Top Research Professionals
The research experts and assignment help team consists exclusively of highly qualified graduate writers, each professional with in-depth subject matter expertise and significant experience in custom academic writing.
For similar papers and sample answers; with a few clicks, Order your research paper, thesis, dissertation writing and other assignment help services
Posted: March 2nd, 2022
Please use APA style formatting.
Question 1
For the pharmaceutical company in HW-3, were tasked to develop an access control policy for the company. Currently, you are performing an as-is analysis and assessing current security practices. You’ve found three critical problems with current practices. These are:
1) The accounts of the former employees are not always removed after the termination of the employment.
2) The database server is in the same network as the computer workstations.
3) Server administrators use the same “Administrator” account.
Download NIST Special Publication 800-53 from this URL:
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf
NIST SP 800-53 is titled Security and Privacy Controls for Federal Information Systems and Organizations.
This publication helps federal agencies and contractors meet the requirements set by the Federal Information Security Management Act (FISMA). Review the document to familiarize yourself with its contents.
Go to TABLE D-3: SUMMARY — ACCESS CONTROL, which is in the Appendix-D of the document. Fill out the following table.
Security Problem in Pharmaceutical Company Control No and Control Name in SP 800-53
Question 2
Although your company is not a federal organization, explain how NIST SP 800-53 can help your organization in increasing security maturity as if you are explaining it to your CEO or another important non-tech-
Please format your paper in APA style.
Question No. 1
In HW-3, we were entrusted with developing an access control strategy for the pharmaceutical industry. You are now conducting an as-is analysis and evaluating current security practices. You’ve identified three key flaws in present practices. They are as follows:
1) Former employees’ accounts are not usually deleted after their job is terminated.
2) The database server and the computer workstations are both connected to the same network.
3) All server administrators log in using the same “Administrator” account.
Download NIST Special Publication 800-53 from this URL:
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf
NIST SP 800-53 is titled Security and Privacy Controls for Federal Information Systems and Organizations.
This publication helps federal agencies and contractors meet the requirements set by the Federal Information Security Management
Study Notes, Research Topics & Assignment Examples: Mod10 Discussion – Ethical Issue Clinical Judgment Case Scenario »Leadership Development: Failure and the Power of QuestionsWe prioritize delivering top quality work sought by college students.
The research experts and assignment help team consists exclusively of highly qualified graduate writers, each professional with in-depth subject matter expertise and significant experience in custom academic writing.
Our custom writing services maintain the highest quality while remaining affordable for students. Our pricing for research papers, theses, and dissertations is not only fair considering the superior quality but also competitive with other writing services.
We guarantee plagiarism-free, human-written content. Every product is assured to be original and not AI-generated. Our writers, tutors and editors are research experts who ensures the right formating and citation sytles are followed. To note, all the final drafts undergo rigorous plagiarism checks before delivery for submission to ensure authenticity for our valued customers.
When you decide to place an order with Dissertation Help, here is what happens: