Please respond to the initial discussion questions below and provide different r

Responsive Centered Red Button

Need Help with this Question or something similar to this? We got you! Just fill out the order form (follow the link below), and your paper will be assigned to an expert to help you ASAP.

Please respond to the initial discussion questions
below and provide different responses for the two students (Komo and Mark) posts
below. The format should look like the request below. Again, please provide
three different responses. PLEASE MAKE SURE THERE ARE 3 DIFFERENT RESPONSES.
The INITIAL and the 2 STUDENTS. PLEASE DO NOT JUST RESPOND TO THE 2 STUDENT
RESPONSES
Initial post:
Read: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-100.pdf (Links to an external site.)
Discuss among the class, who in an organization should read this document and why. Limit to 250 words.
Komo’s post:
The good thing about most of the NIST documents we’ve seen so far in the class is that while the documents are formatted to inform and advise the federal sector, the information contained therein is useful to so many other private sector organizations. The document itself explains that the standards within should be used as a guideline organizations should consider what is relevant to the “security posture and business needs”. While there are differences between federal and private sector environments, the underlying principles of infosec are the same. Accordingly, this information should be read specifically by the organization’s information security management team which may be comprised of CIOs, agency heads, SAISOs, security managers, and CISOs concerning various aspects of information security that they will be expected to implement and oversee in their respective organizations. It is particularly useful in helping to build an infosec program strategy for any organization, providing a broad overview of information security practices. (Bowen et al, 2006).
Bowen, P., Hash, J., Wilson, M. (2006) Information Security Handbook: A Guide for Managers, National Institute of Standards and Technology, nist.gov, Retrieved from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-100.pdf
Mark’s post:
The document lays out its audience in the introduction as management and above, those who will be creating the infosec program. It provides the reader with a strong base to build a comprehensive information security program using the backbone the U.S government has laid out for businesses. It covers topics ranging from awareness, training, and accreditation to risk management and incident response. Even though the intended audience is those in charge of forming and creating information security programs, anyone involved in information security would benefit from its information. Reading and understanding the covered topics will help those interested in information security better protect themselves and their assets.

How to create Testimonial Carousel using Bootstrap5

Clients' Reviews about Our Services