Cyber Security Programming: NIST Guidelines for Security Control

Verified

Added on  2023/06/03

|9
|1062
|397
AI Summary
The paper delves into outlining particular descriptions of cyber security design measures, as prescribed at the National Institute of Standards and Technology (NIST). The baselines for security control are divided into their family names, and the research seeks to investigate on two categories as follows: ACCESS CONTROL (AC-1), COGNIZANCE AND CONDITIONING (AT-1), INSPECT AND ANSWERABILITY (AU-1), ASSESSING AND AUTHORISING SECURITY (CA-1), CONSTELLATION DIRECTING (CM-1), BACKUP CONTRIVING, DESINGING AND HALLMARKING, RESPONSE TO INCIDENCES, SUSTENANCE (MA-1), MULTIMEDIA COVER (MP-1), FORCIBILITY OF ENVIRONMENTAL COVER (PE-1), DESIGNING, INDIVIDUALS PROTECTION, JEOPARDY ASSESSMENT, THE FRAME WORK OF ACQUIRING SERVICES, THE FRAMEWORK OF CORRESPONDENCE COVER (SC-1), and THE FRAMEWORK OF DATA INTEGRITY (SI-1).
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
CYBER SECURITY PROGRAMMING
Cyber Security Programming
Submitted by Names
University's Name
Tutor
Date of submission
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2
Table of Contents
Introduction.................................................................................................................................................3
ACCESS CONTROL (AC-1).............................................................................................................................4
NIST 800-12, 800-100..............................................................................................................................4
COGNIZANCE AND CONDITIONING (AT-1)...................................................................................................4
NIST 800-12, 800-16, 800-50, 800-100....................................................................................................4
INSPECT AND ANSWERABILITY (AU-1).........................................................................................................4
NIST 800-12, 800-100..............................................................................................................................4
ASSESSING AND AUTHORISING SECURITY (CA-1)........................................................................................4
CONSTELLATION DIRECTING (CM-1)............................................................................................................4
NIST Special Publications 800-12, 800-100..............................................................................................4
BACKUP CONTRIVING..................................................................................................................................4
NIST 800-34.............................................................................................................................................4
DESINGING AND HALLMARKING.................................................................................................................5
NIST 800-12, 800-61, 800-83, 800-100....................................................................................................5
RESPONSE TO INCIDENCES..........................................................................................................................5
NIST 800-61.............................................................................................................................................5
SUSTENANCE (MA-1)...................................................................................................................................5
NIST Special Publications 800-12, 800-100..............................................................................................5
Document Page
3
MULTIMEDIA COVER (MP-1).......................................................................................................................5
NIST 800-111...........................................................................................................................................5
FORCIBILITY OF ENVIRONMENTAL COVER (PE-1)........................................................................................5
NIST Special Publications 800-12, 800-100..............................................................................................5
DESIGNING..................................................................................................................................................6
NIST 800-18.............................................................................................................................................6
INDIVIDUALS PROTECTION..........................................................................................................................6
NIST 800-35.............................................................................................................................................6
JEOPARDY ASSESSMENT..............................................................................................................................6
NIST 800-40, 800-70, 800-115;................................................................................................................6
THE FRAME WORK OF ACQUIRING SERVICES..............................................................................................6
NIST 800-12, 800-100, 800-32, 800-63....................................................................................................6
THE FRAMEWORK OF CORRESPONDENCE COVER (SC-1)............................................................................6
NIST Special Publications 800-12, 800-100..............................................................................................6
THE FRAMEWORK OF DATA INTEGRITY.......................................................................................................7
NIST 800-45.............................................................................................................................................7
Document Page
4
Introduction
The paper delves into outlining particular descriptions of cyber security design measures,
as prescribed at the National Institute of Standards and Technology (NIST). The baselines for
security control are divided into their family names, and the research seeks to investigate on two
categories as follows:
ACCESS CONTROL (AC-1)
NIST 800-12, 800-100
The AC category section refers to the formation of policy and process effectively, for the
execution of chosen controls.
COGNIZANCE AND CONDITIONING (AT-1)
NIST 800-12, 800-16, 800-50, 800-100
It conveys awareness to security and policies of training that hand aims, coverage, roles,
and conformism among the organization’s entities.
INSPECT AND ANSWERABILITY (AU-1)
NIST 800-12, 800-100
The section covers administration of policy and processes involving auditing events,
checking audit records, storage capacity as well as mitigating failures.
ASSESSING AND AUTHORISING SECURITY (CA-1)
NIST 800-12, 800-37, 800-53A, 800-100
The section covers effectual execution of security controls and CA family regulatory
enhancements.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
5
CONSTELLATION DIRECTING (CM-1)
NIST Special Publications 800-12, 800-100
Is in the CM family and reflects on federal law relevant policies and processes.
BACKUP CONTRIVING
NIST 800-34
Belongs to the CP category including contingency programming, conditioning, program
examination and updating changes in site.
DESINGING AND HALLMARKING
NIST 800-12, 800-61, 800-83, 800-100
Belongs to the IA family and involves picking users, symbol marking, resubmission
checker, cryptography and service verification.
RESPONSE TO INCIDENCES
NIST 800-61
Belongs to the IR category whose functions include conditioning for incidences reaction,
counter measuring and their assessments.
SUSTENANCE (MA-1)
NIST Special Publications 800-12, 800-100
Belongs to the MA family that involve up keeping control, tools, remote upkeep,
personnel upkeep as well as time.
Document Page
6
MULTIMEDIA COVER (MP-1)
NIST 800-111
Belongs to MP category which include functions to approach media, branding, storage,
utilisation, transport and sanitization.
FORCIBILITY OF ENVIRONMENTAL COVER (PE-1)
NIST Special Publications 800-12, 800-100
Belongs to the PE family which constitutes of forcible approaches to admission,
manipulation on media coverage, publishing, supervision of content, emergency lighting and
power generation.
DESIGNING
NIST 800-18
Falls into the PL category involving plans for the network security, updating and
behavioral analysis.
INDIVIDUALS PROTECTION
NIST 800-35
Categorised in the PS classes of designing jeopardy positions, covering of individuals,
elimination, transfers, conventions and sanctioning.
Document Page
7
JEOPARDY ASSESSMENT
NIST 800-40, 800-70, 800-115;
Is under the RA classes of security classification, scanning of weaknesses, assessing
jeopardy and expert surveying
THE FRAME WORK OF ACQUIRING SERVICES
NIST 800-12, 800-100, 800-32, 800-63
Belonging to SA category which involves assigning resources, life cycle to develop
systems (SDLC), procedures for acquisition. Similarly, the section comprises of several
necessities behind security including functions, effectiveness, confidence and paper related
needs.
THE FRAMEWORK OF CORRESPONDENCE COVER (SC-1)
NIST Special Publications 800-12, 800-100
Categorised as an SC, it comprises of the application segmentation, distinguishing
security parts from non-security parts, portioned out resources of information, coverage from
denial of service, provision of resources and communication trustworthiness.
THE FRAMEWORK OF DATA INTEGRITY (SI-1)
NIST 800-45
Finally, the SI category includes remedying faults, cover from vicious code, supervision,
validation of security operations, integrity in software as well as protection from spam.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8
AUTHORITY FOR INTENTIONS
EGOVERNMENT ACT OF 2002 (P.L. 107-347)
It belongs to the AP categorization of classes and involves identifying all aspirations of
the organization collection of data.
ANSWERABILITY, INSPECT AND JEOARDY DIRECTION
THE PRIVACY ACT OF 1974, 5 U.S.C. § 552A(M)
Classified as AR and is used to bolster trust among the public using effectual
manipulation for authority, supervision and management of risks.
Document Page
9
References
[1] Force, J.T. and Initiative, T., 2013. Security and privacy controls for federal information
systems and organizations. NIST Special Publication, 800(53), pp.8-13.
[2] Kim, D. and Solomon, M.G., 2016. Fundamentals of information systems security. Jones &
Bartlett Publishers.
[3] Mell, P. and Grance, T., 2011. The NIST definition of cloud computing.
[4] Ross, R.S., 2013. Security and Privacy Controls for Federal Information Systems and
Organizations [includes updates as of 5/7/13] (No. Special Publication (NIST SP)-800-
53 Rev 4).
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]