Case Report: Greatthinker Gfc

Decent Essays
GreatThinker GFC, one of the numerous federal agencies in Washington DC that has to adopt those minimum set of security controls developed by National Institute of Standards and Technology (NIST) to protect their information and information systems. The NIST developed the Federal Information Processing Standard (FIPS) 200, containing minimum security requirements for Federal Information and Information Systems, specifies the minimum security requirements for federal information and information systems in seventeen security-related areas. Federal agencies must meet the minimum security requirements defined in FIPS 200 through the use of the security controls in NIST Special Publication 800-53, Recommended Security Controls for Federal Information

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Eco/372 Week 1

    • 491 Words
    • 2 Pages

    Based on the organization you have chosen for your final research paper, respond to the following: I. Regulations: If any data involved is regulated, or if there are other legal and compliance concerns, state them in this section. The laws covering the internet are varied and quite complex in the United States with the financial system to the medical system heavily regulated. Starting off the Sarbanes-Oxley was enacted in 2002, the Sarbanes-Oxley Act is designed to protect investors and the public by increasing the accuracy and reliability of corporate disclosures. It was enacted after the high-profile Enron and WorldCom financial scandals of the early 2000s.…

    • 491 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Criteria should be developed on who has access to what information, and appropriate technical safeguards should be put into place, so information is only…

    • 614 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    This author himself is a highly educated, college professor. Even with that perspective of being a scholar in this field of study for more than 5 years, Herb does not frame this article to be viewed by other highly educated university professors in his similar field of study. As I mentioned before he aims this article at a more general population. The actual audience of this piece would be subscribers to the Washington Post where this article was published. In addition to the subscribers, the ideal audience would include individuals in care about the Equifax hack or cyber space policy and security.…

    • 1616 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    A1: Business Objective: Healthy Body Wellness Center (HBWC) Office of Grants Giveaway (OGG) business objective is to offer a proficient methodology that promotes improvement in the quality and usefulness of medical grants. HBWC disburses several medical grants through federally supported health research, and implemented the Small Hospital Grant Tracking System (SHGTS) to automate assignment and tracking of the grant disbursement, streamline review of completed evaluation submitted by grant seekers and promote sharing of health information among healthcare professionals. A2: Security Principle The guiding security principle that HBWC should use to meet Federal Information Processing Standards (FIPS) is an ISO 27002 security framework, accompanied…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The NSA/CSS strives to lead an expert workforce for their best efforts to advance and operate cryptologic systems and tools. They also look to improve performance and integration of their core expertise and of their mission to protect and defend. The agency must also make sense of and securely share electronically gathered information as well as increase security of national security systems. To accomplish these goals, a five-step strategy has been set in place. First, the NSA/CSS must succeed in todays operations by enabling wise…

    • 1143 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    When developing a security policy framework for XYZ Health Care Organization it’s important to understand guidelines needed to establish an effective policy. Such guidelines like Health Insurance Portability and Accountability Act (HIPPA), and The Sarbanes–Oxley Act (SOX) must be included and followed to the letter. This will eliminate nearly all guesswork and fill in the blanks where HIPAA and SOX do not. Finally, while following these set ground rules it is also important to understand that this framework must fit the description laid out by the Confidentiality, integrity and availability CIA triad. There is a growing need to fill gaps which are left by the guidelines from HIPAA, SOX and the CIA triad.…

    • 410 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Developed in collaboration with healthcare and information security professionals, the Health Information Trust Alliance (HITRUST) Common Security Framework (CSF) is a security framework for protecting health information tailored for the U.S. healthcare industry. The CSF includes and integrates federal and state regulations, standards, and frameworks such as HIPAA (Health Insurance Portability and Accountability Act), NIST (National Institute of Standards and Technology), ISO (International Organization for Standardization), and COBIT (Control Objectives for Information and related Technology) to provide a healthcare organization with a broad and adaptable tool for assessing risk (Murphy, 2015). As described on the Health Information Trust…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Department of Homeland Security (DHS) is a department of the federal government tasked with protecting America and its territory from terrorism, securing the borders, securing cyberspace, administering immigration laws, and ensuring disaster resilience (“Our Mission”, 2015). With the assistance of twenty-two other agencies and departments, the DHS has successfully accomplished its mission for fifteen years. The National Strategy for Homeland Security is the starting point for all homeland security related policies and procedures (“National Strategy”, n.d.). This single document sets the guidelines for other regulations such the Quadrennial Review and DHS Budget.…

    • 1255 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Hacking In Healthcare

    • 1225 Words
    • 5 Pages

    Introduction Hacking the Healthcare System Healthcare has the highest cyber-attacks in the industry. This is only growing. Nearly half of all health care organizations have reported criminal attacks that caused a breach in their systems (Goodman, 2015). These hackers are gaining access to the electronic health information. Identification, banking information, and pharmacies used are just some of the data that these online hackers are getting their hands on.…

    • 1225 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Having two or more children, there is a maximum amount of qualifying expenses is $6,000. That amount should be reduced by $1,800, since Martha received $1,800 for dependent care assistance. The total expenses are $4,200. Tim and Martha’s AGI is over $43,000 they are entitled to a credit of 20% of their expenses, or $840. ($4,200 x .20 = $840)…

    • 645 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Information security is an extremely important concept so when protecting information in an organisation there is three core principles to follow to maintain the utilization, flow and storage of data this is also known as the CIA triad these are the three main objectives of information security and they are:…

    • 1392 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Have you ever asked yourself how can a process be more effective and produce positive results? That is what an Enterprise Architecture (EA) is for! The Meridian-Webster dictionary defined EA as a conceptual blueprint that defines the structure and operation of an organization with the intent to determine how an organization can most effectively achieve its current and future objectives. This paper presents a comparison between two of the most popular Enterprise Architecture, TOGAF and FEAF. Are these two frameworks any different?…

    • 1428 Words
    • 6 Pages
    Great Essays
  • Brilliant Essays

    Intelligence In The Intelligence Community

    • 2133 Words
    • 9 Pages
    • 4 Works Cited

    policymakers; Defense Intelligence Agency (DIA) a principal member of the IC who’s, mission is to provide timely, objective all-source military intelligence to policymakers to U.S. Armed Forces around the world; Federal Bureau of Investigation (FBI) a threat-based, intelligence driven national security organization that protects the U.S. from critical threats while safeguarding civil liberties. As both a component of the Department of Justice and a full member of the U.S. IC, the FBI serves as a vital link between intelligence and law enforcement communities; National Geospatial-Intelligence Agency (NGA) is a Department of Defense combat support agency and a member of the national IC, NGA develops imagery and map-based intelligence solutions for U.S. national defense, homeland security and safety of navigation; National Reconnaissance Office (NRO) is considered the nations eyes and ears in space, the NRO is a joint organization with a workforce that includes personnel assigned primarily from the Air Force, CIA, and the Navy. However, the other uniformed services and other elements of the DoD and the IC are also represented to engage in research and development; National Security Agency (NSA) who’s area of expertise include cryptanalysis, cryptography, mathematics, computer science, and foreign…

    • 2133 Words
    • 9 Pages
    • 4 Works Cited
    Brilliant Essays