Describe the RMF and how it relates to the CIA concepts and expands on them.


Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1490

Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1495

Describe the RMF and how it relates to the CIA concepts and expands on them.


Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1490

Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1495

Explain how this framework is used to address the need to protect information in the company. Section 2: Create a table in your Microsoft® Word document listing a minimum of five threats to the company using the column headers Threat to Data-at-Rest, Confidentiality/Integrity/Availability, and Suggestion on Countering the Threat. In the Threat to Data-at-Rest column, list the threat. In the Confidentiality/Integrity/Availability column, identify whether each of the following are affected: Confidentiality Integrity Availability Some or all of the three (Confidentiality, Integrity, and/or Availability) In the Suggestions on Countering the Threat column, enter suggestions on how to counter each threat listed. Section 3: Add a 1- to 2-page recommendation outlining methods the company should consider to protect access to data, including recommendations for policies to be enacted that will increase data security.