Cyber Security Programming: NIST Guidelines for Security Control
VerifiedAdded on  2023/06/03
|9
|1062
|397
AI Summary
The paper delves into outlining particular descriptions of cyber security design measures, as prescribed at the National Institute of Standards and Technology (NIST). The baselines for security control are divided into their family names, and the research seeks to investigate on two categories as follows: ACCESS CONTROL (AC-1), COGNIZANCE AND CONDITIONING (AT-1), INSPECT AND ANSWERABILITY (AU-1), ASSESSING AND AUTHORISING SECURITY (CA-1), CONSTELLATION DIRECTING (CM-1), BACKUP CONTRIVING, DESINGING AND HALLMARKING, RESPONSE TO INCIDENCES, SUSTENANCE (MA-1), MULTIMEDIA COVER (MP-1), FORCIBILITY OF ENVIRONMENTAL COVER (PE-1), DESIGNING, INDIVIDUALS PROTECTION, JEOPARDY ASSESSMENT, THE FRAME WORK OF ACQUIRING SERVICES, THE FRAMEWORK OF CORRESPONDENCE COVER (SC-1), and THE FRAMEWORK OF DATA INTEGRITY (SI-1).
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
CYBER SECURITY PROGRAMMING
Cyber Security Programming
Submitted by Names
University's Name
Tutor
Date of submission
Cyber Security Programming
Submitted by Names
University's Name
Tutor
Date of submission
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2
Table of Contents
Introduction.................................................................................................................................................3
ACCESS CONTROL (AC-1).............................................................................................................................4
NIST 800-12, 800-100..............................................................................................................................4
COGNIZANCE AND CONDITIONING (AT-1)...................................................................................................4
NIST 800-12, 800-16, 800-50, 800-100....................................................................................................4
INSPECT AND ANSWERABILITY (AU-1).........................................................................................................4
NIST 800-12, 800-100..............................................................................................................................4
ASSESSING AND AUTHORISING SECURITY (CA-1)........................................................................................4
CONSTELLATION DIRECTING (CM-1)............................................................................................................4
NIST Special Publications 800-12, 800-100..............................................................................................4
BACKUP CONTRIVING..................................................................................................................................4
NIST 800-34.............................................................................................................................................4
DESINGING AND HALLMARKING.................................................................................................................5
NIST 800-12, 800-61, 800-83, 800-100....................................................................................................5
RESPONSE TO INCIDENCES..........................................................................................................................5
NIST 800-61.............................................................................................................................................5
SUSTENANCE (MA-1)...................................................................................................................................5
NIST Special Publications 800-12, 800-100..............................................................................................5
Table of Contents
Introduction.................................................................................................................................................3
ACCESS CONTROL (AC-1).............................................................................................................................4
NIST 800-12, 800-100..............................................................................................................................4
COGNIZANCE AND CONDITIONING (AT-1)...................................................................................................4
NIST 800-12, 800-16, 800-50, 800-100....................................................................................................4
INSPECT AND ANSWERABILITY (AU-1).........................................................................................................4
NIST 800-12, 800-100..............................................................................................................................4
ASSESSING AND AUTHORISING SECURITY (CA-1)........................................................................................4
CONSTELLATION DIRECTING (CM-1)............................................................................................................4
NIST Special Publications 800-12, 800-100..............................................................................................4
BACKUP CONTRIVING..................................................................................................................................4
NIST 800-34.............................................................................................................................................4
DESINGING AND HALLMARKING.................................................................................................................5
NIST 800-12, 800-61, 800-83, 800-100....................................................................................................5
RESPONSE TO INCIDENCES..........................................................................................................................5
NIST 800-61.............................................................................................................................................5
SUSTENANCE (MA-1)...................................................................................................................................5
NIST Special Publications 800-12, 800-100..............................................................................................5
3
MULTIMEDIA COVER (MP-1).......................................................................................................................5
NIST 800-111...........................................................................................................................................5
FORCIBILITY OF ENVIRONMENTAL COVER (PE-1)........................................................................................5
NIST Special Publications 800-12, 800-100..............................................................................................5
DESIGNING..................................................................................................................................................6
NIST 800-18.............................................................................................................................................6
INDIVIDUALS PROTECTION..........................................................................................................................6
NIST 800-35.............................................................................................................................................6
JEOPARDY ASSESSMENT..............................................................................................................................6
NIST 800-40, 800-70, 800-115;................................................................................................................6
THE FRAME WORK OF ACQUIRING SERVICES..............................................................................................6
NIST 800-12, 800-100, 800-32, 800-63....................................................................................................6
THE FRAMEWORK OF CORRESPONDENCE COVER (SC-1)............................................................................6
NIST Special Publications 800-12, 800-100..............................................................................................6
THE FRAMEWORK OF DATA INTEGRITY.......................................................................................................7
NIST 800-45.............................................................................................................................................7
MULTIMEDIA COVER (MP-1).......................................................................................................................5
NIST 800-111...........................................................................................................................................5
FORCIBILITY OF ENVIRONMENTAL COVER (PE-1)........................................................................................5
NIST Special Publications 800-12, 800-100..............................................................................................5
DESIGNING..................................................................................................................................................6
NIST 800-18.............................................................................................................................................6
INDIVIDUALS PROTECTION..........................................................................................................................6
NIST 800-35.............................................................................................................................................6
JEOPARDY ASSESSMENT..............................................................................................................................6
NIST 800-40, 800-70, 800-115;................................................................................................................6
THE FRAME WORK OF ACQUIRING SERVICES..............................................................................................6
NIST 800-12, 800-100, 800-32, 800-63....................................................................................................6
THE FRAMEWORK OF CORRESPONDENCE COVER (SC-1)............................................................................6
NIST Special Publications 800-12, 800-100..............................................................................................6
THE FRAMEWORK OF DATA INTEGRITY.......................................................................................................7
NIST 800-45.............................................................................................................................................7
4
Introduction
The paper delves into outlining particular descriptions of cyber security design measures,
as prescribed at the National Institute of Standards and Technology (NIST). The baselines for
security control are divided into their family names, and the research seeks to investigate on two
categories as follows:
ACCESS CONTROL (AC-1)
NIST 800-12, 800-100
The AC category section refers to the formation of policy and process effectively, for the
execution of chosen controls.
COGNIZANCE AND CONDITIONING (AT-1)
NIST 800-12, 800-16, 800-50, 800-100
It conveys awareness to security and policies of training that hand aims, coverage, roles,
and conformism among the organization’s entities.
INSPECT AND ANSWERABILITY (AU-1)
NIST 800-12, 800-100
The section covers administration of policy and processes involving auditing events,
checking audit records, storage capacity as well as mitigating failures.
ASSESSING AND AUTHORISING SECURITY (CA-1)
NIST 800-12, 800-37, 800-53A, 800-100
The section covers effectual execution of security controls and CA family regulatory
enhancements.
Introduction
The paper delves into outlining particular descriptions of cyber security design measures,
as prescribed at the National Institute of Standards and Technology (NIST). The baselines for
security control are divided into their family names, and the research seeks to investigate on two
categories as follows:
ACCESS CONTROL (AC-1)
NIST 800-12, 800-100
The AC category section refers to the formation of policy and process effectively, for the
execution of chosen controls.
COGNIZANCE AND CONDITIONING (AT-1)
NIST 800-12, 800-16, 800-50, 800-100
It conveys awareness to security and policies of training that hand aims, coverage, roles,
and conformism among the organization’s entities.
INSPECT AND ANSWERABILITY (AU-1)
NIST 800-12, 800-100
The section covers administration of policy and processes involving auditing events,
checking audit records, storage capacity as well as mitigating failures.
ASSESSING AND AUTHORISING SECURITY (CA-1)
NIST 800-12, 800-37, 800-53A, 800-100
The section covers effectual execution of security controls and CA family regulatory
enhancements.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
5
CONSTELLATION DIRECTING (CM-1)
NIST Special Publications 800-12, 800-100
Is in the CM family and reflects on federal law relevant policies and processes.
BACKUP CONTRIVING
NIST 800-34
Belongs to the CP category including contingency programming, conditioning, program
examination and updating changes in site.
DESINGING AND HALLMARKING
NIST 800-12, 800-61, 800-83, 800-100
Belongs to the IA family and involves picking users, symbol marking, resubmission
checker, cryptography and service verification.
RESPONSE TO INCIDENCES
NIST 800-61
Belongs to the IR category whose functions include conditioning for incidences reaction,
counter measuring and their assessments.
SUSTENANCE (MA-1)
NIST Special Publications 800-12, 800-100
Belongs to the MA family that involve up keeping control, tools, remote upkeep,
personnel upkeep as well as time.
CONSTELLATION DIRECTING (CM-1)
NIST Special Publications 800-12, 800-100
Is in the CM family and reflects on federal law relevant policies and processes.
BACKUP CONTRIVING
NIST 800-34
Belongs to the CP category including contingency programming, conditioning, program
examination and updating changes in site.
DESINGING AND HALLMARKING
NIST 800-12, 800-61, 800-83, 800-100
Belongs to the IA family and involves picking users, symbol marking, resubmission
checker, cryptography and service verification.
RESPONSE TO INCIDENCES
NIST 800-61
Belongs to the IR category whose functions include conditioning for incidences reaction,
counter measuring and their assessments.
SUSTENANCE (MA-1)
NIST Special Publications 800-12, 800-100
Belongs to the MA family that involve up keeping control, tools, remote upkeep,
personnel upkeep as well as time.
6
MULTIMEDIA COVER (MP-1)
NIST 800-111
Belongs to MP category which include functions to approach media, branding, storage,
utilisation, transport and sanitization.
FORCIBILITY OF ENVIRONMENTAL COVER (PE-1)
NIST Special Publications 800-12, 800-100
Belongs to the PE family which constitutes of forcible approaches to admission,
manipulation on media coverage, publishing, supervision of content, emergency lighting and
power generation.
DESIGNING
NIST 800-18
Falls into the PL category involving plans for the network security, updating and
behavioral analysis.
INDIVIDUALS PROTECTION
NIST 800-35
Categorised in the PS classes of designing jeopardy positions, covering of individuals,
elimination, transfers, conventions and sanctioning.
MULTIMEDIA COVER (MP-1)
NIST 800-111
Belongs to MP category which include functions to approach media, branding, storage,
utilisation, transport and sanitization.
FORCIBILITY OF ENVIRONMENTAL COVER (PE-1)
NIST Special Publications 800-12, 800-100
Belongs to the PE family which constitutes of forcible approaches to admission,
manipulation on media coverage, publishing, supervision of content, emergency lighting and
power generation.
DESIGNING
NIST 800-18
Falls into the PL category involving plans for the network security, updating and
behavioral analysis.
INDIVIDUALS PROTECTION
NIST 800-35
Categorised in the PS classes of designing jeopardy positions, covering of individuals,
elimination, transfers, conventions and sanctioning.
7
JEOPARDY ASSESSMENT
NIST 800-40, 800-70, 800-115;
Is under the RA classes of security classification, scanning of weaknesses, assessing
jeopardy and expert surveying
THE FRAME WORK OF ACQUIRING SERVICES
NIST 800-12, 800-100, 800-32, 800-63
Belonging to SA category which involves assigning resources, life cycle to develop
systems (SDLC), procedures for acquisition. Similarly, the section comprises of several
necessities behind security including functions, effectiveness, confidence and paper related
needs.
THE FRAMEWORK OF CORRESPONDENCE COVER (SC-1)
NIST Special Publications 800-12, 800-100
Categorised as an SC, it comprises of the application segmentation, distinguishing
security parts from non-security parts, portioned out resources of information, coverage from
denial of service, provision of resources and communication trustworthiness.
THE FRAMEWORK OF DATA INTEGRITY (SI-1)
NIST 800-45
Finally, the SI category includes remedying faults, cover from vicious code, supervision,
validation of security operations, integrity in software as well as protection from spam.
JEOPARDY ASSESSMENT
NIST 800-40, 800-70, 800-115;
Is under the RA classes of security classification, scanning of weaknesses, assessing
jeopardy and expert surveying
THE FRAME WORK OF ACQUIRING SERVICES
NIST 800-12, 800-100, 800-32, 800-63
Belonging to SA category which involves assigning resources, life cycle to develop
systems (SDLC), procedures for acquisition. Similarly, the section comprises of several
necessities behind security including functions, effectiveness, confidence and paper related
needs.
THE FRAMEWORK OF CORRESPONDENCE COVER (SC-1)
NIST Special Publications 800-12, 800-100
Categorised as an SC, it comprises of the application segmentation, distinguishing
security parts from non-security parts, portioned out resources of information, coverage from
denial of service, provision of resources and communication trustworthiness.
THE FRAMEWORK OF DATA INTEGRITY (SI-1)
NIST 800-45
Finally, the SI category includes remedying faults, cover from vicious code, supervision,
validation of security operations, integrity in software as well as protection from spam.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
8
AUTHORITY FOR INTENTIONS
EGOVERNMENT ACT OF 2002 (P.L. 107-347)
It belongs to the AP categorization of classes and involves identifying all aspirations of
the organization collection of data.
ANSWERABILITY, INSPECT AND JEOARDY DIRECTION
THE PRIVACY ACT OF 1974, 5 U.S.C. § 552A(M)
Classified as AR and is used to bolster trust among the public using effectual
manipulation for authority, supervision and management of risks.
AUTHORITY FOR INTENTIONS
EGOVERNMENT ACT OF 2002 (P.L. 107-347)
It belongs to the AP categorization of classes and involves identifying all aspirations of
the organization collection of data.
ANSWERABILITY, INSPECT AND JEOARDY DIRECTION
THE PRIVACY ACT OF 1974, 5 U.S.C. § 552A(M)
Classified as AR and is used to bolster trust among the public using effectual
manipulation for authority, supervision and management of risks.
9
References
[1] Force, J.T. and Initiative, T., 2013. Security and privacy controls for federal information
systems and organizations. NIST Special Publication, 800(53), pp.8-13.
[2] Kim, D. and Solomon, M.G., 2016. Fundamentals of information systems security. Jones &
Bartlett Publishers.
[3] Mell, P. and Grance, T., 2011. The NIST definition of cloud computing.
[4] Ross, R.S., 2013. Security and Privacy Controls for Federal Information Systems and
Organizations [includes updates as of 5/7/13] (No. Special Publication (NIST SP)-800-
53 Rev 4).
References
[1] Force, J.T. and Initiative, T., 2013. Security and privacy controls for federal information
systems and organizations. NIST Special Publication, 800(53), pp.8-13.
[2] Kim, D. and Solomon, M.G., 2016. Fundamentals of information systems security. Jones &
Bartlett Publishers.
[3] Mell, P. and Grance, T., 2011. The NIST definition of cloud computing.
[4] Ross, R.S., 2013. Security and Privacy Controls for Federal Information Systems and
Organizations [includes updates as of 5/7/13] (No. Special Publication (NIST SP)-800-
53 Rev 4).
1 out of 9
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.