1. In 2-3 brief paragraphs, discuss the pros and cons of FISMA with references. A. Describe and discuss the objectives of policy-makers B. Describe and discuss the general problems that limit the...

1 answer below »

1. In 2-3 brief paragraphs, discuss the pros and cons of FISMA with references.


A. Describe and discuss the objectives of policy-makers


B. Describe and discuss the general problems that limit the effectiveness of documents that try to govern Cybersecurity.


C. Discuss ideas that there are for improving national security in light of these issues?


2. In 2-3 brief paragraphs with references.


A. Discuss the techniques that your workplace uses for quantifying information security losses?


B. What do you think they should use and why?




3. In 2-3 brief paragraphs with references.


A. If you are (or were) working for a federal government agency, discuss how well does (or did) your workplace follow FISMA and categorize assets based on FIPS199?


B. Who is responsible for following FIPS 200 and SP800-53 recommendations?


C. Discuss how well have they been implemented?


4.


In 2-3 brief paragraphs with references.


State whether you agree or disagree with the following statement and explain your reasoning: "Not all federal agencies need to follow FISMA or NIST recommendations for maintaining cybersecurity. After all, if the cyber-infrastructure of the Equal Employment Opportunity Commission (EEOC) is attacked, no real harm is done to anyone except the complainants."




Document Preview:

Topic #1 In 2-3 brief paragraphs, discuss the pros and cons of FISMA with references.   A. Describe and discuss the objectives of policy-makers   B. Describe and discuss the general problems that limit the effectiveness of documents that try to govern Cybersecurity. C. Discuss ideas that there are for improving national security in light of these issues? Topic #2 In 2-3 brief paragraphs with references. A. Discuss the techniques that your workplace uses for quantifying information security losses? B. What do you think they should use and why? Topic #3 In 2-3 brief paragraphs with references. A. If you are (or were) working for a federal government agency, discuss how well does (or did) your workplace follow FISMA and categorize assets based on FIPS199? B. Who is responsible for following FIPS 200 and SP800-53 recommendations? C. Discuss how well have they been implemented? Topic #4 In 2-3 brief paragraphs with references. State whether you agree or disagree with the following statement and explain your reasoning: "Not all federal agencies need to follow FISMA or NIST recommendations for maintaining cybersecurity. After all, if the cyber-infrastructure of the Equal Employment Opportunity Commission (EEOC) is attacked, no real harm is done to anyone except the complainants."



Answered Same DayDec 22, 2021

Answer To: 1. In 2-3 brief paragraphs, discuss the pros and cons of FISMA with references. A. Describe and...

David answered on Dec 22 2021
118 Votes
Answer: Topic 1) FISMA is working very hard towards making policies which will help
government information protected and secure from outside world or threats which will
lead to higher
risks to such information which are not intended for everyone.
There are several objectives which policymakers are taking now days to make the
information must be highly secure and confidential, which are as follows:
1. There must be a global system, which will have centralized guidelines to protect
the data from threats.
2. Categorize the information which needs to be protected.
3. Creating baseline for information protection and security.
4. Risk assessment procedure should be developed and classify into different
categories.
5. Implement security controls in appropriate information systems.
6. Assess the security controls standards and check it with different mechanism,
after they have been developed.
7. Security controls must be monitored on regular basis.
There are several limitation which will affect the effectiveness of documents, as the
central repository is still not being used by all the organizations, the cyber security
standards followed are different for different organizations, and there is one other major
roadblock is Internet connectivity for different companies are different and this is difficult
to restrict data transmission between cables.
Several organizations must start working with FISMA and try to integrate the common
and global steps to make sure the cyber security threat can be worked upon and this
can be looked more seriously from starting instead of getting stuck on the mid or later
stages.
Answer: Topic 2): There are several system or security threats present in my
workplaces which may harm my organization in several ways, the techniques which my
organization is using for my workplace...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here