Nolls is an online retailer that specializes in connecting local artisans directly to consumers. You work for a public accounting firm as an IT audit consultant and have been staffed on the Nolls cybersecurity engagement. Nolls hired your firm to help implement the NIST Cybersecurity Framework. Your team is performing a gap analysis to identify areas where Nolls lacks internal controls, and you have been tasked with mapping Nolls' existing internal controls to specific NIST control families. Use the word bank to identify the NIST family in which each of the following internal controls belongs. Word Bank: Physical and Environmental Protection Awareness and Training Personnel Security Access Control Identification and Authentication Configuration Management Risk Assessment System and Communications Protection System and Information Integrity Security Assessment and Authorization

Understanding Business
12th Edition
ISBN:9781259929434
Author:William Nickels
Publisher:William Nickels
Chapter1: Taking Risks And Making Profits Within The Dynamic Business Environment
Section: Chapter Questions
Problem 1CE
icon
Related questions
Question
Nolls is an online retailer that specializes in connecting local artisans directly to consumers. You work for a public accounting firm as an
IT audit consultant and have been staffed on the Nolls cybersecurity engagement. Nolls hired your firm to help implement the NIST
Cybersecurity Framework. Your team is performing a gap analysis to identify areas where Nolls lacks internal controls, and you have
been tasked with mapping Nolls' existing internal controls to specific NIST control families.
Use the word bank to identify the NIST family in which each of the following internal controls belongs.
Word Bank:
Physical and Environmental Protection
Awareness and Training
Personnel Security
Access Control
Identification and Authentication
Configuration Management
Risk Assessment
System and Communications Protection
System and Information Integrity
Security Assessment and Authorization
Transcribed Image Text:Nolls is an online retailer that specializes in connecting local artisans directly to consumers. You work for a public accounting firm as an IT audit consultant and have been staffed on the Nolls cybersecurity engagement. Nolls hired your firm to help implement the NIST Cybersecurity Framework. Your team is performing a gap analysis to identify areas where Nolls lacks internal controls, and you have been tasked with mapping Nolls' existing internal controls to specific NIST control families. Use the word bank to identify the NIST family in which each of the following internal controls belongs. Word Bank: Physical and Environmental Protection Awareness and Training Personnel Security Access Control Identification and Authentication Configuration Management Risk Assessment System and Communications Protection System and Information Integrity Security Assessment and Authorization
Internal controls:
The Human Resources and IT departments collaborate to provide annual
training about phishing emails.
Nolls' IT department conducts penetration testing on an annual basis.
1.
2.
3.
4.
5.
6.
7.
8.
System resources are monitored to ensure that sufficient resources exist to
support unexpected network traffic.
Nolls' corporate office requires two forms of identification for visitors to the
data center.
System capacity, bandwidth, and redundancy are managed proactively.
Malicious code protection mechanisms are employed at access points of the
information system.
Nolls' IT department scans for vulnerabilities randomly.
The corporate password requirements include a minimum of eight characters,
along with at least one symbol, at least one number, and at least one capital
letter.
<
<
<
<
<
<
Transcribed Image Text:Internal controls: The Human Resources and IT departments collaborate to provide annual training about phishing emails. Nolls' IT department conducts penetration testing on an annual basis. 1. 2. 3. 4. 5. 6. 7. 8. System resources are monitored to ensure that sufficient resources exist to support unexpected network traffic. Nolls' corporate office requires two forms of identification for visitors to the data center. System capacity, bandwidth, and redundancy are managed proactively. Malicious code protection mechanisms are employed at access points of the information system. Nolls' IT department scans for vulnerabilities randomly. The corporate password requirements include a minimum of eight characters, along with at least one symbol, at least one number, and at least one capital letter. < < < < < <
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps

Blurred answer
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Understanding Business
Understanding Business
Management
ISBN:
9781259929434
Author:
William Nickels
Publisher:
McGraw-Hill Education
Management (14th Edition)
Management (14th Edition)
Management
ISBN:
9780134527604
Author:
Stephen P. Robbins, Mary A. Coulter
Publisher:
PEARSON
Spreadsheet Modeling & Decision Analysis: A Pract…
Spreadsheet Modeling & Decision Analysis: A Pract…
Management
ISBN:
9781305947412
Author:
Cliff Ragsdale
Publisher:
Cengage Learning
Management Information Systems: Managing The Digi…
Management Information Systems: Managing The Digi…
Management
ISBN:
9780135191798
Author:
Kenneth C. Laudon, Jane P. Laudon
Publisher:
PEARSON
Business Essentials (12th Edition) (What's New in…
Business Essentials (12th Edition) (What's New in…
Management
ISBN:
9780134728391
Author:
Ronald J. Ebert, Ricky W. Griffin
Publisher:
PEARSON
Fundamentals of Management (10th Edition)
Fundamentals of Management (10th Edition)
Management
ISBN:
9780134237473
Author:
Stephen P. Robbins, Mary A. Coulter, David A. De Cenzo
Publisher:
PEARSON