Retrieved from https://studentshare.org/information-technology/1459570-certification-and-accreditation
https://studentshare.org/information-technology/1459570-certification-and-accreditation.
Full Paper Table Of Contents Contents Introduction 3 2. SWOT Analysis 3 a. Strengths 3 b. Weaknesses 4 c. Opportunities 4 d. Threats 4 1. Introduction The Certification and Accreditation program is a critical component of the organization wide information system program. Likewise, the program is delivered by the business owner who hands this program to the chief information officer via chief information security officer in order to decide accreditation that is also known as consultancy for operation.
However, there is a requirement of authorization in written, as it will be conducted by the chief information officer before completely implementing information systems and any significant changes that may affect the systems. One of the key features of the Certification and Accreditation program is a program procedure that will facilitate the business owner and system maintenance staff or system developer with a complete overview that is required for constructing documents. These documents will facilitate the demonstration and validation of current adequate security controls implemented for safeguarding the information system. 2. SWOT Analysis A certification and accreditation document provides a guide for business owners, system owners and all relevant stakeholders with the mandatory instructions and information for developing and submitting a system of accreditation and certification (Feasibility study for system dynamics certification and accreditation). a. Strengths Strengths of this presentation incorporate detailed explanation of the contents demonstrated on the slides.
Moreover, the textual theme of the presentation along with the text size is appropriate. Furthermore, footnotes provide adequate in-depth explanation of contents available on the slides. b. Weaknesses Absence of an appropriate theme is absent from the presentation slides, as a theme provides graphical representation. Moreover, there is no clearly defined differentiation factor between the topic headings and the topic title. c. Opportunities There is a high probability that the presentation will define certification and accreditation process in clearly defined and bulleted contents. d. Threats No multi-level bulleting used and images is not formatter neatly.
These are the two factors that can become a threat for the presentation. A complete certification and accreditation document must include these components: Certification and accreditation Table of Contents Executive Summary Security Certification Form System Security Plan Information Security Risk Assessment Contingency Plan Test of the Contingency Plan Security Test and Evaluation Report Plan of Action and Milestones Supporting Documentation Moreover, a security certification form incorporates the following contents (T2Home, n.d): 1. Select the reason(s) certification is required. 2. Indicate the name of the System. 3. Indicate the CMS Component. 4. Provide the printed Name, Date, and Signature of the CMS Component Information System Security Officer (ISSO). 5. Include the boilerplate language. 6. Provide the printed Name, Date, and Signature of the Certification Official (Executive). 7. Provide the printed Name, Date, and Signature of the Business Owner. 8. Provide the printed Name, Date, and Signature of the System Developer/Maintainer. 9. Complete the Security Certification Restrictions section and indicate any restrictions. 10. Complete the Security Certification Actions section and indicate any actions.
References Feasibility study for system dynamics certification and accreditation Retrieved 11/4/2012, 2012, from http://systemdynamics.org/FeasibilityOfCertification.htm Home | centers for medicare & medicaid services Retrieved 11/4/2012, 2012, from http://www.cms.gov/
Read More