Official (ISC)2 Guide to the CAP CBK 2 Howard Taylor & Francis 9781439820766
Due Date: Mon, 11/21/16 – at 1030PM Central Time
Deliverable Length: 3-4 Pages, Microsoft Word document
Throughout this course, you will be working on several aspects of System Security Certification and Accreditation through the following scenario and you will produce a
case study report. Each week, you will complete a part of the report. The final report is due at the end of the course. Additional information and the deliverables for each Individual Project will be provided in the assignment description for the project. This is the course’s Key Assignment that you will make contributions to each week.
You have just been hired as the security manager of Medical Credentials Company (MCC), reporting to the Chief Information Officer (CIO). MCC is a kind of clearinghouse
for doctors, hospitals, and group practices. It stores and distributes information on its clients, including sensitive information on previous malpractice lawsuits or disciplinary action. MCC is converting from an in-house database to a distributed database, which can be queried by telecommuting employees and clients. This change requires a high level of security. It is your responsibility to provide your engineers with the security requirements and at the same time convince senior management that the system being developed is robust and secure enough to protect the this sensitive information. After careful examination of the database requirements and security requirements, you decide that compliance with the current accreditation/authorization process (NIST 800-37 RMF) would sufficiently protect the database from intrusion and tampering.
After your initial meeting with the CIO, she is close to agreeing that the database system needs to comply with an accreditation/authorization process. She needs to
understand that the Orange Book is the precursor to current methodologies. She understands the general ideas behind the process, but needs you to explain the NIST
800-37 (RMF) process: the different roles and how the process works in six steps.
Your first task in this project is to review the provided scenario and create the shell for the case study. This case study will be used as the basis for each of the
assignments throughout the course. As you proceed through each project phase, you will add content to each section of the final document to gradually complete the final
The post Explain how the Orange Book is the precursor to current accreditation and authorization methodologies. System Security Certification and Accreditation (CS662 -1604B -01) appeared first on My Nursing Paper.