Provide a short paragraph for each family describing the


Security Assessment for an enterprise must be incorporated into the Software Development Life Cycle (SDLC) in order to be a secure, integrated process.

Testing of selected security controls ensures that applications meet business requirements, function as planned, and protect associated data securely from attack.

A security assessment of the targeted environment identifies vulnerabilities that may cause a security breach and specifies the security controls that mitigate the vulnerabilities. Refer to NIST SP 800-53 rev 4 for identification of the eighteen candidate security control families and associated security controls.

Choose five distinct security control families as specified in SP 800-53 rev 4, click on the chosen familites, and create a spreadsheet that identifies the following criteria for each family:

Control ID

Control Name

Vulnerability

Provide a short paragraph for each family describing the testing procedure that will mitigate the vulnerability.

Example:

Family - Identification and Authentication

Control ID - IA-2

Control Name - Identification and Authentication (Organizational Users)

Vulnerability - Illegal user access

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Provide a short paragraph for each family describing the
Reference No:- TGS02301607

Now Priced at $20 (50% Discount)

Recommended (95%)

Rated (4.7/5)