1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol [13]
3 years ago
15

NIST Special Publication 800-18 Rev. 1, The Guide for Developing Security Plans for Federal Information Systems, includes templa

tes for major application security plans, and provides detailed methods for assessing, designing, and implementing controls and plans for applications of varying size.
Social Studies
1 answer:
Arlecino [84]3 years ago
4 0

Answer:

<u><em>The answer is</em></u>: <u>True.</u>

Explanation:

<u>Information System Security Plan Template </u>

<u>Guide for Developing Security Plans for Federal Information Systems </u>

1. Information System Name/Title:

• Unique identifier and name given to the system.

2. Information System Categorization:

• Identify the appropriate FIPS 199 categorization.

LOW MODERATE HIGH

3. Information System Owner:

• Name, title, agency, address, email address, and phone number of person who

owns the system.

4. Authorizing Official:

• Name, title, agency, address, email address, and phone number of the senior

management official designated as the authorizing official.

5. Other Designated Contacts:

• List other key personnel, if applicable; include their title, address, email address,

and phone number.

6. Assignment of Security Responsibility:

• Name, title, address, email address, and phone number of person who is

responsible for the security of the system.

7. Information System Operational Status:  

• Indicate the operational status of the system. If more than one status is selected,

list which part of the system is covered under each status.

Operational Under

Development

Major

Modification

8. Information System Type:

• Indicate if the system is a major application or a general support system. If the

system contains minor applications, list them in Section 9. General System

Description/Purpose.

Major

Application

General Support  

System

9. General System Description/Purpose

• Describe the function or purpose of the system and the information processes.

10. System Environment

• Provide a general description of the technical system. Include the primary  hardware, software, and communications equipment.

11. System Interconnections/Information Sharing

• List interconnected systems and system identifiers (if appropriate), provide the  system, name, organization, system type (major application or general support  system), indicate if there is an ISA/MOU/MOA on file, date of agreement to  interconnect, FIPS 199 category, C&A status, and the name of the authorizing  official.

System

Name

Organization Type Agreement

(ISA/MOU/MOA)

Date FIPS 199

Category

C&A  

Status

Auth.

Official

12. Related Laws/Regulations/Policies

• List any laws or regulations that establish specific requirements for the

confidentiality, integrity, or availability of the data in the system.

13. Minimum Security Controls

Select the appropriate minimum security control baseline (low-, moderate-, high-impact)  from NIST SP 800-53, then provide a thorough description of how all the minimum  security controls in the applicable baseline are being implemented or planned to be  implemented. The description should contain: 1) the security control title; 2) how the  security control is being implemented or planned to be implemented; 3) any scoping  guidance that has been applied and what type of consideration; and 4) indicate if the  security control is a common control and who is responsible for its implementation.

14. Information System Security Plan Completion Date: _____________________

• Enter the completion date of the plan.

15. Information System Security Plan Approval Date: _______________________

• Enter the date the system security plan was approved and indicate if the approval

documentation is attached or on file.  

<u> The following sample has been provided ONLY as one example</u>. Agencies may be using other formats and choose to update those to reflect any existing omissions based on this guidance. This is not a mandatory format; it is recognized that numerous agencies and information security service providers may have developed and implemented various approaches for information system security plan development and presentation to suit their own needs for flexibility.  

<u><em>The answer is</em></u>: <u>True.</u>

You might be interested in
(08.05 mc) question refers to the excerpt below. "the right of one charged with crime to counsel may not be deemed fundamental a
maria [59]
The correct answer is the Sixth amendment.

The Sixth amendment of the Bill of Rights outlines that citizens have the right to an attorney if one cannot be afforded. Along with this, the sixth amendment also allows for the right to a fair and speedy trial and the right to a jury. All of these aspects make up an important part of our justice system.

In this excerpt, this Supreme Court justice is further solidifying this fact, as judge discusses how the court system puts "<span>great emphasis on procedural and substantive safeguards designed to assure fair trials before impartial tribunals."</span>
6 0
3 years ago
3. Gender differences in dream content are well documented. Suppose a researcher studies aggression content in dreams of men and
Debora [2.8K]

Answer:

Despite the fact that, gender differences in a dream content is well documented,<em> there is no relationship between agression content of dream and gender of the dreamer.</em>

Explanation:

In every dream, the content of the dream is based on so many factors. One of them is the gender of the dreamer. Most times, the males tend to have dreams than the female eventhough the content of the dream varies from one individual to another individual.

The agression content of the dreams is not depandent on the gender of the dreamer. Some females would have dream with high aggression content when compared with males and vis versa.

3 0
3 years ago
How was judicial review used in Dred scott
Ratling [72]
In the second time ever, the Court used<span> its power of </span>judicial review<span> to rule an act of Congress (the Missouri Compromise) unconstitutional. ... Northerners charged that after Chief Justice Taney had shown that </span>Scott<span>, as a Negro, had no right to bring a case into a federal court, he should have ended his decision.</span>
5 0
3 years ago
Read 2 more answers
To take effective it is most important to
NISA [10]

Answer:

To take effective notes, it is most important to write down everything the teacher says. summarize what the teacher says. avoid using abbreviations and symbols. avoid using headings and formatting. See answer

Explanation:

HOPE YOU LEARNED FROM THIS

:3

5 0
2 years ago
Who favored Direct Democracy and thought that even a republic was corrupt?​
Gre4nikov [31]
Federalist no. 10 is an essay that James Madison as the 10th as the Federalist Papers, a series of essays initiated by Alexander Hamilton
4 0
3 years ago
Other questions:
  • Who was tituba and what happened in the winter of 1692 that started the witch hysteria
    15·1 answer
  • What role does the house pf representative have in the impeachment process
    10·2 answers
  • In the context of depth perception, which of the following is a monocular cue?
    8·1 answer
  • A sociologist and an environmental scientist are both interested in global climate change. The sociologist prioritizes human cho
    12·2 answers
  • Will the right to child help in development of the children<br>​
    12·2 answers
  • what is the theme of this story? One day, two brothers, Julio and Dante, were playing on the beach behind their house. Dante was
    9·2 answers
  • Damon is late to class. His professor, Dr. Goldberg, believes the tardiness happened because of the traffic jam. Dr. Goldberg is
    5·1 answer
  • To ensure customers' security, various financial companies offer certain protections for consumers. For example, some offer prot
    5·1 answer
  • What crop allowed the Jamestown colony to thrive? a,b,or c
    13·2 answers
  • According to philosopher George Brenkert, whether one's privacy is violated or not by a disclosure of personal information depen
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!