Based Factors and Measures for Quality AssessmentWri.docx
Performance Based Factors and Measures for Quality AssessmentWri.docxPerformance Based Factors and Measures for Quality AssessmentWri.docx
Performance Based Factors and Measures for Quality AssessmentWri.docx
 
People. I need some help with this assignment that needs to be done .docx
People. I need some help with this assignment that needs to be done .docxPeople. I need some help with this assignment that needs to be done .docx
People. I need some help with this assignment that needs to be done .docx
 
Perceptions and Causes of Psychopathology PaperPrepare a 1,0.docx
Perceptions and Causes of Psychopathology PaperPrepare a 1,0.docxPerceptions and Causes of Psychopathology PaperPrepare a 1,0.docx
Perceptions and Causes of Psychopathology PaperPrepare a 1,0.docx
 
People are attracted to occupations that complement their personalit.docx
People are attracted to occupations that complement their personalit.docxPeople are attracted to occupations that complement their personalit.docx
People are attracted to occupations that complement their personalit.docx
 
Perception of Pleasure and Pain Presentation3 slides- An explanati.docx
Perception of Pleasure and Pain Presentation3 slides- An explanati.docxPerception of Pleasure and Pain Presentation3 slides- An explanati.docx
Perception of Pleasure and Pain Presentation3 slides- An explanati.docx
 
Pennsylvania v. MarkMark Davis has been charged with Driving W.docx
Pennsylvania v. MarkMark Davis has been charged with Driving W.docxPennsylvania v. MarkMark Davis has been charged with Driving W.docx
Pennsylvania v. MarkMark Davis has been charged with Driving W.docx
 
PBAD201-1501A-02 Public AdministrationTask NamePhase 3 Individu.docx
PBAD201-1501A-02 Public AdministrationTask NamePhase 3 Individu.docxPBAD201-1501A-02 Public AdministrationTask NamePhase 3 Individu.docx
PBAD201-1501A-02 Public AdministrationTask NamePhase 3 Individu.docx
 
Part1 Q1. Classify each of the following as-      (i)qual.docx
Part1 Q1. Classify each of the following as-      (i)qual.docxPart1 Q1. Classify each of the following as-      (i)qual.docx
Part1 Q1. Classify each of the following as-      (i)qual.docx
 
Paul’s Letter to the EphesiansThe First Letter of PeterThe Fir.docx
Paul’s Letter to the EphesiansThe First Letter of PeterThe Fir.docxPaul’s Letter to the EphesiansThe First Letter of PeterThe Fir.docx
Paul’s Letter to the EphesiansThe First Letter of PeterThe Fir.docx
 
Past and FuturePlease respond to the followingImagine back .docx
Past and FuturePlease respond to the followingImagine back .docxPast and FuturePlease respond to the followingImagine back .docx
Past and FuturePlease respond to the followingImagine back .docx
 
Partisan considerations have increasingly influenced the selection.docx
Partisan considerations have increasingly influenced the selection.docxPartisan considerations have increasingly influenced the selection.docx
Partisan considerations have increasingly influenced the selection.docx
 

Recently uploaded

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

 risk-based approach of managing information systems is a holistic.docx

  • 1. risk-based approach of managing information systems is a holistic activity that should be fully integrated into every aspect of the organization, from planning and system development lifecycle processes to security controls allocation and continuous monitoring. The selection and specification of security controls support effectiveness, efficiency, and constraints via appropriate laws, directives, policies, standards, and regulations. The NIST Special Publication 800-37: Guide for Applying the Risk Management Framework to Federal Information Systems provides a disciplined and structured process that integrates information security and risk management activities into the development lifecycle by identifying the following six steps: • Step 1 – Use an impact analysis to categorize the system and the information it processes, stores, and transmits. • Step 2 – Select the set of initial or baseline security controls for the system based on the security categorization. Tailor and supplement the set of baseline security controls according to the organizational assessment of the risk and the conditions of the operational environment. Develop a strategy for continuous monitoring to achieve security control effectiveness. Document all the controls in the security plan. Review and approve the security plan. • Step 3 – Implement the security controls and describe how the security controls are employed within the system and its environment of operation. • Step 4 – Assess the security controls using the appropriate procedures as documented in the assessment plan. This assessment determines whether the security controls have been implemented correctly and will effectively produce the intended outcome. • Step 5 – Authorize information system operation if the estimated risk resulting from the operation is acceptable. The assessment considers risk to organizational assets and
  • 2. operations (including mission, functions, image, or reputation), individuals, and other organizations. • Step 6 – Monitor the security controls on an ongoing basis. Monitoring includes assessing control effectiveness, documenting changes to the system or its environment of operation, conducting security impact analyses of these changes, and reporting the security state of the system to designated officials. While the risk management framework is adaptable to most scenarios, it defaults to the traditional IT environment and requires customization to successfully address the unique characteristics of cloud-based services and solutions. The CRMF closely follows the original RMF approach. Table E.1 shows the aforementioned six steps listed in the right column, with each step grouped into one of the three main activities in the left column that collectively comprise the risk management process: Table E.1 The six steps are mapped to each of the three activities comprising the CRMF. Adopting the approach outlined by these steps enables organizations to systematically identify their common, hybrid, and system-specific security controls and other security requirements for procurement officials, cloud providers, cloud carriers and cloud brokers alike. The CRMF can be used to address the security risks associated with cloud-based systems by incorporating possible outcomes into the cloud provider’s contractual terms. Performance aspects of these terms and conditions also need to be represented in the SLA, which is an intrinsic part of the service agreement between the cloud consumer and cloud provider. Contractual terms should, for example, include guarantees concerning the cloud consumer’s timely access to cloud audit logs and the details pertaining to the continuous monitoring of the logs. If permitted by the adopted deployment model, the organization should implement both the cloud consumer’s set of identified
  • 3. security controls and the specifically tailored supplemental security controls. Cloud consumers are advised to request that cloud providers (and cloud brokers) provide sufficient evidence to demonstrate that the security controls being used to protect their IT assets have been correctly implemented. 10/10/2019 Module 5: Critical Thinking https://csuglobal.instructure.com/courses/13694/assignments/26 8137 1/3 ITS320 Module 5 Critical Thinking Option #2: Third String in Reverse Order Assignment Instructions Write a Python function that will accept as input three string values from a user. The method will return to the user a concatenation of the first two strings and will print the third string in reverse order. The function is to be called from the main method. In the main method, prompt the user for the three strings. Assignment Submission Instructions Submit a text file containing your Python code into the Module 5 drop box. Name your file ITS320_CTA5.Option2.py. 10/10/2019 Module 5: Critical Thinking
  • 4. https://csuglobal.instructure.com/courses/13694/assignments/26 8137 2/3 Criteria Ratings Pts 10.0 pts 10.0 pts 10.0 pts 10.0 pts Requirements 10.0 to >8.0 pts Meets Expectation Includes all of the required components, as specified in the assignment, including the submission of the text file that contains your Python code in Option 1 OR Option 2. 8.0 to >6.0 pts Approaches Expectation Includes most of the required components, as specified in the assignment.
  • 5. 6.0 to >4.0 pts Below Expectation Includes some of the required components, as specified in the assignment. 4.0 to >0 pts Limited Evidence Includes few of the required components, as specified in the assignment. Content 10.0 to >8.0 pts Meets Expectation Demonstrates strong or adequate knowledge of creating a Python function of string values in reverse order OR third string in reverse order; correctly represents knowledge from the readings and sources. 8.0 to >6.0 pts Approaches Expectation Some significant but not major errors or omissions in
  • 6. demonstration of knowledge. 6.0 to >4.0 pts Below Expectation Major errors or omissions in demonstration of knowledge. 4.0 to >0 pts Limited Evidence Fails to demonstrate knowledge of the materials. Problem Solving 10.0 to >8.0 pts Meets Expectation Demonstrates strong or adequate thought and insight in problem solving. 8.0 to >6.0 pts Approaches Expectation Some significant but not major errors or omissions in problem solving.
  • 7. 6.0 to >4.0 pts Below Expectation Major errors or omissions in problem solving. 4.0 to >0 pts Limited Evidence Fails to demonstrate problem solving. Critical Thinking 10.0 to >8.0 pts Meets Expectation Demonstrates strong or adequate critical thinking in working through the coding process. 8.0 to >6.0 pts Approaches Expectation Some significant but not major errors or omissions in critical thinking. 6.0 to >4.0 pts Below
  • 8. Expectation Major errors or omissions in critical thinking. 4.0 to >0 pts Limited Evidence Fails to demonstrate critical thinking. 10/10/2019 Module 5: Critical Thinking https://csuglobal.instructure.com/courses/13694/assignments/26 8137 3/3 Criteria Ratings Pts 10.0 pts 10.0 pts Demonstrates college-level proficiency in organization, grammar and style. 10.0 to >8.0 pts
  • 9. Meets Expectation Project is clearly organized, well written, and in proper format as outlined in the assignment. Strong sentence and paragraph structure; few errors in grammar and spelling. 8.0 to >6.0 pts Approaches Expectation Project is fairly well organized and written, and is in proper format as outlined in the assignment. Reasonably good sentence and paragraph structure; significant number of errors in grammar and spelling. 6.0 to >4.0 pts Below Expectation Project is poorly organized and does not follow proper paper format. Inconsistent to inadequate sentence and paragraph
  • 10. development; numerous errors in grammar and spelling. 4.0 to >0 pts Limited Evidence Project is not organized or well written, and is not in proper paper format. Poor quality work; unacceptable in terms of grammar and spelling. Demonstrates proper use of APA style 10.0 to >8.0 pts Meets Expectation Project and/or questions contain proper APA formatting, according to the CSU- Global Guide to Writing and APA, with no more than one significant error. 8.0 to >6.0 pts
  • 11. Approaches Expectation Few errors in APA formatting, according to the CSU-Global Guide to Writing and APA, with no more than two to three significant errors. 6.0 to >4.0 pts Below Expectation Significant errors in APA formatting, according to the CSU-Global Guide to Writing and APA, with four to five significant errors. 4.0 to >0 pts Limited Evidence Numerous errors in APA formatting, according to the CSU-Global Guide to Writing and APA, with more than five significant errors. you will be creating a cloud risk management plan. Please do not submit a paper; please submit a plan. A plain is defined
  • 12. as an intention or decision about what one is going to do. To this point, I want to know, what's your plan for managing risks related to the cloud. The plan is how you plan to manage risks related to using a third party cloud vendor. The plan must address the six steps below and include a risk registry. Please note, your risk registry should not be empty. The NIST document, this week's lecture, and template from the textbook on page 448 will help you frame the plan. You may have to research additional information to put the plan together. Here's a hint: risk = vulnerability x threat x the likely hood of an incident occurring. Step 1: Categorize Information Systems. ... · Step 2: Select Security Controls. ... · Step 3: Implement Security Controls. ... · Step 4: Assess Security Controls. ... · Step 5: Authorize Information System. ... · Step 6: Monitor Security Controls. ·