Nist document is located here:  https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/fin

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

Nist document is located here: 
https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/fin

Nist document is located here: 
https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final
In this activity, you will demonstrate how different types of
information security controls can be used to achieve the basic security
objectives of confidentiality, integrity, and availability (CIA triad).
Prompt
Complete the steps listed below.
View page 8 of the NIST document linked in the Module One Reading
and Resources section of your course. You should specifically refer to
the table labeled “Table 1: Security and Privacy Controls Families.”
Create a simple table that identifies at least 3 of the controls listed in Table 1 in the document. 
In your table, ensure that you: 
Identify one control that addresses each tenet of the CIA triad. 
Justify your control choice. 
Provide citations for sources you used for support. You must research at least one source per tenet. 
Use the table below as a model for how your finished table should look. Do not reuse the examples below in your submission.
Control Category Justification Source
In this column, include at least 3 of the controls from Table 1 in the document. In this column, identify which CIA triad category the control falls into (confidentiality, integrity, or availability). In this column, justify your categorization using resources that support your categorization. In this column, identify the resource you used for support. (Use either an APA-style reference or a direct link to the source.)
Example: CA – Assessment, Authorization, and Monitoring Example: Confidentiality Example: If the system is not protected from unauthorized users, the data contained within the system can be exposed. Example: Adams, J., & Almahmoud, H. (2023). The Meaning of Privacy in the Digital Era. International Journal of Security and Privacy in Pervasive Computing (IJSPPC), 15(1), 1–15. http://doi.org/10.4018/IJSPPC.318675
Note: In order for you to receive credit for this assignment, your finished table must contain at least 3 of the controls from Table 1.
What to Submit
Submit your table in a Word document with 12-point Times New Roman font and one-inch margins.
Module One Activity Rubric
Criteria Requirement Met (100%) Requirement Not Met (0%) Value
Topics Includes at least 3 of the controls from Table 1 in the document Does not include at least 3 of the controls from Table 1 in the document 25
Categories Identifies which CIA triad category the control falls into for at least 3 of the controls Does not identify which CIA triad category the control falls into for at least 3 of the controls 25
Justification Justifies
categorization using information from the document and any other
resources that support categorization for at least 3 of the controls Does
not justify categorization using information from the document and any
other resources that support categorization for at least 3 of the
controls 25
Source Identifies the resource used for at least 3 of the controls Does not identify the resource used for at least 3 of the controls 25
Total: 100%

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now