A) Your presentation should include the following: Title Slide Agenda Slide Intr
A) Your presentation should include the following:
Title Slide
Agenda Slide
Intr
A) Your presentation should include the following:
Title Slide
Agenda Slide
Introduction Slide: This should motivate to want to see your remaining slides.
Content slides (This could be several Slides)Part 1 NIST SP800-53 Control Families
Part 2 You make the call with the scenario we will discuss in class
Conclusions
References
PART 1 NIST SP 800-53 defines 18 Control families. All controls are important but depending on your environment or situation, some are more important than others. From your experience, what are the three most important control families? Discuss. Here is a link to the special publication: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdfLinks to an external site.
Hint: go to page 35 to find a clickable hyperlinked table.
PART 2 You Make the Call
If you were responsible for this room in your organization, which controls would you implement. After selecting the controls, write an implementation statement on how to implement or use these controls to mitigate a particular risk identified. (Choose 2. Two different families)
EditEdit
2)
Discussion Forum 7: Malicious Code
1) In Discussion Forum 7, post your response to the following discussion topic. Reply to at leasttwo classmates’ responses and shares informative URLs by the date indicated in the Course Calendar. Your discussion question response should be at least 200 Words, with another 50 words per reply.
Malicious Code, or Malware, attacks all three information security properties: Confidentiality, Integrity, and Availability. It is a threat to any Internet-connected device.
What are the types of Malware being used today (Name two), and explain in your own words what they do.
2) Respond to at least two other students (at least 50 words each )!
Respond to two (2) students/Peers (two classmates). The responses should be at least 50 words each and must focus on the discussion topic above. Examine related issues, ask questions, provide hypothesis and/or situation(s). A peer response should not be to a peer already responded to more than twice.