1) Visit the NIST FASP security practices Web site at http://csrc.nist.gov/group
ID: 3691778 • Letter: 1
Question
1) Visit the NIST FASP security practices Web site at http://csrc.nist.gov/groups/SMA/fasp/index.html. Review some of the listed FASPs and identify five drawbacks to adopting the recommended practices for a typical business.
2) Visit the Web sites of the major technology organizations listed in our readings (Microsoft, Oracle, and Cisco) plus one other that you choose. Search their Web sites for best security practices. What did you find?Write a brief summary (two to three sentences) for each web site.
Length of Discussion: 100-150 words Your response should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect graduate-level writing and the most up-to-date APA standards. Cite sources when needed properly.
Explanation / Answer
1) Visit the NSIT FASP security practices website athttp://csrc.nist.gov/groups/SMA/fasp/index.html. Review some of the listed FASPs andidentify five drawbacks to adopting the recommended practices for a typical business.
The first drawback is that there is a six step security framework defined which can be read by the hackers and the framework may be developed by them to identify loopholes in it and come up with a better plan to crack these multi layers of security. This would give the hackers a good idea about the type of security blockage that they could encounter while trying to crack the codes of security. The additional security controls and the enhancement for security threats has also been defined clearly and many business organizations without huge amount of capital will not be able to engage an expert security control agency to protect the company’s data and may follow the procedures listed here. As the hackers are already aware of the policies, they can always crack the codes developed by small business organizations. Guidance is also provided for managing security risks and therefore even this data can be read by the hackers which would also guide them in developing codes and strategies for cracking the security layers of business organizations. The other disadvantages would include streamlining the security process and the organization level security controls for managing information security programs for business enterprises.
Sorry that i couldn't get the exact definition for your Question 2.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.