StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Certification and accreditation - Research Paper Example

Cite this document
Summary
Full Paper Title Name University Table Of Contents Contents 1. Introduction 3 2. SWOT Analysis 3 a. Strengths 3 b. Weaknesses 4 c. Opportunities 4 d. Threats 4 1. Introduction The Certification and Accreditation program is a critical component of the organization wide information system program…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
Certification and accreditation
Read Text Preview

Extract of sample "Certification and accreditation"

Full Paper Table Of Contents Contents Introduction 3 2. SWOT Analysis 3 a. Strengths 3 b. Weaknesses 4 c. Opportunities 4 d. Threats 4 1. Introduction The Certification and Accreditation program is a critical component of the organization wide information system program. Likewise, the program is delivered by the business owner who hands this program to the chief information officer via chief information security officer in order to decide accreditation that is also known as consultancy for operation.

However, there is a requirement of authorization in written, as it will be conducted by the chief information officer before completely implementing information systems and any significant changes that may affect the systems. One of the key features of the Certification and Accreditation program is a program procedure that will facilitate the business owner and system maintenance staff or system developer with a complete overview that is required for constructing documents. These documents will facilitate the demonstration and validation of current adequate security controls implemented for safeguarding the information system. 2. SWOT Analysis A certification and accreditation document provides a guide for business owners, system owners and all relevant stakeholders with the mandatory instructions and information for developing and submitting a system of accreditation and certification (Feasibility study for system dynamics certification and accreditation). a. Strengths Strengths of this presentation incorporate detailed explanation of the contents demonstrated on the slides.

Moreover, the textual theme of the presentation along with the text size is appropriate. Furthermore, footnotes provide adequate in-depth explanation of contents available on the slides. b. Weaknesses Absence of an appropriate theme is absent from the presentation slides, as a theme provides graphical representation. Moreover, there is no clearly defined differentiation factor between the topic headings and the topic title. c. Opportunities There is a high probability that the presentation will define certification and accreditation process in clearly defined and bulleted contents. d. Threats No multi-level bulleting used and images is not formatter neatly.

These are the two factors that can become a threat for the presentation. A complete certification and accreditation document must include these components: Certification and accreditation Table of Contents Executive Summary Security Certification Form System Security Plan Information Security Risk Assessment Contingency Plan Test of the Contingency Plan Security Test and Evaluation Report Plan of Action and Milestones Supporting Documentation Moreover, a security certification form incorporates the following contents (T2Home, n.d): 1. Select the reason(s) certification is required. 2. Indicate the name of the System. 3. Indicate the CMS Component. 4. Provide the printed Name, Date, and Signature of the CMS Component Information System Security Officer (ISSO). 5. Include the boilerplate language. 6. Provide the printed Name, Date, and Signature of the Certification Official (Executive). 7. Provide the printed Name, Date, and Signature of the Business Owner. 8. Provide the printed Name, Date, and Signature of the System Developer/Maintainer. 9. Complete the Security Certification Restrictions section and indicate any restrictions. 10. Complete the Security Certification Actions section and indicate any actions.

References Feasibility study for system dynamics certification and accreditation Retrieved 11/4/2012, 2012, from http://systemdynamics.org/FeasibilityOfCertification.htm Home | centers for medicare & medicaid services Retrieved 11/4/2012, 2012, from http://www.cms.gov/

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Certification and accreditation Research Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1459570-certification-and-accreditation
(Certification and Accreditation Research Paper Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1459570-certification-and-accreditation.
“Certification and Accreditation Research Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1459570-certification-and-accreditation.
  • Cited: 0 times

CHECK THESE SAMPLES OF Certification and accreditation

IT Security and the Impact of CIO Roles

Moreover, the chief information officer then gets Certification and accreditation from the government once this is achieved (Enloe, 2002).... IT Security and the Impact on CIO Roles Name Business Instructor: 26th April, 2013 Organizational assets and operations have become increasingly dependent on information technology to accomplish their mission and goals set by the management....
3 Pages (750 words) Essay

Leadership in Energy and Environmental Design

In view of this, LEED program provides two options for projects seeking certification; they include new construction and major renovation that addresses the details of construction or substantial renovations in retail buildings and commercial interior, which is concerned, with details about tenant space where the tenant is changing already existing fittings....
3 Pages (750 words) Essay

Effectiveness Of Federal Information Security

hellip; After the computer security act of 1987, there was a strong need to formulate a standard Department of Defense (DoD) policy for security Certification and accreditation federal information systems.... We review to Department of Defense (DoD) security Certification and accreditation (DITSCAP) program.... Phase I discusses security standards and Guidelines, Phase II delves into organizational accreditation program while phase III is called the Security Tool Validation Program....
36 Pages (9000 words) Research Paper

Managing Email Security in Organizations

ISO/IEC 27006: these acts as guides to the process of certification and registration.... In the paper “Managing Email Security in Organizations,” the author focuses on the need for the design and installation of a security control system to help in the detecting, cleaning and deleting threats that occur in the company....
4 Pages (1000 words) Assignment

Chinese Student Applying for a Transfer to the University of Miami

I want to undertake some of the globally competitive courses only offered by the institution, to achieve globally competitive Certification and accreditation that are relevant in today's workplace; in this respect, the University of Miami is my personal choice because it guarantees all these, and much more.... Considering its global credibility and accreditation, the University of Miami is more likely to add a lot of value to my professional qualifications, unlike a local community college....
2 Pages (500 words) Admission/Application Essay

Certification and Development of More Sustainable Tourism

Sustainable tourism is an essential aspect of the prevailing need for a sense of social responsibility, when it comes to tourism and tourist destinations.... It pertains to the various attempts, which are aimed at lowering to the least possible levels, the impact of human… this is in tandem with the attempted generation of sustainable future employment of the local populations present....
10 Pages (2500 words) Essay

The Best Pizza in Town

The contractor needs to have Certification and accreditation from the Food Handler Certification program as provided by the city of Ottawa.... The contractor needs to have Certification and accreditation from the Food Handler Certification program as provided by the city of Ottawa....
1 Pages (250 words) Case Study

Information System Security Plans

In that direction, DoD adopted a risk-focused security plan and guidelines of NIST in 2014 after dropping its longstanding DoD Information Assurance Certification and accreditation Process (DIACAP).... A nation can protect itself from threats and reach the top echelons only if its security system is made optimal and effective without any chance of loopholes....
5 Pages (1250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us