Certification and Accreditation System Security Plan.

Scenario:
To create the SSP for this project, you will be using your home computer system, as if it were used for a home-based business, whereby it may contain customer data and business applications critical to your operations. Although this is a home computer system, it is not completely shielded from many risks that can impact a large corporate business. Interruptions or breaches would place your business in jeopardy. For the purposes of this project, categorize this system as a Federal System in the “HIGH” risk category as defined in FIPS 199 and FIPS 200.

Project Deliverable 1:SSP Expanded Outline and Potential Vulnerabilities Report

SSP Expanded Outline
Using the SSP template (also found in Doc Sharing), complete the expanded outline by inserting a brief statement below each of the 15 sections which:

identifies the applicability of the section to your home system
describes the importance and purpose of the data provided in the section.
Potential Vulnerabilities Report
Utilizing your experience, classroom resources, outside references and industry tools, analyze and generate a comprehensive overview identifying the specific potential vulnerabilities of the system.

Sample Solution

ACED ESSAYS