Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Security assessment report sar

19/03/2021 Client: saad24vbs Deadline: 2 Day

Dr. Stephanie Carter

University of Maryland University College

Abstract

The purpose of the security assessment plan (SAR) is to communicate the results of security assessments of the information technology (IT) infrastructure to include its: people, processes, policies and information systems (NIST, 2010). The SAR is one of the main documents included in the system authorization package, along with the system security plan (SSP) and plan of actions and milestones (POA&Ms). These documents are used to provide the authorizing official (AO) with necessary feedback on the security state and posture of the system to make a risk-based decision if the system should operate or continue operations. The SAR provides the overall state of security of the IT infrastructure detailing the infrastructure’s ability to meet the security objectives: Confidentiality, Integrity, and Availability (CIA) when protecting the data that is transmitted, stored, or processed by and through it. Although the SAR is s document that captures a snapshot in time of the security state of the information system; to support continuous monitoring activities, the SAR is updated whenever subsequent security assessments are performed. To support document revision, the SAR should be annotated with updated versions each time it is changed and these changes should be annotated within the SAR itself. According to NIST (2014), the key elements to an assessment report is outlined in Appendix G (pp G-2); however, for this SAR the following elements will be included: Operating System (OS) Overview, OS Vulnerabilities, Assessment Methodologies, Risk, and Recommendations.

OS Overview

Operating System (OS)

User’s Role in OS.

Kernel and OS Applications.

OS Types.

OS Vulnerabilities

Windows Vulnerabilities

Intrusion Methods.

Linux Vulnerabilities

Intrusion Methods.

MAC Vulnerabilities

Mobile Device Vulnerabilities

Risk

Accepting Risk

Transferring Risk

Mitigating Risk

Eliminating Risk

Security Tools

Intrusion Detection System (IDS)

Intrusion Prevention System (IPS)

Vulnerability Assessment Methodology

Microsoft Baseline Security Analyzer (MBSA)

OpenVAS

Assessment Tool Comparative Analysis

Similarities.

Differences.

Recommendations

Conclusion

References

National Institute of Standards and Technology (NIST) (2014). Assessing security and privacy

controls in federal information systems and organizations. NIST Special Publication 800-53A Revision 4. Retrieved from http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53Ar4.pdf

National Institute of Standards and Technology (NIST) (2010). Guide for applying the risk

management framework to federal information systems. NIST Special Publication 800-37 Revision 1. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-rev1-final.pdf

.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Premium Solutions
George M.
Accounting & Finance Master
Innovative Writer
Smart Homework Helper
Financial Analyst
Writer Writer Name Offer Chat
Premium Solutions

ONLINE

Premium Solutions

I have read and understood all your initial requirements, and I am very professional in this task.

$65 Chat With Writer
George M.

ONLINE

George M.

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$110 Chat With Writer
Accounting & Finance Master

ONLINE

Accounting & Finance Master

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$107 Chat With Writer
Innovative Writer

ONLINE

Innovative Writer

I will cover all the points which you have mentioned in your project details.

$84 Chat With Writer
Smart Homework Helper

ONLINE

Smart Homework Helper

Give me a chance, i will do this with my best efforts

$78 Chat With Writer
Financial Analyst

ONLINE

Financial Analyst

I have read and understood all your initial requirements, and I am very professional in this task.

$32 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Camel roaming call flow - Regression analysis - Www sedar com search search_form_pc_en htm - Macrosystem level transition of care - Annotated bibliography and outline leadership behavior - Qvc channel on directv - Rhetorical essay - John stossel outsourcing - Photorec carver - Tweetdeck comn - Point of view assessment - Nike information system case study - P&g one page memo example - Indo european family tree - How did ancient communities exchanged their goods - What was walmart's early global expansion strategy - Which of the following estimates at a - Herblock's history political cartoons - Cell theory graphic organizer answer key - No copy and paste and must be read instructions carefully and follow them. - The divine command theory implies that - How to determine the net present value - Suicide is sometimes considered an honorable, almost religious act in Japan. - Two accountants for the firm of elwes and wright - Introduction to science exercise 1 data interpretation - Managerial accounting reports are prepared only quarterly and annually - The rime of the ancient mariner worksheet answers - Dr danie du toit - 2016 vcaa psychology exam - Healthcare Administration Assignment - Citrus valley high school - Electric hedge trimmer safety - What does a onion cell look like - The road not taken essay - Answer to peer, APA 6, 2 References, Similarities Less 5% - Excel 2016 module 8 review assignment - Griffith university exercise science - Similes in bridge to terabithia - Criminal Justice (Annotated Bibliography: Race, Ethnicity & the Criminal Justice System) - Connect wincc to sql server - Bbc weather cockermouth cumbria - Titus linear bar grille - Nsw fair trading moving out - Turnitin Report - Triple column cash book questions with solutions - Packet tracer - configure ip acls to mitigate attacks - Final Care Coordination Plan - Mary fisher speech analysis - Excel speadsheet with questions must be answered. - Ciat lonbarde deerhorn organ - Percent of sales method accounting - You can insert ____ different kinds of pictures into powerpoint - Etsu minitab - Module 12 Discussion CL - Landscape 1 - Toyota weaknesses 2018 - Determine if the matrix is invertible - Security and Architecture Design Course -Assignment - Pedagogy of the oppressed chapter 1 discussion questions - Primary Document Analysis - Module 6 Journal Article Analysis - Fat paps escape the bowling alley code - Dynamic earth webquest answer key - The minefield poem analysis - Lumo energy pay my bill - Diego compró el anillo ring para - Conservation of energy at the skate park answer key - Should jenner & jenner cpas send accounts receivable confirmations - Donatos finding the new pizza - Discussion - Desmos graphing trig functions - ODC5/2 - Econ 213 quiz 1 - Strengths and weakness of vrio framework - James riordan and partners - Diffusivity equation for radial flow - Ethical theories in nursing essay - Why is it unlikely that you will find the ip address 192.168.250.10 on the internet? - Tizzy's first tools play online - Management skills audit template - How to write picot question - Kotter's model can help an organization - Battery isolator installation instructions - Delta signal corp simulation - Fluid volume overload nursing diagnosis - What is the major difference between zenmap and openvas - Circular bodied guitar crossword clue - Communication - Current event speech outline - Looking for a Manuscript Editor - All in his hands lyrics florida mass choir - With reference to the strategy highlight 8.2, the tata group's corporate strategy is attempting to - Bbc three secrets of the superbrands fashion summary - Ix bull head locations - Assignment #048 - Spelling for class 4 - Johnson and johnson swot analysis essay - Onion skin cell lab - Amazon echo target consumer - University physics with modern physics 12e young