Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Security assessment report sar

19/03/2021 Client: saad24vbs Deadline: 2 Day

Dr. Stephanie Carter

University of Maryland University College

Abstract

The purpose of the security assessment plan (SAR) is to communicate the results of security assessments of the information technology (IT) infrastructure to include its: people, processes, policies and information systems (NIST, 2010). The SAR is one of the main documents included in the system authorization package, along with the system security plan (SSP) and plan of actions and milestones (POA&Ms). These documents are used to provide the authorizing official (AO) with necessary feedback on the security state and posture of the system to make a risk-based decision if the system should operate or continue operations. The SAR provides the overall state of security of the IT infrastructure detailing the infrastructure’s ability to meet the security objectives: Confidentiality, Integrity, and Availability (CIA) when protecting the data that is transmitted, stored, or processed by and through it. Although the SAR is s document that captures a snapshot in time of the security state of the information system; to support continuous monitoring activities, the SAR is updated whenever subsequent security assessments are performed. To support document revision, the SAR should be annotated with updated versions each time it is changed and these changes should be annotated within the SAR itself. According to NIST (2014), the key elements to an assessment report is outlined in Appendix G (pp G-2); however, for this SAR the following elements will be included: Operating System (OS) Overview, OS Vulnerabilities, Assessment Methodologies, Risk, and Recommendations.

OS Overview

Operating System (OS)

User’s Role in OS.

Kernel and OS Applications.

OS Types.

OS Vulnerabilities

Windows Vulnerabilities

Intrusion Methods.

Linux Vulnerabilities

Intrusion Methods.

MAC Vulnerabilities

Mobile Device Vulnerabilities

Risk

Accepting Risk

Transferring Risk

Mitigating Risk

Eliminating Risk

Security Tools

Intrusion Detection System (IDS)

Intrusion Prevention System (IPS)

Vulnerability Assessment Methodology

Microsoft Baseline Security Analyzer (MBSA)

OpenVAS

Assessment Tool Comparative Analysis

Similarities.

Differences.

Recommendations

Conclusion

References

National Institute of Standards and Technology (NIST) (2014). Assessing security and privacy

controls in federal information systems and organizations. NIST Special Publication 800-53A Revision 4. Retrieved from http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53Ar4.pdf

National Institute of Standards and Technology (NIST) (2010). Guide for applying the risk

management framework to federal information systems. NIST Special Publication 800-37 Revision 1. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-rev1-final.pdf

.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Premium Solutions
George M.
Accounting & Finance Master
Innovative Writer
Smart Homework Helper
Financial Analyst
Writer Writer Name Offer Chat
Premium Solutions

ONLINE

Premium Solutions

I have read and understood all your initial requirements, and I am very professional in this task.

$65 Chat With Writer
George M.

ONLINE

George M.

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$110 Chat With Writer
Accounting & Finance Master

ONLINE

Accounting & Finance Master

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$107 Chat With Writer
Innovative Writer

ONLINE

Innovative Writer

I will cover all the points which you have mentioned in your project details.

$84 Chat With Writer
Smart Homework Helper

ONLINE

Smart Homework Helper

Give me a chance, i will do this with my best efforts

$78 Chat With Writer
Financial Analyst

ONLINE

Financial Analyst

I have read and understood all your initial requirements, and I am very professional in this task.

$32 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Small shoe often found with rod on mushroom - R40 tax claim form - Register to vote washoe county nv - Marketing real people real choices 7th edition ebook - Assessment - Essay mrkt - Gray manufacturing is expected to pay - Sir charles darling geelong - Discussion - Mass effect citadel missions - Informative speech on foster care system - Magnetic force on charged particles conceptual question - Accounting for extractive industries journal entries - What happens to mrna after it completes transcription - Snhu managerial accounting final project - Human Resources Management Discussion. - Tableau custom sql temp tabletableau custom sql temp table - One – Group Assessment - Internal factors of samsung - Pluralism and assimilation in rites of passage - Chapter 5 medicine and law study guide answers - How to make a dice program in java - Discussion Question 2 - "A" WORK DISCUSSION IN 15 HOURS - Electrical units and symbols - Marketing Plan - Similation of Telemedicine - Reflection about management subject - Java assignment help - Case information affidavit family court wa - Crb auto finance overnight payoff address - Trouble brews at starbucks pdf - Excel qm linear programming - Jane elliott a class divided - Raid surface spray msds australia - How to write a special occasion speech outline - Intermediate algebra with applications and visualization 3rd edition pdf - Lenscrafters 30 day unconditional guarantee - Short answer - I need 1150 words content in Importance of supply chain management - One way manova in spss - Please see attachment - Ap style time of day - Vedic maths division by nikhilam method - Wewak street public school - The lovesong of j alfred prufrock prezi - 81 prime or composite - Disney annual report 2006 - Calcium carbonate nitric acid - Big two hearted river part 2 - What is the importance of Hospitality & Guest Service - Clock spring winder tool - Medieval social system crossword - Soccer player commitment contract - Cisco rv220w default password - Thomas jefferson on the dangers of reading fiction - What year did romulus die - Kitchen equipment maintenance checklist - 4 scales of measurement - Ted talk the danger of a single story worksheet - Good questions to ask a chemistry teacher - Fifth avenue uptown james baldwin pdf - Molecular weight by freezing point depression lab answers - Law clerk cover letter - Accounting Discussion Topic-----DUE TODAY - System application domain risks - Beloved wife is not well behaved baka - The recording process and the accounting equation - Four lens night vision - Wang company accumulates the following adjustment data at december 31 - History 1-2 - Consider the circuit shown in figure 1 - Bombing of darwin timeline - 155.2 lbs to kg - A statistics professor asked her students - Experimental analysis of behavior definition - Biology b3 revision notes - Hexadecimal Calculator - Distributed database management system book pdf - Linear Project - I had seen castles sparknotes - Kreyszig advanced engineering mathematics 10th edition - Five elements of assessment design - Access 2016 in practice - ch 1 independent project 1-5 - March 13 1943 liquidation of the ghetto - Which of the following is a source of cash - Writing - Zimmer ncb distal femur plate - Bravo charlie delta echo - Hunter new england human research ethics committee - Closest airport to harvard - SOCW 6060 - Jeff nippard leg workout - The asset demand for money is downsloping because - Freestanding artwork that occupies space and can be viewed from all sides. - H101 - Boss centered or subordinate centered leadership style - Cambridge a level syllabus - Astro unl edu naap hr animations hr html - Here comes amazon here comes amazon