negotiating an alternative mitigation while reserving the right to override the

Negotiating an alternative mitigation while reserving

This preview shows page 38 - 46 out of 60 pages.

Image of page 38
Image of page 39
References 1. Bradley, T. (October 17, 2016). Critical Vulnerability in Apple Mac OS . Retrieved from -
Image of page 40
mac-os-x-2487643 2. National Institute of Standards and Technology (NIST). (2010). Guide for applying the risk management framework to federal information systems. NIST Special Publication 800-37 Revision 1. Retrieved from - rev1/sp800-37-rev1-final.pdf 3. National Institute of Standards and Technology (NIST). (2012). Guide for Conducting Risk Assessments. NIST Special Publication 800-30 Revision 1. Retrieved
Image of page 41
from tion800-30r1.pdf 4. National Institute of Standards and Technology (NIST). (2014). Assessing security and privacy controls in federal information systems and organizations . NIST Special Publication 800-53A Revision 4. Retrieved from SpecialPublications/NIST.SP.800-53Ar4.pdf 5. National Institute of Standards and Technology (NIST). (2006). Electronic Authentication
Image of page 42
Guideline. NIST Special Publication 800-63 Revision 1.0.2. Retrieved from tion800-63ver1.0.2.pdf 6. Rouse, M. (2017). Definition: buffer overflow . Retrieved from . techtarget.com/definition/buffer-overflow rar_graded.docx
Image of page 43
Running head: Risk Assessment Repot (RAR) 1 Risk Assessment Report (RAR) 8 Risk Assessment Report (RAR) CYB 610: Cyberspace and Cybersecurity Foundations Me University of Maryland University College
Image of page 44
Image of page 45
Image of page 46

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture