Visit the NIST FASP security practices Web site at httpcsrcn
Visit the NIST FASP security practices Web site at http://csrc.nist.gov/groups/SMA/fasp/index.html. Review some of the listed FASPs and identify five drawbacks to adopting the recommended practices for a typical business.
Solution
The first disadvantage is that there is a six step security framework described which can be read by the hackers and the framework may be expanded by them to recognize loopholes in it and come up with a improved plan to crack these multi layers of safety. This would provide the hackers a fine idea about the kind of security blockage that they could encounter as trying to crack the codes of security. The further security controls and the improvement for security threats has also been described clearly and many business organizations without huge amount of assets will not be able to connect an expert security control agency to keep the company’s data and may follow the processes listed here. Because the hackers are previously attentive of the policies, they can all the time crack the codes expanded by small business organizations. Direction is also offered for managing security risks and so even this data can be read by the hackers which would as well guide them in expanding codes and strategies for cracking the security layers of business associations. The other drawbacks would include streamlining the security procedure and the organization stage security controls for administrating information security programs for business projects.