Campbellsville University International Organization for Standardization Discussion Response
Campbellsville University International Organization for Standardization Discussion Response
User Generated
Get Your Custom Essay Written From Scratch
We have worked on a similar problem. If you need help click order now button and submit your assignment instructions.


Just from $13/Page
Znqqlcnjne
Writing
Campbellsville University
Description
Explain in 500 words or more what NIST Is and how it should be used by a dba.
UNFORMATTED ATTACHMENT PREVIEW
Vinod replies 13 hours ago Fnu Bharani Abhishek Week 13 Discussion COLLAPSE ISO Standards: International Organization for Standardization (ISO) offers an array of standards for various fields, right from business strategies to societal activities. Information Security Management System (ISMS) module of the ISO offers the standards related to secure practices for the information and communication technology systems. ISMS emphasize standards gives equal preferences for the technology and people. Organizations for obtaining the ISO certification will have to form an internal information security forum, and involve the technical experts for guidance related to the certification process. ISO standards enable the organizations in defining the scope of the information security, create security objectives, develop a risk treatment plan, apply the best possible security methods and enforce the security procedures and policies. Security standards provided by ISO are usually mentioned as ISO/IEC/ followed by the standardization number. There is multitude of standards defined by the ISO for addressing the security requirements of the organizations. ISO/IEC/9796: 2010 is an example of the security standard which covers the security techniques. Precisely this standard focuses on the digital signature schemes offering message recovery. This standard also covers integer factorization based methods. There are several standards defined with respect to each activity in the information security. Some of the observed areas where ISO has provided guidelines for standards are message authentication codes and mechanisms utilizing the block ciphers (ISO/IEC/9797-1:2011), mechanisms for authenticated encryption (ISO/IEC/9798-2:2019) and others. In fact it has to be noted that there are precisely defined standards for every single activity performed in the encryption activities. This indicates that ISO offers in-depth security standards for the organizations for performing information security practices in a standardized manner. There are security standards for evaluating the IT security criteria, digital signatures, security assurance framework, time stamping services, encryption algorithms, biometric information protection and others (ISO, 2020) NIST Framework : National Institute of Standards and Technology (NIST) has established the framework for addressing the information security practices. This was called as the Framework for Protecting Critical Infrastructure Cyber security and later it was changed to NIST Cybersecurity Framework (Calder, 2018). NIST has created this framework for offering a common platform for the organizations to communicate and follow standards for business activities and trade programs. NIST CSF has three main components which are implementation tiers, framework profiles, and core. These components of the NIST CSF standards focus on identification of cybersecrity threats, safeguarding the information systems, responding to the threats detected, recovering from breaches and resilient mechanisms (Epic, 2018). Comparison : Comparing the NIST CSF with ISO/IEC without any second thought it can be said that ISO is more comprehensive standards for information security. ISO has addressed every possible activity of in the realm of information technology. There are security standards created right from the physical security to trivial activities in the encryption practices. NIST CSF has provided measures for information security but its scope is limited in several areas. For example it responding to detected threats is one of the areas stressed by the NIST. The NIST standards which cover every single step in this defensive measure isn’t detailed like it has been done in the ISO/IEC standards. References : Epic (2018) The NIST Cyber Security Framework. Retrieved https://www.ecpi.edu/blog/topprinciples-nist-cybersecurity-framework Calder, A. (2018) NIST cybersecurity framework: a pocket guide. USA: Elsevier ISO (2020) Standards by ISO/IEC JTC 1/SC 27. Retrieved https://www.iso.org/committee/45306/x/catalogue/p/1/u/0/w/0/d/0 7 days ago Ramakrishna Mallela week13! COLLAPSE National Institute of Standards and Technology The National Institute of Standards and Technology, established in 1901, is liable for setting up innovation, norms, and measurements to be applied to the science and innovation ventures. As one of the most seasoned science labs in the United States and a piece of the U.S. Division of Commerce, NIST majorly affects organizations in both people in general and private parts. NIST is the body that offers rules on innovation related issues, similar to how to satisfactorily ensure information. They offer norms on what safety efforts ought to be set up to ensure information is protected. By having NIST-illustrated norms, there is a degree of consistency with regards to cybersecurity. Since NIST plots gauges to put forth cybersecurity attempts uniform, organizations that work with the U.S. government or organizations inside the legislature should give close consideration to these rules. For what reason are these rules significant for these specific associations? Government organizations and their temporary workers manage profoundly touchy information that can without much of a stretch be focused by programmers. The adoption of cloud computing into the US Government (USG) and its implementation depend upon a variety of technical and non-technical factors (Liu et al. 2011). One objective of NIST’s cybersecurity proposals is to assist organizations with lining up with the Federal Information Security Management Act (FISMA). NIST offers various assets to assist organizations with conforming to cybersecurity suggestions, while as yet overseeing costs. NIST’s data innovation rules permit organizations to meet government desires and effectively secure their information. In spite of the fact that most organizations ought to be worried about cybersecurity, NIST consistence is especially significant for organizations that lead business with the U.S. government. This could mean government organizations or outside contractual workers who give the administration merchandise or administrations. Truth be told, even subcontractors, organizations working with contractual workers who work with the administration, might be required to fulfill NIST guidelines. NIST consistence may even be a necessity remembered for your agreement. Cloud computing is an evolving paradigm. The NIST definition characterizes important aspects of cloud computing and is intended to serve as a means for broad comparisons of cloud services and deployment strategies, and to provide a baseline for discussion from what is cloud computing to how to best use cloud computing (Mell. Et al 2011). The National Institute of Standards and Technology (NIST) is a physical sciences research facility and a non-administrative organization of the United States Department of Commerce. It’s crucial to advance the development and modern seriousness. NIST’s exercises are composed of lab programs that incorporate nanoscale science and innovation, building, data innovation, neutron inquire about, material estimation, and physical estimation. From 1901-1988, the office was named the National Bureau of Standards. Estimations and gauges are a major aspect of its crucial, supplies industry, the scholarly world, government, and different clients with more than 1,300 Standard Reference Materials (SRMs). These relics are guaranteed as having explicit attributes or segment content, utilized as alignment guidelines for estimating hardware and methodology, quality control benchmarks for mechanical procedures, and trial control tests. NIST has begun the difficult but fundamental work of bridging communication gaps that hinder privacy operationalization (Honeycutt, D. M. 2014). NIST is creating government-wide personality record guidelines for bureaucratic workers and contractual workers to keep unapproved people from accessing government structures and PC frameworks. The National Institute of Standards and Technology (NIST) utilizes its earnest attempts to convey an excellent duplicate of the Database and to confirm that the information contained in that have been chosen based on sound logical judgment. In any case, NIST makes no guarantees with that impact, and NIST will not be obligated for any harm that may result from mistakes or oversights in the Database. Client assistance for NIST Standard Reference Data items. It is very helpful in protecting data from the unwanted sources. It helps in protecting the intervention. It standardized the data in the prominent way. It helps in protecting your unique data. References: [1] Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L., & Leaf, D. (2011). NIST cloud computing reference architecture. NIST special publication, 500(2011), 292. [2] Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. [3] Honeycutt, D. M. (2014). Re: Public Comments, NIST Privacy Engineering Workshop.
Purchase answer to see full attachment
Purchase answer to see full attachment
Explanation & Answer:
500 words
Needs help with similar assignment?
We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

