1. Inventory creation sample of physical assets (devices and systems) within the organization (NIST ID.AM-1)?

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
100%

Book title: Cybersecurity Essentials - Charles J. Brooks

Chapter 1 - Infrastructure security in the Real world

From the information provided in the second scenario, consider the NIST functions detailed in this section and then write what to observe as they relate to each category.

1. Inventory creation sample of physical assets (devices and systems) within the organization (NIST ID.AM-1)?

2. Inventory creation sample of cyber assets (software platforms and applications) within the organization (NIST ID.AM-2).

3. Prioritize the organization’s assets based on their criticality or value to the business functions of the organization (NIST ID.BE-3).

4. Identify any assets that produce dependencies or provide critical functions for any of the organization’s critical services (NIST ID.BE-4).
Create a risk assessment of asset vulnerabilities identified (NIST ID.RA-1, 3).

(Refer to screenshot for reference)

Infrastructure Security Scenario 2
Your company is building a new corporate facility, as shown in Figure 1.2, to house its 5,000 headquarters
employees. The facility will feature multiple floors. Some management personnel will use traditional offices with
doors and windows, but the majority of the employees will work in open cubicles.
STAIRS, ELEVATOR
RESTROOMS
(ALL FLOORS)
OFFICES
日期
CUBICLE
AREA
FLOORS 6-7
(SAME LAYOUT)
FLOORS 3-5
(SAME LAYOUT)
IT
DEPARTMENT.
-EMERGENCY
EXIT
SHIPPING
DOORS
SHIPPING
FLOOR 2
SERVER
ROOM
IT
Transcribed Image Text:Infrastructure Security Scenario 2 Your company is building a new corporate facility, as shown in Figure 1.2, to house its 5,000 headquarters employees. The facility will feature multiple floors. Some management personnel will use traditional offices with doors and windows, but the majority of the employees will work in open cubicles. STAIRS, ELEVATOR RESTROOMS (ALL FLOORS) OFFICES 日期 CUBICLE AREA FLOORS 6-7 (SAME LAYOUT) FLOORS 3-5 (SAME LAYOUT) IT DEPARTMENT. -EMERGENCY EXIT SHIPPING DOORS SHIPPING FLOOR 2 SERVER ROOM IT
FLOORS 6-7
(SAME LAYOUT)
FLOORS 3-5
(SAME LAYOUT)
IT
DEPARTMENT
FEMERGENCY
EXIT
SHIPPING
DOORS
* SHIPPING
日期
SERVER
ROOM
FLOOR 2
CONFERENCE
ROOMS
GROUND
FLOOR
MAIN
ENTRANCE
FIGURE 1.2 Headquarters Facility Plans
Each office and cubicle will be equipped with a telephone and network connection. In addition, many of
the employees travel as part of their job roles and require portable computers. Other employees work
with desktop personal computers.
The facility will house a cluster of computer servers and network devices that provide workflow and
communications between all of the managers and employees. This architecture electronically
manipulates, stores, and transmits all of the company's important business information and data. This
includes product descriptions, accounting information, legal records, customer records, employee
records, and the company's intellectual property.
Transcribed Image Text:FLOORS 6-7 (SAME LAYOUT) FLOORS 3-5 (SAME LAYOUT) IT DEPARTMENT FEMERGENCY EXIT SHIPPING DOORS * SHIPPING 日期 SERVER ROOM FLOOR 2 CONFERENCE ROOMS GROUND FLOOR MAIN ENTRANCE FIGURE 1.2 Headquarters Facility Plans Each office and cubicle will be equipped with a telephone and network connection. In addition, many of the employees travel as part of their job roles and require portable computers. Other employees work with desktop personal computers. The facility will house a cluster of computer servers and network devices that provide workflow and communications between all of the managers and employees. This architecture electronically manipulates, stores, and transmits all of the company's important business information and data. This includes product descriptions, accounting information, legal records, customer records, employee records, and the company's intellectual property.
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Types of CRM
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education