Answershould be original, and similarity (plagiarism)not more than 10% this is very important otherwise I will be in trouble. Answer should be a clear explanation and shouldbe clear understanding...

1 answer below »


Answer should be original, and similarity (plagiarism) not more than 10% this is very important otherwise I will be in trouble.



Answer should be a clear explanation and should be clear understanding (500 words).



Answer should be references on Harvard style (Not use Wikipedia) should be Academic Articles or books.



When use citation from any reference please keep it between "citation" (Author,Year),please citation should be not more than 5%



As reference you can use the following book:


Security Engineering: A Guide to Building Dependable Distributed Systems (2nd Edition)


Author: Anderson, R.


ISBN: ISBN-10: 0470068523 ISBN-13: 978-0470068526


Publisher: John Wiley & Sons



Book available from below link:



http://www.cl.cam.ac.uk/~rja14/book.html




Assignment is:


Make yourself familiar with the concept of security controls. How it can be used for organization/system security evaluation and risk assessment?


Useful links:

The Standard of Good Practice for Information Securityhttps://www.isfsecuritystandard.com/SOGP07/index.htm
SP 800-110 DRAFT Information System Security Reference Data Modelhttp://www.csrc.nist.gov/publications/drafts/sp800-110/Draft-SP800-110.pdf Security Controls for Federal Information systems.

Recommendedhttp://www.csrc.nist.gov/publications/nistpubs/800-53/SP800-53.pdf



Answered Same DayDec 22, 2021

Answer To: Answershould be original, and similarity (plagiarism)not more than 10% this is very important...

David answered on Dec 22 2021
115 Votes
Make yourself familiar with the concept of security controls. How it can be used for
organization/system s
ecurity evaluation and risk assessment?
Security controls are the count measures that are used to protect the network from attacks.
Security controls are techniques that remove or eliminate the security problems and it is used to
reduce the level of risk to the IT system and its data to an acceptable level. One example of
security control is Firewall. A firewall is a program that prevents unauthorized use and access to
application.
There are mainly three kinds of security controls that prevent, detect, and correct as any attack may
occur to application.
Preventive controls: Preventive controls mitigate or stop a hacker from acting or an attack from
occurring. For example, a password can remove illegal entry into the application, or a set of second
circuits can remove application from crashing. Preventative controls also act as a deterrent by
discouraging or restraining someone from acting or proceeding because of fear or doubt. For...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here