Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Cnss security model in information security

14/10/2021 Client: muhammad11 Deadline: 2 Day

CNSS Model Exercise

Exercises: Answer problems 1 and 2 from the "Exercises" section
(page 35) of Chapter 1 of the textbook.

--------------------------------------------------------------------
Exercises:
Some hints on Chapter 1 Exercise 1 (page 35)
--------------------------------------------------------------------
A useful reference on the CNSS model can be found
in document NSTISSI No. 4011 from the National Training
Standard for Information Security Professionals
( www.cnss.gov/Assets/pdf/nstissi_4011.pdf )

To answer Exercise 1 (page 35 of text) please refer to Figure 1.2
(CNSS security model) on page 5 of Chapter 1 of the text.

The CNSS model of Figure 1.2 identifies the nine interacting
factors that influence the security of any resource. The nine
key factors are:
(1) Policy: which deals with info security policies in place,
(2) Education: which deals with education of users on security related issues,
(3) Technology: which covers the technology used to implement security measures
(4) Confidentiality: confidentiality of info/data
(5) Integrity: addresses measures in place to ensure data integrity
(6) Availability: to ensure authorized users access to information in usable format
(7) Storage: issues dealing with data storage
(8) Processing: issues that cover the processing and handling of data
(9) Transmission: covers issues related to factors that influence transmission of data

These nine influencing factors can be modeled as a 3-dimensional cube as
shown in Figure 1.2, where the each of the three axes of the cube represent
three of these factors. When we consider the relationship among the three
dimensions represented by the axes shown in Figure 1.2 we have a 3 x 3 x 3
cube with 27 cells, where each cell represents an area of intersection among
the three dimensions that must be addressed.

In Exercise 1 you determine how you would address the different factors that impact
the security and protection of data/information pertaining to this class (such as student
information, student homework submissions, student discussion posts etc.) by applying
the CNSS model (Figure 1.2).

To apply the model, examine the intersecting cells on the CNSS cube from Figure 1.2
and determine how you could address some of the factors influencing security of class
information.

Some examples that you may consider are:

First you could consider the nine factors individually. For example,

(1) Confidentiality: Only students registered in the course have access to the
course web page.

(2) Integrity: Students would have unit logins which would be their means to
access the course webpage via eCollege. Students can only alter or modify
their own work, and cannot change or delete another student's submitted work.

(3) Availability: The university would ensure that the eCollege site is accessible
to all online students with minimal downtime for maintenance and upgrades.

... etc.

After you have addressed the individual factors, you can address the intersecting
cells in the CNSS security model of Figure 1.2. Some examples include:

- Confidentiality/Policy/Storage - This cell represents the intersection of the
factors Data Confidentiality, Security Policy, and Data Storage. This can be
addressed by adopting the following policy:-- "Only students registered in the
course are able to access course related material and student discussion posts.
Additionally, homework assignments are only viewable by the instructor and the
applicable student"

- Integrity/Policy/Processing - formed by the intersection of the Integrity, Policy,
and Processing cells in Figure 1.2. This can be addressed by having a policy such
as:-- "The course would have a policy that would all work submitted by the students
must represent their own work, and would properly cite all sources referenced."

- Availability/Education/Processing - formed by the intersection of the Availability,
Education, and Processing cells in Figure 1.2. This can be addressed by having a
policy such as:--

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Rated Expert
Helping Engineer
Engineering Solutions
Essay Writing Help
Online Assignment Help
University Coursework Help
Writer Writer Name Offer Chat
Top Rated Expert

ONLINE

Top Rated Expert

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$25 Chat With Writer
Helping Engineer

ONLINE

Helping Engineer

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$44 Chat With Writer
Engineering Solutions

ONLINE

Engineering Solutions

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$17 Chat With Writer
Essay Writing Help

ONLINE

Essay Writing Help

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$36 Chat With Writer
Online Assignment Help

ONLINE

Online Assignment Help

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$45 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$24 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Suppose police set up radar surveillance stanford street - Vic uni st albans campus map - The life of arseniev - The growth of cities worksheet - Csi wildlife tracking poachers answer key - How far is venus from the sun - Caulfield blood donor centre - Excel capstone - Literary movements in english literature ppt - Mount waverley north primary school - Dyson brand positioning - DISCUSSION ART HIST 2 - 400 words - Mrs merriweather hypocrisy quotes - Upon what basic quantity does kinetic energy depend - Electric funeral machine - Rossendale pet crematorium and memorial gardens - Ms project task board - How did domestic containment operate in 1950's 1960's america - Current Issue/Trend in nursing - Smells like teen spirit rap - Juniper cli commands list - Me talk pretty one day purpose - Building electrical circuits lab answers - Assignment - I need a assignment done that has a part A and B done for week 5 and Week 7 for My Marketing in an Global Enviroment - Article 1 - Add voiceover to prezi - What would happen if mitosis were uncontrolled - Residency paper FINAL - A worthy woman from beside bath city - Rc circuit and current conceptual question mastering physics - Math Questions - Cover page for a report - Word chapter 2 formatting and customizing documents - Cryptography and Network Security - Annotated bibliography and outline leadership behavior - Write the difference between autotrophs and heterotrophs - Heifetz and laurie 1997 - Transplant nursing scope and standards of practice - Is toms shoes a nonprofit - Mason company schedule of cost of goods manufactured - Society and culture preliminary past papers - Experiment 2: diffusion - concentration gradients and membrane permeability - Ir spectrum of cyclopentanol - Vcaa study design psychology - Research Methods in Criminal Justice - Chapter 13. - Outliers roseto - The blacker the berry sparknotes - Novice to expert theory patricia benner - Gordon allport letters from jenny - Capm case study - Addressing floating and patient safety - A worn path essay conclusion - Various gas expansions pv plots and work mastering physics - Ansi vs asme drawing standards - Lc-grad3 gcu - Essay due in 40 mins - Drawing aoa network diagram - Elements of a fairy tale graphic organizer - List of sheet metal defects ppt - Where's waldo fruit fight answers - How giraffes got their long necks - Week 10 - General tenancy agreement form - WORK-12 - Chapter 8 cellular reproduction cells from cells - Fiona dolman new tricks - A company has sales of $375,000 and its gross profit is $157,500. its cost of goods sold equals: - Data warehouse st andrews - PSY 8 - Pinocchio's lakes entrance menu - Bluebeam isometric grid - Excel 365/2019 Capstone - Level 3 Working with Sales Data Alternate with VLOOKUP - Flinders uni grading system - Human resources week 4 - Who narrates the book thief - Breezair evaporative cooling manual - Airbus h135 operating cost - Flowchart vs concept map - Statistics house market part 2 - 5ml of vodka standard drink - Responses - Application of derivatives in real life examples with solutions - 365 post and responses - Robot art lesson plan - A small backpack manufacturer carries four different - Information taken from an existing classified source and generated into another form or medium - Before manager kim can begin the mbo process with her associates, what step needs to be taken? - Wendy's mission and vision statement - Pandit bhagwat dayal sharma university of health sciences - AC/FI D4 - 8 bit computer arithmetic - Chcdiv001 answers - Reflection paper about accounting - What type of process flow structure is cbf using - Discussion 04: Ethics in the Era of ACA - Some words with a mummy essay - Iturralde v hilo medical center usa legal components - Environmental pollution presentation