Implementing Low-Impact Security Controls

Implementing Low-Impact Security Controls
June 20, 2016 by
Implementing Low-Impact Security Controls
Apply NIST low-impact security controls to the JavaFX Login application.
* Use the attached file for this assignment!
The following security controls need to be applied to the application (check the NIST Security Controls Database for details, description and guidance for each control:
• AC-7 – UNSUCCESSFUL LOGON ATTEMPTS
• AC-8 – SYSTEM USE NOTIFICATION
• AU-3 – CONTENT OF AUDIT RECORDS
• AU-8 – TIME STAMPS
• IA-2(1) IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS) | NETWORK ACCESS TO PRIVILEGED ACCOUNTS (Note this is an enhancement of an existing low-impact security control)
• Select one additional low-impact security control and implement it. This can be an enhancement or a required low-impact security control. Selecting a control that provides documentation as opposed to code changes is also acceptable and encouraged.
Pointers:
a. Start with the baseline Login Application and add methods (or additional classes) as needed to comply with each of the security controls.
b. You will need to make some decisions for your implementation for the security audit/log files format.
c. For the multi-factor authentication, keep it simple. One approach is to send an email to the user with a security code. Then, have them check their email and enter the code. If the code matches, they are properly authenticated.
d. There are examples for using JavaMail and writing to files in the materials for this week. Be sure to use those as needed.
e. Pay attention to the details of the NIST database description and make sure all of the selected security controls for this project are fully implemented.
Deliverables:
Provide your security fixed Java source code along with a PDF document describing how you addressed each security control. For example, you should list the security control and the descriptions and show and describe the code that addresses the security control. You should also provide screen shots and descriptions of the successful executing the code and the resultant output as applied to each security control. Be sure to submit all of your Java source code if you used multiple classes.
Your code should be well-documented with comments, include header comments, use proper variable and naming conventions and properly formatted.
Answer not yet available
To have this questions done by our pool of professional writers, kindly send us an email.
Email to [email protected]
You can also browse for similar questions here
Categories
Uncategorized
Hate Crimes
Final Paper Proposal and Outline

Struggling to find relevant content? Order a custom essay on
Implementing Low-Impact Security Controls
Let our experts save you the hassle
Order Now
Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
Sign up, place your order, and leave the rest to our professional paper writers in less than 2 minutes.
step 1
Upload assignment instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
s
Get personalized services with GPA Fix
One writer for all your papers
You can select one writer for all your papers. This option enhances the consistency in the quality of your assignments. Select your preferred writer from the list of writers who have handledf your previous assignments
Same paper from different writers
Are you ordering the same assignment for a friend? You can get the same paper from different writers. The goal is to produce 100% unique and original papers
Copy of sources used
Our homework writers will provide you with copies of sources used on your request. Just add the option when plaing your order
What our partners say about us
We appreciate every review and are always looking for ways to grow. See what other students think about our do my paper service.
Marketing
Thank you great job
Customer 452813, July 10th, 2022
Database design and optimization
thanks for busting this out so expeditiously. I hope that I get a good grade.
Customer 452715, February 19th, 2022
Social Work and Human Services
The paper is impressive. Very professional and per the instructions
Customer 452533, May 24th, 2021
Nursing
Perfect as usual!!! Thanks team!
Customer 452453, May 26th, 2021
IT, Web
Great job on the paper.
Customer 452885, February 7th, 2023
Marketing
Yes and thank you
Customer 452701, October 25th, 2022
Accounting
Thanks for your support
Customer 452701, February 3rd, 2022
Business and administrative studies
GREAT
Customer 452813, June 20th, 2022
Human Resources Management (HRM)
Great Work!
Customer 452767, November 18th, 2022
Nursing
I appreciate all the hard work. Thank you!
Customer 452525, August 13th, 2021
Other
nice
Customer 452813, June 25th, 2022
Human Resources Management (HRM)
The paper was delivered on time and I am very pleased with the writer's work.
Customer 452701, June 21st, 2023
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information