Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Cnss security model explained

07/01/2021 Client: saad24vbs Deadline: 10 Days

Exercises: Answer problems 1 and 2 from the "Exercises" section

(page 35) of Chapter 1 of the textbook.








--------------------------------------------------------------------

   Exercises:

   Some hints on Chapter 1 Exercise 1 (page 35)

--------------------------------------------------------------------

A useful reference on the CNSS model can be found

in document NSTISSI No. 4011 from the National Training

Standard for Information Security Professionals

( www.cnss.gov/Assets/pdf/nstissi_4011.pdf )








To answer Exercise 1 (page 35 of text) please refer to Figure 1.2

(CNSS security model) on page 5 of Chapter 1 of the text.




The CNSS model of Figure 1.2 identifies the nine interacting

factors that influence the security of any resource. The nine

key factors are:

    (1) Policy: which deals with info security policies in place,

    (2) Education: which deals with education of users on security related issues,

    (3) Technology: which covers the technology used to implement security measures

    (4) Confidentiality: confidentiality of info/data

    (5) Integrity: addresses measures in place to ensure data integrity

    (6) Availability: to ensure authorized users access to information in usable format

    (7) Storage: issues dealing with data storage

    (8) Processing: issues that cover the processing and handling of data

    (9) Transmission: covers issues related to factors that influence transmission of data








These nine influencing factors can be modeled as a 3-dimensional cube as

shown in Figure 1.2, where the each of the three axes of the cube represent

three of these factors. When we consider the relationship among the three

dimensions represented by the axes shown in Figure 1.2 we have a 3 x 3 x 3

cube with 27 cells, where each cell represents an area of intersection among

the three dimensions that must be addressed.








In Exercise 1 you determine how you would address the different factors that impact

the security and protection of data/information pertaining to this class (such as student

information, student homework submissions, student discussion posts etc.) by applying

the CNSS model (Figure 1.2).








To apply the model, examine the intersecting cells on the CNSS cube from Figure 1.2

and determine how you could address some of the factors influencing security of class

information.




Some examples that you may consider are:




First you could consider the nine factors individually. For example,




(1) Confidentiality: Only students registered in the course have access to the

    course web page.




(2) Integrity: Students would have unit logins which would be their means to

    access the course webpage via eCollege. Students can only alter or modify

    their own work, and cannot change or delete another student's submitted work.




(3) Availability: The university would ensure that the eCollege site is accessible

    to all online students with minimal downtime for maintenance and upgrades.




 ... etc.




After you have addressed the individual factors, you can address the intersecting

cells in the CNSS security model of Figure 1.2. Some examples include:




 - Confidentiality/Policy/Storage - This cell represents the intersection of the

   factors Data Confidentiality, Security Policy, and Data Storage. This can be

   addressed by adopting the following policy:-- "Only students registered in the

   course are able to access course related material and student discussion posts.

   Additionally, homework assignments are only viewable by the instructor and the

   applicable student"




 - Integrity/Policy/Processing - formed by the intersection of the Integrity, Policy,

   and Processing cells in Figure 1.2. This can be addressed by having a policy such

   as:-- "The course would have a policy that would all work submitted by the students

   must represent their own work, and would properly cite all sources referenced."




 - Availability/Education/Processing - formed by the intersection of the Availability,

   Education, and Processing cells in Figure 1.2. This can be addressed by having a

   policy such as:--

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

University Coursework Help
Helping Hand
Top Essay Tutor
Writer Writer Name Offer Chat
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$102 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$100 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$105 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Unit 2 IP Technological Influences - Animal farm activity pack answers - Paper word,1250 words APA style ,please add references and citations by 10/30/2020 at 6:00 pm - Dan murphys swan hill - Buchan caves swimming pool - Ln 25 wire feeder parts - A company began its fiscal year with inventory of - Elderly women should consume ______ milliliters of water per day - Articles with ethos pathos and logos - Cognitive orientation to learning - An example of a persuasive message - Yeast air balloon experiment - Hurricane Sandy Case Study - Virgin mobile canada voicemail - Critical pedagogy axiology - Mass Communication, Culture, and Media Literacy - HLS685 A1 - Org_behavior - Reflection, Discussion and Assignment - IDM W 7 A - Due Sunday by 1 pm - PROFESSIONAL NURSE PRACTITIONER ESSAY - Cisco asa 5520 performance - Is social business working out - Seasons come to pass page 232 - Metal carbonyl ir stretching frequencies - Examples of information systems in daily life - American beauty quotes jane - High power variable capacitor - COLLABORATIVE LEARNING COMMUNITY - Experiment 4 chemical reactions lab report - FInal Paper: Research Proposal- Depression in Teens - Johns hopkins hospital financial statements 2018 - Conjugate acid base pair - Toyota car recall case study - As1684 span tables mgp10 - AVD5 Due in 6 Hours - Chicago manual sample paper - How to cite aca code of ethics in apa paper - Professor quenby private clinic - MGMT 1 - Ucl engineering entry requirements - 3 reasons why college still matters - Parasomnia (sexsomniac) - Internet Marketing - Case Dscumentation - Kenworth motors case study answers - Essay about advance nursing professional. - Cross manufacturing company chennai tamil nadu - Archive org details malwaremuseum&tab collection - Ventilation increases during exercise due to increases in - Homework by helen simpson summary - All summer in a day - Short Discussion Board DUE 10.2.2020 - Cotton tree pool aqua aerobics - Zeek the geek online - Human population ecology cemetery lab answers - Smith and roberson's business law 17th edition - Formula for flexible budget variance - Information Governance assignment - General reading practice test 5 - 113.6 lbs in stone - Ernst and young foundation case studies solutions - Lens used to direct light crossword clue - Universal testing machine lab report - High commission bangladesh canberra - Integrated Enerprise System - Yash raj films casting director contact - Homework 4 2 mystatlab module four problem set - Restoration theory of sleep - Aila cyclone in sunderbans - 73.6 kg in lbs - 13343 sydney rd valrico fl 33594 - Library management system slideshare - Clarissa dalloway and sally seton - A psychometric evaluation of the beck depression inventory ii - Indiana university plagiarism test - Compute the takt time for a system - Epochs represent the total number of - What landforms are created at divergent boundaries - Under what circumstances was equiano twice parted from his sister - Critical read summaries - Answer these questions 200 words(general reflection) - Nh4cl ca oh 2 cacl2 h2o nh3 - Sociology of food syllabus - 4 page paper on drug abuse - Internet Marketing - Kaizen workshop agenda - - Paper: Nutrition-Related Diseases - Marketing - Auditing - Continuum allen curnow analysis - Who narrates the kaiser permanente commercials - Elements of the music - Penn foster bookkeeping final project - What is the slowest type of mass wasting process - How to construct a confidence interval in excel - Diversity trends in leadership - Emerging threats_7.2 - Ravi puravankara email id - Eminent Cricket Live Streaming Regions