Question

A key tenet of the NIST SP 800-53r5 (Security and Privacy Controls for Information Systems and...

A key tenet of the NIST SP 800-53r5 (Security and Privacy Controls for Information Systems and Organizations) specification is that security and privacy requirements are a subset of all requirements that can be imposed on an information system and/or an organization. In other words, when we develop systems/applications for example, we must consider security and privacy requirements as part of overall system requirements

A. True

B. False

0 0
Add a comment Improve this question Transcribed image text
Answer #1


False

Add a comment
Know the answer?
Add Answer to:
A key tenet of the NIST SP 800-53r5 (Security and Privacy Controls for Information Systems and...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • How the Recommended Security Controls for Federal Information Systems and Organizations presented in NIST Special Publication...

    How the Recommended Security Controls for Federal Information Systems and Organizations presented in NIST Special Publication 800-53 may also apply in the private sector?

  • Guidelines established in NIST SP 800-53 r5 do not permit the use of external service providers...

    Guidelines established in NIST SP 800-53 r5 do not permit the use of external service providers for developing software applications due to the potential for increased risk. Thus, NIST recommends all applications to be fully developed in-house (within organizations). Are these statements true or false? A. True B. False

  • When performing a gap analysis, one must have an understanding of the desired future or "to be" state. For cybersecurity focused gap analyses, we frequently use IT security controls as the mea...

    When performing a gap analysis, one must have an understanding of the desired future or "to be" state. For cybersecurity focused gap analyses, we frequently use IT security controls as the means by which we describe the "to be" (or "should be") state of IT systems and Information Security Management Programs. There are a variety of guidance documents which list and define sets of security controls. Each of these documents or sets of controls has an underlying framework. One of...

  • True or False 16. Access to information, information processing facilities, and business processes should be controlled...

    True or False 16. Access to information, information processing facilities, and business processes should be controlled on the basis of employee’s requirements. 17. Access control rules should take account of policies for information dissemination and authorization. 18. NIST Special Publication 800-53 Recommended Security Controls for Commercial Information Systems. 19. The primary characteristic of the SABSA model is that everything must be derived from an analysis of the user’s requirements for security. 20. COBIT includes best practices, measures, and processes organizations...

  • #1) Select the best choice. For security controls, gap analysis involves comparing the present state of...

    #1) Select the best choice. For security controls, gap analysis involves comparing the present state of controls with a desired state of controls. At a minimum, common baseline security controls should be in place. Any gaps to various types of controls should be clearly documented, for example - "Information security responsibilities", which: a. Defines the program to provide initial and ongoing security education across the organization. b. Reduces risk from known vulnerabilities being exploited. c. Defines how staff will execute...

  • Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control...

    Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control assessor Information System Owner (ISO) Information Owner/Steward When making determinations regarding the adequacy of common controls for their respective systems, Information System Owner (ISO) refer to the Common Control Providers’ (CCP) Privacy Impact Assessment (PIA) Business Impact Analysis (BIA) Authorization Packages Vulnerability Scans An organization-wide approach to identifying common controls early in the Risk Management Framework (RMF) process does which of the following? Considers...

  • If an organization is going to have a chance at a successful security program they need...

    If an organization is going to have a chance at a successful security program they need to develop policies that provide direction for all security efforts and guide the conduct of the users. These policies need to be well written to provide the organization with solid guidance to support their security objectives. Identify and briefly describe the three types of security policies. Your response should include a discussion of where each should be used. Where should policy writers look to...

  • 1.The use of computerized clinical applications in health care can include: a. Automated Dispensing Systems b....

    1.The use of computerized clinical applications in health care can include: a. Automated Dispensing Systems b. Patient tracking Systems c. Bed Tracking Systems d. Drug Interaction Programs e. Medical Device Tracking Systems f. All of the above 2. To encourage the implementation of EHRs among physician who participate in the Medicare program, CMS announced in 2005 that it would offer physicians free of charge an EHR software program. a. True b. False 3. The following are all types of information...

  • TRUE OR FALSE QUESTIONS 1) In IS departments, the technology office investigates new information systems technologies...

    TRUE OR FALSE QUESTIONS 1) In IS departments, the technology office investigates new information systems technologies and determines how the organization can benefit from them. 2) The chief technology officer evaluates new technologies and identifies those that are most relevant to the organization. 3) In an IS department, the development group manages the computing infrastructure, including individual computers, networks, and communications media. 4) If an organization does not develop programs in-house, then the development group of the IS department will...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT