Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Cobit 5 iso 27001 mapping

18/03/2021 Client: saad24vbs Deadline: 2 Day

CSIA 350: Cybersecurity in Business & Industry

Project #1: Integrating NIST’s Cybersecurity Framework with Information Technology Governance Frameworks
Scenario
You have been assigned to your company’s newly established Risk Management Advisory Services team. This team will provide information, analysis, and recommendations to clients who need assistance with various aspects of IT Risk Management.

Your first task is to prepare a 3 to 4 page research paper which provides an analysis of the IT Governance, IT Management, and Risk Management issues and problems that might be encountered by an e-Commerce company (e.g. Amazon, e-Bay, PayPal, etc.). Your paper should also include information about governance and management frameworks that can be used to address these issues. The specific frameworks that your team leader has asked you to address are:

· ISO/IEC 27000 Family of Standards for Information Security Management Systems

· ISACA’s Control Objectives for Information Technology (COBIT) version 5

· NIST’s Cybersecurity Framework (also referred to as the “Framework for Improving Critical Infrastructure Security”)

The Risk Management Advisory team has performed some initial research and determined that using these three frameworks together can help e-Commerce companies ensure that they have processes in place to enable identification and management of information security related risks particularly those associated with the IT infrastructure supporting online sales, payment, and order fulfillment operations. (This research is presented in the Background section below.) Your research paper will be used to extend the team’s initial research and provide additional information about the frameworks and how each one supports a company’s risk management objectives (reducing the risks arising from cyber threats and cyberattacks against information, information systems, and information infrastructures). Your research should also investigate and report on efforts to date to promote the use both frameworks at the same time.

Your audience will be members of the Risk Management Services team. These individuals are familiar with risk management processes and the e-Commerce industry. Your readers will NOT have in-depth knowledge of either framework. For this reason, your team leader has asked you to make sure that you include a basic overview of these frameworks at the beginning of your paper for the benefit of those readers who are not familiar with CSF and COBIT.

Background
Security Controls
Security controls are actions which are taken to “control” or manage risk. Security controls are sometimes called “countermeasures” or “safeguards.” For this assignment, it is important to understand that it is not enough to pick or select controls and then buy or implement technologies which implement those controls. A structure is required to keep track of the controls and their status -- implemented (effective, not effective) and not implemented. The overarching structure used to manage controls is the Information Security Management System.

Information Security Management System (ISMS)
An Information Security Management System is the set of policies, processes, procedures, and activities used to structure the organizational unit which is responsible for managing the cybersecurity or information security program in a business. Companies can and do design their own structure for this program including: scope, responsibilities, and resources. Many companies, however, choose to use a defined standard to provide guidance for the structure and functions assigned to this organization. The ISO/IEC 27000 family of standards is one of the most frequently adopted and is comprised of best practices for the implementation of an information security program. The ISO/IEC 27001 standard specifies the requirements for and structure of the overall Information Security Management System and ISMS program. The ISO/IEC 27002 standard provides a catalog of security controls which can/should be implemented by the ISMS program. For additional information about the standards, please see this blog https://www.itgovernance.co.uk/blog/what-is-the-iso-27000-series-of-standards.

Note: there are a number of free resources which describe the contents and purposes of the ISO/IEC 27000 family of standards. For your work in this course, you do not need access to the official standards documents (which are not freely available).

Control Objectives for Information Technology (COBIT)
COBIT is a framework that defines governance and management principles, processes, and organizational structures for enterprise Information Technology. COBIT includes a requirement for implementation of an Information Security Management System and is compatible with the ISO/IEC 27000 series of standards for ISMS implementation.

COBIT 5 has five process areas which are specified for the Governance and Management of enterprise IT. These areas are:

· Evaluate, Direct, and Monitor (EDM)

· Align, Plan, and Organize (APO)

· Build, Acquire, and Implement (BAI)

· Deliver, Service, and Support (DSS)

· Monitor, Evaluate, and Assess (MEA)

Beginning with version 5, COBIT has incorporated Information Security as part of the framework. Three COBIT 5 processes specifically address information security: APO 13 “Manage Security,” DSS04 “Manage Continuity,” and DSS05 “Manage Security Services.”[footnoteRef:1] [1: Source: http://www.isaca.org/COBIT/Documents/COBIT-5-for-Information-Security-Introduction.pdf ]

NIST Cybersecurity Framework (CSF)
The NIST Framework for Improving Critical Infrastructure Security, commonly referred to as the Cybersecurity Framework or CSF, was developed in collaboration with industry, government, and academia to provide a common language and common frame of reference for describing the activities required to manage cyber-related risks and, in so doing, protect and defend against cyber attacks. Unlike many NIST guidance documents, the CSF was designed specifically for businesses – to meet their needs and support attainment of business objectives. Originally designed for companies operating in the 16 critical infrastructure sectors, the CSF is now being required of federal government agencies and departments and their contractors. The Executive Summary of the NIST CSF version 1.1 provides additional background and supporting information about the purposes, goals, and objectives of the CSF.

The Cybersecurity Framework is presented in three parts:

· Core Functions (Identify, Protect, Detect, Respond, Recover)

· Implementation Tiers (risk management processes and practices)

· Profiles (specific to a business or industry – goals and desired outcomes)

Commonalities between ISO/IEC 27000, COBIT, and NIST CSF
There are a number of common elements between the information security frameworks defined in the ISO/IEC 27000 family of standards, the COBIT standard, and the NIST Cybersecurity Framework. Each of these frameworks addresses risks that must be addressed by businesses that depend upon digital forms of information, information systems, and information infrastructures. Each framework presents structured lists of IT Governance and IT Management activities (processes and practices) which must be adopted and implemented in order to effectively manage risk and protect digital assets from harm or loss. Each framework also provides a list or catalog security. Each framework also provides lists of goals or objectives which must be met in order to assure the effectiveness of controls implemented to defend against cyber threats and attacks.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Financial Assignments
Math Exam Success
Chartered Accountant
Quick Mentor
Calculation Master
University Coursework Help
Writer Writer Name Offer Chat
Financial Assignments

ONLINE

Financial Assignments

I will cover all the points which you have mentioned in your project details.

$34 Chat With Writer
Math Exam Success

ONLINE

Math Exam Success

I have read and understood all your initial requirements, and I am very professional in this task.

$39 Chat With Writer
Chartered Accountant

ONLINE

Chartered Accountant

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$34 Chat With Writer
Quick Mentor

ONLINE

Quick Mentor

I have read your project details. I can do this within your deadline.

$15 Chat With Writer
Calculation Master

ONLINE

Calculation Master

I have read your project details. I can do this within your deadline.

$35 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

I will cover all the points which you have mentioned in your project details.

$18 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Chapter5 - Aristotle poetics chapter 6 summary - Bmgi lean six sigma - Acc 202 final project presentation to investors powerpoint - Defence language proficiency test - Stanford genetics and genomics certificate - Paul smith methodist minister - Error in keymgr dll missing entry krshowkeymgr - Compare and contrast essay about two countries - Research Paper: COSO Framework - Week 8 capstone journal - How to stop contentkeeper - Discussion post - Global technology - Order 2124009: Create a framework for developing one’s own ethical and moral philosophy. - Powerpoint Should Consist Of 18 Slides. Rubric Is Attached .PLEASE FALLOW THE RUBRIC - Affidavit of undertaking philippines - Chapter 4 Discussion - 100 points of id nsw education - Phet simulation circuit construction kit - The Evolution of the Electronic Medical Record - Schoolhouse rock shot heard round the world - Possible conflict management and negotiation techniques - Which president played the banjo in the alcatraz inmate band - Reciprocal inhibition in healthcare - Manage personal work priorities and professional development assessment answers - Social media marketing a strategic approach edition - Dartmouth regatta flying programme - Jackson good evil and the presidency - Capwell corporation uses a periodic inventory system - Touch of pink mary kay - Cdt cutting oil sds - Year 11 ipt notes - Sheriff joe arpaio youtube - Questionnaire on green products - Sesshu painted in a style that was called haboku meaning - How to run pspice simulation in orcad - Project sign off document pdf - Uk driving licence template photoshop free - Hot black oxide process - Super size me movie questions and answers - Suppose honda's total cost of producing - Answer about a website - Cerner multum inc uk summary of product characteristics - What are the six elements of a typical scope statement - Cert 4 laboratory techniques - Errors in theodolite surveying - Logic models - Introduction To Criminology Course Help - Swz salary salary wizard sponsor - How many federal agencies make up osha - Wogs out of work nick giannopoulos - Industrial adhesives pvt ltd - An a1 n 1 d - Diplomatic Report - Human relations strategies for success 6th edition pdf - Are seventh day adventists the same as jehovah witnesses - Cambridge lms org main - Alligator river story activity - Fun home alison bechdel pdf free - Summary of The Discipline of Business Intelligence-Course 3 - Palliative care - Intercultural Communication - Air pressure booster working principle - UNIT V ASSESSMENT MBA 6601 - Satanic verses chapter summary - Gods with stainless ears - Protocols of the elders of zion pdf - History Assignment - John kotter eight steps to successful change - Like niobe all tears - Zinc and hydrochloric acid lab - Banyan tree bank dubai - Second order low pass filter gain - Examples of primary dimensions of diversity - We need more humanities majors summary - Cpt code for removal of urolift implant - Ib november 2020 grade boundaries - Non-diversifiable risk is also referred to as - Emergency banking relief act what was its immediate purpose - Human movement science unisa - Homemade incubator without thermostat - Assume that hybridization experiments are conducted with peas - Chemistry data sheet hsc - Uml class diagram uses relationship - Parent lounge st hildas - , All Quiet on the Western Front - Children's Literature - Abrasive blasting production rates - Fm 6 0 army pubs - Manuela asistir la clase yoga - Personal philosophy of nursing paper - Gothic setting in wuthering heights - Two assignments due tonight before 11:59 - HSE 6-1 - Case study zynga face trouble in farmvile - Create a scenario summary report excel 2013 - Chaplinsky v new hampshire - Prizm is a segmentation scheme - 10 example of material noun - Xia corporation is a company