Sign In
Not register? Register Now!
Pages:
6 pages/≈1650 words
Sources:
14 Sources
Style:
Chicago
Subject:
Technology
Type:
Annotated Bibliography
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 36.45
Topic:

Sources and Annotated Bibliography on Security Systems and Risk Management Framework

Annotated Bibliography Instructions:

Assignment is attached called: Sources and Annotated Bibliography.
This is needed for my Research Proposal which is also attached for guidance: Research Proposal- Work in Progress.
I have attached all sources for you to review minus websites, which you can obtain from the Sources and Annotated Bibliography document.
I will need all sources to be in alphabetical order and in the correct Chicago style format.
I have attached an example for another Research Proposal which has an annotated bibliography section that need to be mirrored to mine: Onderko_Proposal - 2013

Annotated Bibliography Sample Content Preview:

SOURCES AND ANNOTATED BIBLIOGRAPHY
Student’s Name
Course
Date
Sources
The most significant information will be security systems and their functionality. These sources outline the historical development of DITSCAP in a step-by-step process. They offer ideas that make it easier to understand the existing situation and the circumstances that cause change. The material also elaborate on the principles and procedures for establishing security applicable to Corporate America.
Other types of sources will include studies on risk management framework. This protocols are vital in deriving strategies essential in enhancing cybersecurity. Sources under this topic give knowledge on the adoption and utilization of the modified form by the federal governments and commercial enterprises. The materials aid in evaluating ways essential in examining the weaknesses and recommend strategic solutions.
Annotated Bibliography
Air Force Instruction 17-101. /static.e-publishing.af.mil/production/1/saf_cn/publication/afi17-101/afi17-101.pdf
The source provides an extensive instruction layout on risk management. The memorandum focuses on air force technology and offers an interim change to regulations. The guidance uses chapter one of Program Overview to introduce and document policies familiar with the Special Access Program. Under chapter three of RMF Roles and Responsibilities, this source offers modifications to the roles of the Authorization Official and the grade requirements. The framework drawn by the memo seeks to ensure roles and responsibilities within the Air force are effective and reflect real-world scenarios.
Chapter four describes the Risk Management Framework in seven iterative steps throughout the lifespan. The source further analyses the Approval to Connect process, outlining the various risks involved when setting up the system. The publication also discusses the security control overlays in all dimensions, including the policy and development process. Ultimately, the articles discuss the transfer of IT systems among the stakeholders in a manner that ensures accountability and safety.
Commons, Dan "DITSCAP - DoD's Answer to Secure Systems," SANS Inst., no. GSEC Practical Assignment Version 1.2e, 2002.
DITSCAP. The source provides a clear insight into bureaucratic government processes. The writing refrains from offering details on the technology protocols with the Department of Defence. However, the material shifts the audience's focus to military operations that many consider complex, bureaucratic, and rigid. The author offers an extensive outlook to secure systems with the intent of helping federal contractors and employees practice a structured and standard approach during system implementation.
Snyder, Don, James D. Powers, Elizabeth Bodine-Baron, Bernard Fox, Lauren Kendrick, and Michael H. Powell. "Improving the cybersecurity of us air force military systems throughout their life cycles." (2015).
The authors discuss ways of enhancing the cybersecurity of Military systems. The topic comes as concerns continue to grow over the latter's vulnerability to innovations. Scholars argue that the susceptibility to offensive attacks and intelligence exploitation increases significantly in the wake of g...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These Chicago Annotated Bibliography Samples:

    HIRE A WRITER FROM $11.95 / PAGE
    ORDER WITH 15% DISCOUNT!