SlideShare a Scribd company logo
Refer
to
NIST SP 800-53 (Rev. 4)
for the 18 candidate security control families and associated
security controls.
Security Assessment must be incorporated into the Software
Development Life Cycle (SDLC) in order to be a secure,
integrated process. Testing of selected security controls ensures
that applications meet business requirements, function as
planned, and protect associated data securely from attack. A
security assessment of the targeted environment identifies
vulnerabilities that may cause a security breach and specifies
the security controls that mitigate the vulnerabilities.
For this assignment, use the organization you chose in Week 1.
Penetration Testing and Vulnerability Scanning
Provide
a 1-page description of penetration testing and vulnerability
scanning processes.
Describe
how they are used as part of the organization’s testing and
assessment strategy.
Format
your citations according to APA guidelines.
Submit
your assignment.
Refer to NIST SP 800-53 (Rev. 4) for the 18 candidate security.docx

More Related Content

Similar to Refer to NIST SP 800-53 (Rev. 4) for the 18 candidate security.docx

Ab04507161167
Ab04507161167Ab04507161167
Ab04507161167
IJERA Editor
 
Software security testing
Software security testingSoftware security testing
Software security testing
nehabsairam
 
CHAPTER 5Risk Response and MitigationIn this chapter, you will
CHAPTER 5Risk Response and MitigationIn this chapter, you willCHAPTER 5Risk Response and MitigationIn this chapter, you will
CHAPTER 5Risk Response and MitigationIn this chapter, you will
JinElias52
 
CHAPTER 5Risk Response and MitigationIn this chapter, you will.docx
CHAPTER 5Risk Response and MitigationIn this chapter, you will.docxCHAPTER 5Risk Response and MitigationIn this chapter, you will.docx
CHAPTER 5Risk Response and MitigationIn this chapter, you will.docx
Abhinav816839
 
Responses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docxResponses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docx
ronak56
 
D e c e m b e r 2 0 1 4 J O U R N A L O F I N T E R N E T
D e c e m b e r  2 0 1 4  J O U R N A L  O F  I N T E R N E T D e c e m b e r  2 0 1 4  J O U R N A L  O F  I N T E R N E T
D e c e m b e r 2 0 1 4 J O U R N A L O F I N T E R N E T
OllieShoresna
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
cscpconf
 
Auditing-Cybersecurity in the enterprise
Auditing-Cybersecurity in the enterpriseAuditing-Cybersecurity in the enterprise
Auditing-Cybersecurity in the enterprise
Thilak Pathirage -Senior IT Gov and Risk Consultant
 
An integrated security testing framework and tool
An integrated security testing framework  and toolAn integrated security testing framework  and tool
An integrated security testing framework and tool
Moutasm Tamimi
 
Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...
Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...
Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...
Under Controls
 
SOFTWARE ENGINEERING TOOLS AND THE PROCESSES THEY SUPPORTC.docx
SOFTWARE ENGINEERING TOOLS AND THE PROCESSES THEY SUPPORTC.docxSOFTWARE ENGINEERING TOOLS AND THE PROCESSES THEY SUPPORTC.docx
SOFTWARE ENGINEERING TOOLS AND THE PROCESSES THEY SUPPORTC.docx
whitneyleman54422
 
Security Certification - Critical Review
Security Certification - Critical ReviewSecurity Certification - Critical Review
Security Certification - Critical Review
ISA Interchange
 
Microsoft_Cyber_Offerings_Mapped_to_Security_Frameworks_EN_US.pdf
Microsoft_Cyber_Offerings_Mapped_to_Security_Frameworks_EN_US.pdfMicrosoft_Cyber_Offerings_Mapped_to_Security_Frameworks_EN_US.pdf
Microsoft_Cyber_Offerings_Mapped_to_Security_Frameworks_EN_US.pdf
VipulKumar221864
 
SAFECode_Agile_Dev_Security0712
SAFECode_Agile_Dev_Security0712SAFECode_Agile_Dev_Security0712
SAFECode_Agile_Dev_Security0712
Vishal Asthana, CISSP
 
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
CompTIA
 
NIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NISTNIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NIST
ebonyman0007
 
CST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comCST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.com
chrysanthemu49
 
Hack2Secure Assists Organization in Secure Application Development Through BS...
Hack2Secure Assists Organization in Secure Application Development Through BS...Hack2Secure Assists Organization in Secure Application Development Through BS...
Hack2Secure Assists Organization in Secure Application Development Through BS...
hack2s
 
2015 03-04 presentation1
2015 03-04 presentation12015 03-04 presentation1
2015 03-04 presentation1
ifi8106tlu
 
CST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.comCST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.com
claric241
 

Similar to Refer to NIST SP 800-53 (Rev. 4) for the 18 candidate security.docx (20)

Ab04507161167
Ab04507161167Ab04507161167
Ab04507161167
 
Software security testing
Software security testingSoftware security testing
Software security testing
 
CHAPTER 5Risk Response and MitigationIn this chapter, you will
CHAPTER 5Risk Response and MitigationIn this chapter, you willCHAPTER 5Risk Response and MitigationIn this chapter, you will
CHAPTER 5Risk Response and MitigationIn this chapter, you will
 
CHAPTER 5Risk Response and MitigationIn this chapter, you will.docx
CHAPTER 5Risk Response and MitigationIn this chapter, you will.docxCHAPTER 5Risk Response and MitigationIn this chapter, you will.docx
CHAPTER 5Risk Response and MitigationIn this chapter, you will.docx
 
Responses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docxResponses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docx
 
D e c e m b e r 2 0 1 4 J O U R N A L O F I N T E R N E T
D e c e m b e r  2 0 1 4  J O U R N A L  O F  I N T E R N E T D e c e m b e r  2 0 1 4  J O U R N A L  O F  I N T E R N E T
D e c e m b e r 2 0 1 4 J O U R N A L O F I N T E R N E T
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
Auditing-Cybersecurity in the enterprise
Auditing-Cybersecurity in the enterpriseAuditing-Cybersecurity in the enterprise
Auditing-Cybersecurity in the enterprise
 
An integrated security testing framework and tool
An integrated security testing framework  and toolAn integrated security testing framework  and tool
An integrated security testing framework and tool
 
Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...
Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...
Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...
 
SOFTWARE ENGINEERING TOOLS AND THE PROCESSES THEY SUPPORTC.docx
SOFTWARE ENGINEERING TOOLS AND THE PROCESSES THEY SUPPORTC.docxSOFTWARE ENGINEERING TOOLS AND THE PROCESSES THEY SUPPORTC.docx
SOFTWARE ENGINEERING TOOLS AND THE PROCESSES THEY SUPPORTC.docx
 
Security Certification - Critical Review
Security Certification - Critical ReviewSecurity Certification - Critical Review
Security Certification - Critical Review
 
Microsoft_Cyber_Offerings_Mapped_to_Security_Frameworks_EN_US.pdf
Microsoft_Cyber_Offerings_Mapped_to_Security_Frameworks_EN_US.pdfMicrosoft_Cyber_Offerings_Mapped_to_Security_Frameworks_EN_US.pdf
Microsoft_Cyber_Offerings_Mapped_to_Security_Frameworks_EN_US.pdf
 
SAFECode_Agile_Dev_Security0712
SAFECode_Agile_Dev_Security0712SAFECode_Agile_Dev_Security0712
SAFECode_Agile_Dev_Security0712
 
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
 
NIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NISTNIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NIST
 
CST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comCST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.com
 
Hack2Secure Assists Organization in Secure Application Development Through BS...
Hack2Secure Assists Organization in Secure Application Development Through BS...Hack2Secure Assists Organization in Secure Application Development Through BS...
Hack2Secure Assists Organization in Secure Application Development Through BS...
 
2015 03-04 presentation1
2015 03-04 presentation12015 03-04 presentation1
2015 03-04 presentation1
 
CST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.comCST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.com
 

More from lorent8

ReferencesConclusionThe capacity to adapt is crucial.docx
ReferencesConclusionThe capacity to adapt is crucial.docxReferencesConclusionThe capacity to adapt is crucial.docx
ReferencesConclusionThe capacity to adapt is crucial.docx
lorent8
 
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docxReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
lorent8
 
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docxReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
lorent8
 
References and Citationshttpowl.excelsior.educitatio.docx
References and Citationshttpowl.excelsior.educitatio.docxReferences and Citationshttpowl.excelsior.educitatio.docx
References and Citationshttpowl.excelsior.educitatio.docx
lorent8
 
References Located to Support Project Research and Writing.Origi.docx
References Located to Support Project Research and Writing.Origi.docxReferences Located to Support Project Research and Writing.Origi.docx
References Located to Support Project Research and Writing.Origi.docx
lorent8
 
References must be in APA citation format. Post must be a minimum of.docx
References must be in APA citation format. Post must be a minimum of.docxReferences must be in APA citation format. Post must be a minimum of.docx
References must be in APA citation format. Post must be a minimum of.docx
lorent8
 
References Abomhara, M. (2015). Cyber security and the internet .docx
References Abomhara, M. (2015). Cyber security and the internet .docxReferences Abomhara, M. (2015). Cyber security and the internet .docx
References Abomhara, M. (2015). Cyber security and the internet .docx
lorent8
 
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docxReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
lorent8
 
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docxReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
lorent8
 
Reference Book Managing Criminal Justice Organizations An Intr.docx
Reference Book Managing Criminal Justice Organizations An Intr.docxReference Book Managing Criminal Justice Organizations An Intr.docx
Reference Book Managing Criminal Justice Organizations An Intr.docx
lorent8
 
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docx
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docxReference Ch. 1 of Public Finance from the Wk 1 Learning A.docx
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docx
lorent8
 
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docxReference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
lorent8
 
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docx
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docxReference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docx
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docx
lorent8
 
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docxReference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
lorent8
 
reference is needed APA 6TH STYLEAS simple as possible because i.docx
reference is needed APA 6TH STYLEAS simple as possible because i.docxreference is needed APA 6TH STYLEAS simple as possible because i.docx
reference is needed APA 6TH STYLEAS simple as possible because i.docx
lorent8
 
Reference htt.docx
Reference htt.docxReference htt.docx
Reference htt.docx
lorent8
 
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docxReference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
lorent8
 
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docx
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docxreference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docx
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docx
lorent8
 
Refer  httpsnvlpubs.nist.govnistpubsLegacySPnistspecialpub.docx
Refer  httpsnvlpubs.nist.govnistpubsLegacySPnistspecialpub.docxRefer  httpsnvlpubs.nist.govnistpubsLegacySPnistspecialpub.docx
Refer  httpsnvlpubs.nist.govnistpubsLegacySPnistspecialpub.docx
lorent8
 
Reference Article1st published in May 2015doi 10.1049etr.docx
Reference Article1st published in May 2015doi 10.1049etr.docxReference Article1st published in May 2015doi 10.1049etr.docx
Reference Article1st published in May 2015doi 10.1049etr.docx
lorent8
 

More from lorent8 (20)

ReferencesConclusionThe capacity to adapt is crucial.docx
ReferencesConclusionThe capacity to adapt is crucial.docxReferencesConclusionThe capacity to adapt is crucial.docx
ReferencesConclusionThe capacity to adapt is crucial.docx
 
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docxReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
 
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docxReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
 
References and Citationshttpowl.excelsior.educitatio.docx
References and Citationshttpowl.excelsior.educitatio.docxReferences and Citationshttpowl.excelsior.educitatio.docx
References and Citationshttpowl.excelsior.educitatio.docx
 
References Located to Support Project Research and Writing.Origi.docx
References Located to Support Project Research and Writing.Origi.docxReferences Located to Support Project Research and Writing.Origi.docx
References Located to Support Project Research and Writing.Origi.docx
 
References must be in APA citation format. Post must be a minimum of.docx
References must be in APA citation format. Post must be a minimum of.docxReferences must be in APA citation format. Post must be a minimum of.docx
References must be in APA citation format. Post must be a minimum of.docx
 
References Abomhara, M. (2015). Cyber security and the internet .docx
References Abomhara, M. (2015). Cyber security and the internet .docxReferences Abomhara, M. (2015). Cyber security and the internet .docx
References Abomhara, M. (2015). Cyber security and the internet .docx
 
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docxReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
 
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docxReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
 
Reference Book Managing Criminal Justice Organizations An Intr.docx
Reference Book Managing Criminal Justice Organizations An Intr.docxReference Book Managing Criminal Justice Organizations An Intr.docx
Reference Book Managing Criminal Justice Organizations An Intr.docx
 
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docx
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docxReference Ch. 1 of Public Finance from the Wk 1 Learning A.docx
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docx
 
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docxReference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
 
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docx
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docxReference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docx
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docx
 
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docxReference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
 
reference is needed APA 6TH STYLEAS simple as possible because i.docx
reference is needed APA 6TH STYLEAS simple as possible because i.docxreference is needed APA 6TH STYLEAS simple as possible because i.docx
reference is needed APA 6TH STYLEAS simple as possible because i.docx
 
Reference htt.docx
Reference htt.docxReference htt.docx
Reference htt.docx
 
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docxReference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
 
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docx
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docxreference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docx
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docx
 
Refer  httpsnvlpubs.nist.govnistpubsLegacySPnistspecialpub.docx
Refer  httpsnvlpubs.nist.govnistpubsLegacySPnistspecialpub.docxRefer  httpsnvlpubs.nist.govnistpubsLegacySPnistspecialpub.docx
Refer  httpsnvlpubs.nist.govnistpubsLegacySPnistspecialpub.docx
 
Reference Article1st published in May 2015doi 10.1049etr.docx
Reference Article1st published in May 2015doi 10.1049etr.docxReference Article1st published in May 2015doi 10.1049etr.docx
Reference Article1st published in May 2015doi 10.1049etr.docx
 

Recently uploaded

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 

Recently uploaded (20)

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 

Refer to NIST SP 800-53 (Rev. 4) for the 18 candidate security.docx

  • 1. Refer to NIST SP 800-53 (Rev. 4) for the 18 candidate security control families and associated security controls. Security Assessment must be incorporated into the Software Development Life Cycle (SDLC) in order to be a secure, integrated process. Testing of selected security controls ensures that applications meet business requirements, function as planned, and protect associated data securely from attack. A security assessment of the targeted environment identifies vulnerabilities that may cause a security breach and specifies the security controls that mitigate the vulnerabilities. For this assignment, use the organization you chose in Week 1. Penetration Testing and Vulnerability Scanning Provide a 1-page description of penetration testing and vulnerability scanning processes. Describe how they are used as part of the organization’s testing and assessment strategy. Format your citations according to APA guidelines. Submit your assignment.