1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol [13]
3 years ago
15

NIST Special Publication 800-18 Rev. 1, The Guide for Developing Security Plans for Federal Information Systems, includes templa

tes for major application security plans, and provides detailed methods for assessing, designing, and implementing controls and plans for applications of varying size.
Social Studies
1 answer:
Arlecino [84]3 years ago
4 0

Answer:

<u><em>The answer is</em></u>: <u>True.</u>

Explanation:

<u>Information System Security Plan Template </u>

<u>Guide for Developing Security Plans for Federal Information Systems </u>

1. Information System Name/Title:

• Unique identifier and name given to the system.

2. Information System Categorization:

• Identify the appropriate FIPS 199 categorization.

LOW MODERATE HIGH

3. Information System Owner:

• Name, title, agency, address, email address, and phone number of person who

owns the system.

4. Authorizing Official:

• Name, title, agency, address, email address, and phone number of the senior

management official designated as the authorizing official.

5. Other Designated Contacts:

• List other key personnel, if applicable; include their title, address, email address,

and phone number.

6. Assignment of Security Responsibility:

• Name, title, address, email address, and phone number of person who is

responsible for the security of the system.

7. Information System Operational Status:  

• Indicate the operational status of the system. If more than one status is selected,

list which part of the system is covered under each status.

Operational Under

Development

Major

Modification

8. Information System Type:

• Indicate if the system is a major application or a general support system. If the

system contains minor applications, list them in Section 9. General System

Description/Purpose.

Major

Application

General Support  

System

9. General System Description/Purpose

• Describe the function or purpose of the system and the information processes.

10. System Environment

• Provide a general description of the technical system. Include the primary  hardware, software, and communications equipment.

11. System Interconnections/Information Sharing

• List interconnected systems and system identifiers (if appropriate), provide the  system, name, organization, system type (major application or general support  system), indicate if there is an ISA/MOU/MOA on file, date of agreement to  interconnect, FIPS 199 category, C&A status, and the name of the authorizing  official.

System

Name

Organization Type Agreement

(ISA/MOU/MOA)

Date FIPS 199

Category

C&A  

Status

Auth.

Official

12. Related Laws/Regulations/Policies

• List any laws or regulations that establish specific requirements for the

confidentiality, integrity, or availability of the data in the system.

13. Minimum Security Controls

Select the appropriate minimum security control baseline (low-, moderate-, high-impact)  from NIST SP 800-53, then provide a thorough description of how all the minimum  security controls in the applicable baseline are being implemented or planned to be  implemented. The description should contain: 1) the security control title; 2) how the  security control is being implemented or planned to be implemented; 3) any scoping  guidance that has been applied and what type of consideration; and 4) indicate if the  security control is a common control and who is responsible for its implementation.

14. Information System Security Plan Completion Date: _____________________

• Enter the completion date of the plan.

15. Information System Security Plan Approval Date: _______________________

• Enter the date the system security plan was approved and indicate if the approval

documentation is attached or on file.  

<u> The following sample has been provided ONLY as one example</u>. Agencies may be using other formats and choose to update those to reflect any existing omissions based on this guidance. This is not a mandatory format; it is recognized that numerous agencies and information security service providers may have developed and implemented various approaches for information system security plan development and presentation to suit their own needs for flexibility.  

<u><em>The answer is</em></u>: <u>True.</u>

You might be interested in
Which scenario would most likely result in the president using an executive order to enact a new policy?
oksano4ka [1.4K]

C.The president proposes several new bills that are all rejected by Congress.

When the president uses an executive order to enact a new policy it undermines the power of the Congress, which will result in the congress rejecting the next steps that the president woul try to do.

5 0
3 years ago
Read 2 more answers
Manorialism is an agreement between two nobles, concerning land and services.
Slav-nsk [51]
The answer is true here is the definition of manorialism                                                                                                                                                                        the medieval system by which land was rented to tenants by the lord of a manor, who also exercised legal authority and presided over a court for the area.<span> </span>



6 0
3 years ago
Question 9 (1 point) ✓ Saved
eduard

The correct answer is B) The church of Scientology.

The group, often categorized as an NRM or cult, has received a lot of criticism from celebrities and former members speaking out about the practices that alienate members from family and friends who disagree with the teachings, is the church of Scientology.

Let's clarify first that NRM means "new religious movement." It is a name given to new spiritual or alternative teachings, sometimes in metaphysics are, that are growing in different parts of the world.

The church of Scientology has created so much controversy due to the things or worship that recently has made the news. It is covered in mass media due to the fact that some of its members are popular Hollywood artists that often are on the front pages of magazines, newspapers, on TV, and today, in social media.

We are talking about people like Tom Cruise, John Travolta, Kathie Holmes, and many others. Some of them had left that church that many people call a cult.

8 0
2 years ago
1. Which English king was beheaded by Puritan forces in 1649
laila [671]

Answer:

Charles

Explanation:

Charles was tried, convicted, and executed for high treason in January 1649. The monarchy was abolished and the Commonwealth of England was established as a republic. The monarchy would be restored to Charles's son, Charles II, in 1660.

8 0
3 years ago
Read 2 more answers
Explain why homeostasis is important for survival? Be detailed in providing your answer to this question.
stepladder [879]

Answer:

Homeostasis is important because it's an organisms known environment. Even if you were to alter the environment by a little, it would effect the organism greatly. For example, if a rainforest's temperature changed to be similar to that of a desert's, then the inhabitants of the rainforest would die due to them being unaware of how to survive and blend in the desert-like temperature. In short, changing an environment can eliminate a lot of known survival skills for organisms, such as camouflage.

Explanation:

4 0
3 years ago
Other questions:
  • A representative democracy is when the citizens do not directly govern themselves. In a representative democracy the people will
    13·1 answer
  • Why are all participants in an economy interdependent?
    11·1 answer
  • George's brother is a star athlete on their high school's basketball team. george enjoys basketball as well but can't match the
    12·1 answer
  • The theoretical perspective most concerned with the way that powerful people define illness is: a. symbolic interactionist b. co
    8·1 answer
  • In 1830, President Jackson begins what ‘program’ that lasts for over 100 years in America?
    8·2 answers
  • What role did the policy of containment play in the involvement of the us in korea and vietnam?
    5·1 answer
  • Why did the government want the Indians to leave
    8·1 answer
  • What factors influence a legislator’s vote?
    8·1 answer
  • What are the goals determined by the General Assembly of the UN regarding property alleviation?​
    8·1 answer
  • Historians have recently discovered a historical journal published In the early twentleth century. The journal contalns facts ba
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!