Week 6 Readings and Media
Please review the following for this week:
Vic (J.R.) Winkler, Securing the Cloud, Cloud Computer Security Techniques and Tactics, 2011, Chapter 6.
NIST Special Publication 800-53 Revision 3, Recommended Security Controls for Federal Information Systems and Organizations; 2009.
NIST Federal Information Processing Standards Publication 199 (Links to an external site.) (FIPS Pub-199), Published February 2004. Available at: http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf [accessed 22.03.11].
Media
Cloud Computing Security Overview – Cloud Security Advanced Event
https://www.youtube.com/watch?v=xulMoVYGKZI&fireglass_rsn=true#fireglass_params&tabid=aa5b50ce690510ab&application_server_address=l3harris-e9.prod.fire.glass&popup=true&is_right_side_popup=false&start_with_session_counter=1
—————————————————————————————-
Week 6 Discussion (1 page)
Write one page using this weeks reading and media. APA Format and provide two references at a minimum.
Even though security controls are applied with the best intentions, they, at times, are not as fully effective as intended. In your opinion, why is this often the case?
—————————————————————————————-
Week 6 Assignment (3 pages)
Write three pages using this weeks reading and media. APA Format and provide two references at a minimum.
Answer each of the following questions about Week 6:
Write one page (for each answer) in a separate document that you can upload (e.g., Microsoft Word file). Precede each answer with the question and its corresponding number.
1.Describe in your own words. What is the Committee on National Security Systems (CNSS) Instruction No. 1253, Security Categorization and Control Selection for National Security Systems? To what does it apply? How is it related to NIST SP 800-53? (1 page)
2.Please discuss the four stages of Risk Management in your own words. (1 page)
3. Please list and briefly describe some of the Cloud Computing Use Case Discussion Group best practices for building clouds or IaaS and PaaS. (1 page)