Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Security assessment report sar

19/03/2021 Client: saad24vbs Deadline: 2 Day

Dr. Stephanie Carter

University of Maryland University College

Abstract

The purpose of the security assessment plan (SAR) is to communicate the results of security assessments of the information technology (IT) infrastructure to include its: people, processes, policies and information systems (NIST, 2010). The SAR is one of the main documents included in the system authorization package, along with the system security plan (SSP) and plan of actions and milestones (POA&Ms). These documents are used to provide the authorizing official (AO) with necessary feedback on the security state and posture of the system to make a risk-based decision if the system should operate or continue operations. The SAR provides the overall state of security of the IT infrastructure detailing the infrastructure’s ability to meet the security objectives: Confidentiality, Integrity, and Availability (CIA) when protecting the data that is transmitted, stored, or processed by and through it. Although the SAR is s document that captures a snapshot in time of the security state of the information system; to support continuous monitoring activities, the SAR is updated whenever subsequent security assessments are performed. To support document revision, the SAR should be annotated with updated versions each time it is changed and these changes should be annotated within the SAR itself. According to NIST (2014), the key elements to an assessment report is outlined in Appendix G (pp G-2); however, for this SAR the following elements will be included: Operating System (OS) Overview, OS Vulnerabilities, Assessment Methodologies, Risk, and Recommendations.

OS Overview

Operating System (OS)

User’s Role in OS.

Kernel and OS Applications.

OS Types.

OS Vulnerabilities

Windows Vulnerabilities

Intrusion Methods.

Linux Vulnerabilities

Intrusion Methods.

MAC Vulnerabilities

Mobile Device Vulnerabilities

Risk

Accepting Risk

Transferring Risk

Mitigating Risk

Eliminating Risk

Security Tools

Intrusion Detection System (IDS)

Intrusion Prevention System (IPS)

Vulnerability Assessment Methodology

Microsoft Baseline Security Analyzer (MBSA)

OpenVAS

Assessment Tool Comparative Analysis

Similarities.

Differences.

Recommendations

Conclusion

References

National Institute of Standards and Technology (NIST) (2014). Assessing security and privacy

controls in federal information systems and organizations. NIST Special Publication 800-53A Revision 4. Retrieved from http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53Ar4.pdf

National Institute of Standards and Technology (NIST) (2010). Guide for applying the risk

management framework to federal information systems. NIST Special Publication 800-37 Revision 1. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-rev1-final.pdf

.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Premium Solutions
George M.
Accounting & Finance Master
Innovative Writer
Smart Homework Helper
Financial Analyst
Writer Writer Name Offer Chat
Premium Solutions

ONLINE

Premium Solutions

I have read and understood all your initial requirements, and I am very professional in this task.

$65 Chat With Writer
George M.

ONLINE

George M.

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$110 Chat With Writer
Accounting & Finance Master

ONLINE

Accounting & Finance Master

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$107 Chat With Writer
Innovative Writer

ONLINE

Innovative Writer

I will cover all the points which you have mentioned in your project details.

$84 Chat With Writer
Smart Homework Helper

ONLINE

Smart Homework Helper

Give me a chance, i will do this with my best efforts

$78 Chat With Writer
Financial Analyst

ONLINE

Financial Analyst

I have read and understood all your initial requirements, and I am very professional in this task.

$32 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

They say i say 4th edition chapter 1 exercise 1 - Chemical equation for aerobic respiration - Ionic dot structure worksheet - Sc1040 week 3 assignment - How to write radio news - How to prepare 1000 ppm ammonia solution - You are working as an IT security manager at one of the resorts in the state of Hawaii. The financial controller of the resort wants to roll out PCI-DSS compliance program at the resort; - Analyze the buyer decision process of a traditional porsche - Student information system rfp - Bill nye static electricity worksheet - Covalent bond directional or non directional - John wesley class meetings - Bituthene 4000 data sheet - A3 BUS - Ohm's law lab report graph - Castan centre for human rights law - Algebra 1 chapter 3 test answer key - Us w7 shoe size - John van allen ii - Student schema database - Average voltage half wave rectifier - Black belt project charter example - Essentials of nursing research - Acme anvils has a newly patented - Collina's italian cafe in houston texas advertises - Australia new zealand food standards code definition - Cisco service module password reset - Engineering drawing lecture notes - Lyryx linear algebra textbook - Long distance walkers association - Eat em like junk food - National communication association credo for ethical communication - Autodock vina result interpretation - Kiran bedi ted talk - Ausclad group of companies - Write a program that scores a blackjack hand - Aca ethical decision making model - Projectile motion hypothesis - Bulky waste collection act - What are the possible gametes produced by the individual ssyy - Anthropology - Epworth camberwell sleep unit - The copper pipe has an outer diameter of - Auditing a risk based approach edition - Alternative Analysis Case study - Individual website design and development part 1 - Federal safeguards for financial reporting abuse - State the formula to determine body mass index - Final Exam Research Paper - Book report summary example - Roscoe building manchester university - The use of multiple perspective and primary shapes - Only direct quotations are documented - If a six sided die is tossed two times, the probability of obtaining two "4s" in a row is - Sam hughes margaret olley - Oppression remedy s232 - Agueda pio baroja summary - 2016 studio arts exam - Investment banking case study example - Crossing brooklyn ferry transcendentalism - What to wear to a cabaret show - Growth and Development - Cover letter for civil engineer - Research Paper - Click and learn virus explorer answers - With the nickel sized hail and the damaging winds lyrics - Should parents let their child play football argumentative essay - Magnifica coffee machine manual - Case studies in abnormal psychology answers - The ______ measure of returns ignores compounding - American revolution - Ashala wolf chapter summaries - Cengage income tax fundamentals 2019 - MK405 Unit 7 Discussion - Quantitative nursing research critique - Homework - Barista coffee recipes pdf - Marginal internal rate of return - Advertising and Logical Fallacies - The life of julius caesar plutarch summary - Glatt gpcg 120 specifications - Code 9 meaning police - 67 mcraes avenue penshurst - Relationship between height and armspan - V2500 engine training manual - Molecular geometry lab - Dummy variable approach forecast sales - Ashford university sci 207 lab kit - Model risk excel add in - Anne of green gables chapter 11 - How to draw anemometer - Excalibur corporation sells video games - Entropy change in isobaric process - Ecosystem approach 2 - Luzadis company makes furniture using the latest automated technology - Terror's purse strings annotated - Unknown - Angular velocity word problems - Life cycle of an apple tree book - How to graph marginal cost and marginal revenue in excel