1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol [13]
3 years ago
15

NIST Special Publication 800-18 Rev. 1, The Guide for Developing Security Plans for Federal Information Systems, includes templa

tes for major application security plans, and provides detailed methods for assessing, designing, and implementing controls and plans for applications of varying size.
Social Studies
1 answer:
Arlecino [84]3 years ago
4 0

Answer:

<u><em>The answer is</em></u>: <u>True.</u>

Explanation:

<u>Information System Security Plan Template </u>

<u>Guide for Developing Security Plans for Federal Information Systems </u>

1. Information System Name/Title:

• Unique identifier and name given to the system.

2. Information System Categorization:

• Identify the appropriate FIPS 199 categorization.

LOW MODERATE HIGH

3. Information System Owner:

• Name, title, agency, address, email address, and phone number of person who

owns the system.

4. Authorizing Official:

• Name, title, agency, address, email address, and phone number of the senior

management official designated as the authorizing official.

5. Other Designated Contacts:

• List other key personnel, if applicable; include their title, address, email address,

and phone number.

6. Assignment of Security Responsibility:

• Name, title, address, email address, and phone number of person who is

responsible for the security of the system.

7. Information System Operational Status:  

• Indicate the operational status of the system. If more than one status is selected,

list which part of the system is covered under each status.

Operational Under

Development

Major

Modification

8. Information System Type:

• Indicate if the system is a major application or a general support system. If the

system contains minor applications, list them in Section 9. General System

Description/Purpose.

Major

Application

General Support  

System

9. General System Description/Purpose

• Describe the function or purpose of the system and the information processes.

10. System Environment

• Provide a general description of the technical system. Include the primary  hardware, software, and communications equipment.

11. System Interconnections/Information Sharing

• List interconnected systems and system identifiers (if appropriate), provide the  system, name, organization, system type (major application or general support  system), indicate if there is an ISA/MOU/MOA on file, date of agreement to  interconnect, FIPS 199 category, C&A status, and the name of the authorizing  official.

System

Name

Organization Type Agreement

(ISA/MOU/MOA)

Date FIPS 199

Category

C&A  

Status

Auth.

Official

12. Related Laws/Regulations/Policies

• List any laws or regulations that establish specific requirements for the

confidentiality, integrity, or availability of the data in the system.

13. Minimum Security Controls

Select the appropriate minimum security control baseline (low-, moderate-, high-impact)  from NIST SP 800-53, then provide a thorough description of how all the minimum  security controls in the applicable baseline are being implemented or planned to be  implemented. The description should contain: 1) the security control title; 2) how the  security control is being implemented or planned to be implemented; 3) any scoping  guidance that has been applied and what type of consideration; and 4) indicate if the  security control is a common control and who is responsible for its implementation.

14. Information System Security Plan Completion Date: _____________________

• Enter the completion date of the plan.

15. Information System Security Plan Approval Date: _______________________

• Enter the date the system security plan was approved and indicate if the approval

documentation is attached or on file.  

<u> The following sample has been provided ONLY as one example</u>. Agencies may be using other formats and choose to update those to reflect any existing omissions based on this guidance. This is not a mandatory format; it is recognized that numerous agencies and information security service providers may have developed and implemented various approaches for information system security plan development and presentation to suit their own needs for flexibility.  

<u><em>The answer is</em></u>: <u>True.</u>

You might be interested in
If joe biden decides to jump off a jet
Reil [10]

There are actually <u>over</u> AN infinite possible scenarios..

But I'm assuming just 2-

One that he doesn't have a parachute

And the other that he does

Explanation:

  • Assuming he had no parachute (during the freefall)- he would, in all odds, learn to fly and probably be the first human to do so.
  • Whilst in the other case, he would perhaps land normally (and boringly).
3 0
2 years ago
Read 2 more answers
Rome enslaved 50,000 Carthaginians.<br> What were they I need help so plz answer fast
Ainat [17]
The Carthaginians were inhabitants or the people of Carthage.  Carthage is an ancient city on the North African coast; close to Tunis.  The city was destroyed and then rebuilt by the Romans.  During this time, the Romans enslaved the people of Carthage or the Carthaginians. 
7 0
3 years ago
Read 2 more answers
Jane is just learning to ride a tricycle, while riding on the sidewalk the surface changes from smooth concrete to bumpy brick.
Blababa [14]
I think the answer is a
7 0
3 years ago
Ok yall I need help!
zheka24 [161]

Answer:

salt water or sea water

Explanation:

because NaCl is equal to salt (sodium chloride), and H2O means water- 2hydrogen and oxygen.

and sea water/salt water is a form of solution in salt with water.

hope it helps✨

3 0
3 years ago
What does the red white and blue symbolize in the british flag?
Alex_Xolod [135]
The Union of the individual countries: England, Scotland, Wales and Northern Ireland is known as the United Kingdom

The Union Jack flag is described as a blue field with the red cross of Saint George (St George is the patron saint of England) edged in white

It also consists of the diagonal red cross of Saint Patrick (St Patrick is the patron saint of Ireland)

The flag is then superimposed on the diagonal white cross of Saint Andrew (St Andrew is the patron saint of Scotland)

The correct name for the flag is the the Union Flag, but it is commonly referred to as the Union Jack

The Union Jack Flag, particularly the Blue Ensign is the basis for a number of other flags including many Commonwealth countries and their constituent states or provinces as well as British overseas territories


5 0
3 years ago
Other questions:
  • A royal colony is owned by the King/Queen, while a proprietary colony is owned by ________________.
    7·2 answers
  • A federally sponsored test in the united states is called the national assessment of educational progress.
    5·1 answer
  • Leadership as a concept goes hand in hand with responsibilities. How true is this assertion? Can we have one without the other?
    8·2 answers
  • 11) The Espionage Act (1917) and Sedition Act (1918) were both
    15·2 answers
  • Why might a limited partnership have a greater ability to raise capital than a general partnership?
    9·1 answer
  • Which is NOT a "culture of life" issue?
    9·2 answers
  • A long arm statute allows one state's court to exercise jurisdiction over a defendant from another state who __________meets the
    11·1 answer
  • _________ who migrate have a harder time with the language barrier
    14·1 answer
  • Research+shows+that+the+combination+of+__________+and+__________+can+reduce+the+risk+of+death+in+a+collision+by+up+to+80%.
    8·1 answer
  • According to the definitions of economics we examined, what are economists primarily concerned with?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!