• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2023 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

FIPS 200 Minimum Security Requirements for Federal Information and Information Systems pp 1 through 9

January 1, 2022 by Jose Gomez 2 Comments

Filed Under: 1b - Planning and Policy Tagged With:

Reader Interactions

Comments

  1. Chenhao Zhang says

    March 1, 2024 at 10:24 am

    FIPS 200 sets the following key security requirements for federal agencies:
    Minimum security requirements for audit data, security controls, risk management, security assessment and authorization, supply chain security, training and awareness raising.
    To meet these requirements, federal agencies typically employ security controls recommended in NIST special publication 800-53, Recommendations for Federal Information Systems Security Controls. These controls provide a framework for organizations to meet the minimum security requirements defined in FIPS 200.
    In summary, FIPS 200 sets a comprehensive set of minimum security requirements for federal information and information systems, designed to ensure that these systems effectively protect information assets and defend against a variety of security threats.

    Log in to Reply
  2. Yi Liu says

    March 4, 2024 at 11:38 am

    Minimum Security Requirements for Federal Information and Information Systems is the foundation for securing federal information systems, excluding those related to national security. The document establishes 17 security-related areas, such as access control, incident response, and risk assessment, to ensure the confidentiality, integrity, and availability of federal systems. It mandates federal agencies to comply with these minimum security requirements through the implementation of security controls in accordance with NIST SP 800-53, tailored to the system’s risk level.
    1. Access Control: Access control mechanisms are designed to restrict and regulate who can view or use resources in a computing environment.
    2. Incident Response: Incident response refers to an organization’s process for managing and responding to security breaches, cyber threats, or other emergency situations. It typically involves preparation, detection and analysis, containment, eradication, and recovery, with the aim of minimizing damage and recovering from the incident as quickly as possible.
    3. Risk Assessment: Risk assessment is a core component of risk management, which involves identifying, evaluating, and prioritizing risks to organizational operations (including mission, functions, image, reputation), organizational assets, individuals, other organizations, and the Nation, resulting from the operation and use of information systems.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in