Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Using the NIST Cybersecurity Framework, you will apply the Identify function to create an Asset Management Program to provide a complete picture of what, where,

Using the NIST Cybersecurity Framework, you will apply the Identify function to create an Asset Management Program to provide a complete picture of what, where, and how an organization's asset is being used. The goal is to provide documentation for the security analysts to assist them in asset utilization and security. The network diagram created in Week 1 should be used as a basis for the following sections: For each asset shown in the network diagram, write 1-2 paragraphs describing what the asset is, where the asset is used, and how. Create a table (see Table 2.2, Examples of Asset Classifications in the textbook reading) with the columns (Categories, Aspects, and Assets). Determine a significance level (high, medium, low) for each organization asset based on confidentiality, integrity, and availability and add the asset to the respective grouping in the table. Classify each information asset by category (Tier 0, Tier 1, Tier 2, and Significant Systems) and place the asset in the respective grouping based on the level of sensitivity for the associated data to denote the impact of the loss of that asset, related data, or functionality would have. Create a second table that shows the following information for each asset: Owner of asset, role, and responsibility Data policy (Yes/No) and information asset security management policy (Yes/No) Data governance (Yes/No) - (data is protected under the statute, contract, or compliance/regulatory bodies) Create a third table that shows the following information: Inventory of software applications Current list of known vulnerabilities Prioritization of each vulnerability by risk level Application patch level (from software vendor if known) Actions to patch or apply alternative controls Write 4-5 detailed paragraphs that summarize your observations with recommendations. Justifications for each recommendation should be supported by the NIST CSF and other industry-accepted standards.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Constitutional Law For A Changing America Institutional Powers And Constraints

Authors: Lee J. Epstein, Kevin T. McGuire, Thomas G. Walker

11th Edition

1071822128, 978-1071822128

More Books

Students also viewed these Law questions

Question

8. What values do you want others to associate you with?

Answered: 1 week ago