Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Cnss security model in information security

14/10/2021 Client: muhammad11 Deadline: 2 Day

CNSS Model Exercise

Exercises: Answer problems 1 and 2 from the "Exercises" section
(page 35) of Chapter 1 of the textbook.

--------------------------------------------------------------------
Exercises:
Some hints on Chapter 1 Exercise 1 (page 35)
--------------------------------------------------------------------
A useful reference on the CNSS model can be found
in document NSTISSI No. 4011 from the National Training
Standard for Information Security Professionals
( www.cnss.gov/Assets/pdf/nstissi_4011.pdf )

To answer Exercise 1 (page 35 of text) please refer to Figure 1.2
(CNSS security model) on page 5 of Chapter 1 of the text.

The CNSS model of Figure 1.2 identifies the nine interacting
factors that influence the security of any resource. The nine
key factors are:
(1) Policy: which deals with info security policies in place,
(2) Education: which deals with education of users on security related issues,
(3) Technology: which covers the technology used to implement security measures
(4) Confidentiality: confidentiality of info/data
(5) Integrity: addresses measures in place to ensure data integrity
(6) Availability: to ensure authorized users access to information in usable format
(7) Storage: issues dealing with data storage
(8) Processing: issues that cover the processing and handling of data
(9) Transmission: covers issues related to factors that influence transmission of data

These nine influencing factors can be modeled as a 3-dimensional cube as
shown in Figure 1.2, where the each of the three axes of the cube represent
three of these factors. When we consider the relationship among the three
dimensions represented by the axes shown in Figure 1.2 we have a 3 x 3 x 3
cube with 27 cells, where each cell represents an area of intersection among
the three dimensions that must be addressed.

In Exercise 1 you determine how you would address the different factors that impact
the security and protection of data/information pertaining to this class (such as student
information, student homework submissions, student discussion posts etc.) by applying
the CNSS model (Figure 1.2).

To apply the model, examine the intersecting cells on the CNSS cube from Figure 1.2
and determine how you could address some of the factors influencing security of class
information.

Some examples that you may consider are:

First you could consider the nine factors individually. For example,

(1) Confidentiality: Only students registered in the course have access to the
course web page.

(2) Integrity: Students would have unit logins which would be their means to
access the course webpage via eCollege. Students can only alter or modify
their own work, and cannot change or delete another student's submitted work.

(3) Availability: The university would ensure that the eCollege site is accessible
to all online students with minimal downtime for maintenance and upgrades.

... etc.

After you have addressed the individual factors, you can address the intersecting
cells in the CNSS security model of Figure 1.2. Some examples include:

- Confidentiality/Policy/Storage - This cell represents the intersection of the
factors Data Confidentiality, Security Policy, and Data Storage. This can be
addressed by adopting the following policy:-- "Only students registered in the
course are able to access course related material and student discussion posts.
Additionally, homework assignments are only viewable by the instructor and the
applicable student"

- Integrity/Policy/Processing - formed by the intersection of the Integrity, Policy,
and Processing cells in Figure 1.2. This can be addressed by having a policy such
as:-- "The course would have a policy that would all work submitted by the students
must represent their own work, and would properly cite all sources referenced."

- Availability/Education/Processing - formed by the intersection of the Availability,
Education, and Processing cells in Figure 1.2. This can be addressed by having a
policy such as:--

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Rated Expert
Helping Engineer
Engineering Solutions
Essay Writing Help
Online Assignment Help
University Coursework Help
Writer Writer Name Offer Chat
Top Rated Expert

ONLINE

Top Rated Expert

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$25 Chat With Writer
Helping Engineer

ONLINE

Helping Engineer

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$44 Chat With Writer
Engineering Solutions

ONLINE

Engineering Solutions

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$17 Chat With Writer
Essay Writing Help

ONLINE

Essay Writing Help

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$36 Chat With Writer
Online Assignment Help

ONLINE

Online Assignment Help

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$45 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$24 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Viaje al interior del cuerpo humano. - Writing - Cirque du soleil case study solution - A leader who uses an achievement oriented style - Secret agent sugar plum clarinet - Capsim how to increase days of working capital - Describing a person essay my mother - Hot fm radio toowoomba - Health Care Field Research Draft - Where is b43 postcode - 6 rules of critical thinking sociology - Introduction to qualitative analysis lab answers - Two solid steel shafts are fitted with flanges - Cross keys surgery chinnor - What landforms are created at divergent boundaries - Pilar hola irene cómo 1 - Revenue dominated cash flow diagram - The stock of nogro corporation is currently - Dis week 5 - Electric blanket safety bed wetting - Ampleforth vle - Iso 8573 1 pdf - Algebra for year 7 - Parabolic figures in real life - 25 falcon road manukau - Www eurekamultimedia com au - Tm 9 1220 254 13&p - Nottingham human computer interaction - How to find volume of a compound shape - Images com is a small internet retailer - What type of test that can be used to measure ADHD in adults and gambling - Sql server for c# developers succinctly pdf - Rent control pros and cons economics - Str 581 week 6 powerpoint - An insurance company checks police records on accidents - Title page for english - Dentural denture cleaner boots - Lyft stakeholders - Refute speech - Chapt 5 Research Assignment: Qual vs Quant - Harmful - Writing an email - Types of computer hardware ppt - Commitment to academic excellence - Leadership - Obsolete jobs of the past - Discussion board - When did gerber start making baby food - The immortal life of henrietta lacks chapter 1 - The coral island quotes - Fpga vs asic design flow - 2.5 litres to ml - Front squat jeff nippard - Black and wiliam feedback - Medical sociology cockerham 13th edition - Test power supply computer - Coastal concern action group - Strategic Plan Paper - Policy - 8732 rainbow ave kings beach ca 96143 - No match for argument php-mysql - Themes in doll's house - What is non productive time in healthcare - Amoeba sisters microscopes worksheet - Safe harbor provisions under hipaa - Implement financial management approaches - English - A subsidiary ledger frees the general ledger from details of - Thy and thee meaning - Marketing Management - Discussion 8 - Discussion - Disadvantages of non renewable energy - S60cc family law act - What year did pavlov discover classical conditioning - Compare and contrast these three protocols - Bsbsus201a participate in environmentally sustainable work practices - Is wps office safe - Forecasting: principles and practice - The burning bed movie watch online - Unidrive m200 user guide - Aspermia is the term used to describe - El parque de los adirondacks está en vermont. - 1984 essay human experience - 6 2 volleyball drills - Adobe acrobat reader dc shopfloor xi - All changed changed utterly a terrible beauty is born - What is separated during anaphase of mitosis - Patricia potter national university - Marie antoinette letter to her mother 1773 - Pratt and whitney service bulletin 1001 - Monash university core values - Smart access account interest rate - What is pearl's traumatic experience - How to write a radio script - Module 7 past year question and answer - Elora jean - Examples of experiment limitations - Emerging threats_3.1 - Why does paris attack romeo at the tomb - Ethics in psychology worksheet answers