cmgt 431 learner ream week 3

  Security Toll for an operation must be incorporated into the Software Development Life Cycle (SDLC) in regulate to be a arrest, integrated system. Testing of chosen shelter guides ensures that applications coalesce profession requirements, administration as calculated, and vindicate associated axioms arrestly from onset. A shelter toll of the targeted environment identifies vulnerabilities that may source a shelter quarrel and specifies the shelter guides that abate the vulnerabilities. Refer to NIST SP 800-53 rev 4 for identification of the eighteen applicant shelter guide families and associated shelter guides. Choose five plain shelter guide families as specified in SP 800-53 rev 4, click on the chosen familites, and compose a spreadsheet that identifies the subjoined criteria for each extraction: Control ID Control Name Vulnerability Provide a incomprehensive paragraph for each extraction describing the testing process that achieve abate the vulnerability. Example: Family - Identification and Authentication Control ID - IA-2 Control Name - Identification and Authentication (Organizational Users) Vulnerability - Illegal user access Submit your assignment using the Assignment Files tab.