Question

In: Computer Science

Adoption of the Critical Security Controls is a hot topic in today’s organizations.

Adoption of the Critical Security Controls is a hot topic in today’s organizations. Review the CSC survey document and provide at least one suggestion on three different controls for an organization to move from awareness of the CSC’s to implementation. Please feel free to make assumptions as needed for you to develop recommendations for a fictional company. The document is attached. https://www.sans.org/reading-room/whitepapers/analyst/2013-critical-security-controls-survey-moving-awareness-action-35065

Solutions

Expert Solution

In order to do this question you can go through the document, however, the main focus of the question is to provide atleast one suggestion for each of the three different controls for real/imaginary organization to move from awareness of the CSC's to implementation.

The three different controls are:
1. Mature Control
2. Evolving Control
3. Immature Control

Suggestions can be like a scenario description like below:
for mature control: Suppose a manager in the organization is storing data only in the hard drive of his desktop. One day, his hard drive crashes then with his hard drive all the data is also gone. So, in order to prevent that, he should have made a copy of the data and stored it in cloud or some other safer server. In order to recover from this type disaster, organizations often make it employees to store data in cloud or a common server which is guarded by recovery techniques.

You can provide suggestions in similar way for the other two controls too.


Related Solutions

A hot topic in today’s news is the rising cost of health care and how we,...
A hot topic in today’s news is the rising cost of health care and how we, as a country can provide health coverage. Is healthcare a right or choice? Do you believe health care should be regulated and government funded? Or do you believe health care should be provided by the private sector and allow competition to manage the risk and access of healthcare. In addition, what are some viable alternatives to this problem? What implications might these alternatives have...
Data analytics is becoming a hot topic in the IT field. Determine how organizations such as...
Data analytics is becoming a hot topic in the IT field. Determine how organizations such as aircraft's can use Big Data in times of disruption to defeat market revolutionaries.
Discuss the types of controls that can be used in organizations.
Discuss the types of controls that can be used in organizations.
Discuss the partnership taxation topic of hot assets.
Discuss the partnership taxation topic of hot assets.
In today’s world, IT organizations are finding alternative ways of delivering value to their customers, and...
In today’s world, IT organizations are finding alternative ways of delivering value to their customers, and to achieve these objectives there has been advocates of IT Outsourcing, you are an IT Manager of newly setup Savings and Loans Company, SAVELOAN Inc, and you have been tasked by your management to do a presentation to the Board of Directors who are not very sure of the way to go in accepting the sourcing options that will make them competitive since they...
1. What are the major external forces for change in today’s organizations? 2. What are the...
1. What are the major external forces for change in today’s organizations? 2. What are the advantages of using an external change agent? An internal change agent? 3. Can organizations prevent resistance to change? If so, how?
Accreditation is the evaluation of the security controls of an IT system to establish the extent...
Accreditation is the evaluation of the security controls of an IT system to establish the extent to which a particular design and implementation meets a set of specified security requirements. The risk management strategy used for A&A is depicted in the document, Risk Management Framework. Select ONE of the six steps of the framework illustrated in the Risk Management Framework. In at least 250 words, discuss the following: Identify the step and associated government document. Discuss the importance of the...
Accreditation is the evaluation of the security controls of an IT system to establish the extent...
Accreditation is the evaluation of the security controls of an IT system to establish the extent to which a particular design and implementation meets a set of specified security requirements. The risk management strategy used for A&A is depicted in the document, Risk Management Framework. Select Three of the six steps of the framework illustrated in the Risk Management Framework below: STEPS: 1: Categorize Information System 2: Implement Security Controls 3: Assess Security Controls 4: Select Security Controls 5: Authorize...
- List some of Windows Server threats and the security controls?
- List some of Windows Server threats and the security controls?
Managing IT security and risks Information security is critical in the development and implementation of information...
Managing IT security and risks Information security is critical in the development and implementation of information systems in organizations. Assume that you are developing a customer relationship management system for Morita Loan, list five methods that you can use to protect the data in such a system and discuss how you can implement these five means for information security.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT