CSIA 360: Cybersecurity in Government Organizations Project 2: Compare / Contrast Two State Government IT Security Policies For this

CSIA 360: Cybersecurity in Government Organizations

Project 2: Compare / Contrast Two State Government IT Security Policies

For this research-based report, you will perform a comparative analysis that examines the strengths and weaknesses of two existing IT Security Policies published by state governments for their operating departments and agencies (agencies and offices of the executive branch under the leadership of the state governors). (You will select two policies from the table under Research > Item #1.)

Your specific focus for this analysis will be how these state issued policies guide the implementation of (a) Risk Analysis (aligned with NIST SP 800-30 and SP 800-37) and (b) System Authorization processes aligned with the 7 domains of the Certified Authorization Professional certification.

Your analysis must include consideration of best practices and other recommendations for improving cybersecurity for state government information technology operations (i.e. those operated by or for state agencies and offices). Your paper should also address the question: why should every state in the nation have a comprehensive IT security policy for state agencies and offices that implements risk assessment processes and system authorization processes to reduce and mitigate risk?

Read / Review:

1. Review the 7 domains of the Certified Authorization Professional (in the course textbook):

· Information Security Risk Management Program

· Scope of the Information System

· Selection and Approval of Security and Privacy Controls

· Implementation of Security and Privacy Controls

· Assessment/Audit of Security and Privacy Controls

· Authorization/Approval of Information System

· Continuous Monitoring

2. Review the NIST best practices guidance in NIST SP 800-30 and NIST SP 800-37 (read chapters 1 & 2 in each document).

Research:

1. Select two state government IT Security Policies from the list below.

State

IT Security Policy

Illinois

Massachusetts

Michigan

Minnesota

Nebraska

North Carolina

Oklahoma

South Dakota

Virginia

2. Download and review your selected state governments’ IT Security Policy documents. If the IT Security policy document refers to a separate System Authorization Policy, download and then include that supporting document in your review and analysis for this project.

3. Analyze the System Authorization processes listed in the two IT Security Policy documents.

a. How well do these align with the
best practices listed in the CAP Certification Body of Knowledge?

b. How well do the Risk Assessment processes align with guidance provided in NIST SP 800-30 and NIST SP 800-37?

4. Continuous your analysis from step 3 and use it to compare the System Authorization activities listed in the state IT security policies.

a. Develop five or more points that are common across the two documents. (Similarities)

b. Identify and review at least three unique items in each document. (Differences)

5. Research best practices for IT Security and/or IT Security Policies for state governments. Here are several sources which you may find helpful:

a.

b.

c.

6. Using your research and your comparison of the two policy documents, develop an answer to the question: Why should every state government have an IT security policy for state agencies and offices under the state’s executive branch? Make sure that you address: (a) leadership, (b) compliance with laws and regulations, and (c) best practices for
good government (especially with respect to cybersecurity practices)
.

Write:

Write a five to eight (5-8) page research-based report in which you summarize your research and discuss the similarities and differences between the two IT security policy documents. You should focus upon clarity and conciseness more than length when determining what content to include in your paper. At a minimum, your report must include the following:

1. An introduction or overview of
IT Security Policies for the executive branch of state governments (covering state agencies and offices in the executive branch including the governor’s office). Explain the purpose of an IT security policy and how states use security policies. Answer the question: why should every state in the nation have a comprehensive IT security policy for state agencies and offices? (Make sure that you address the importance of such strategies to small, resource-poor states as well as to large or wealthy states.)

2. A separate section in which you provide and discuss five or more specific examples of the common principles and policy sections/statements (similarities) found in both IT security policy documents.

3.
A separate section in which you discuss the unique aspects of the first state’s IT security policy document. Provide five or more specific principles or guidelines or other content that is unique to the policy document.

4. A separate section in which you discuss the unique aspects of the second state’s IT security policy document. Provide five or more specific principles or guidelines or other content that is unique to the policy document.

5. A section in which you discuss your evaluation of which state government has the better of the two IT security policy documents. You should also present five or more best practice recommendations for improvements for both IT security policy documents. (Note: you may have different recommendations for the individual policies depending upon the characteristics of each document.)

7. A summary section in which you address the need for IT Security Policies at the state government level. Provide a convincing answer to the question: why should every state in the nation have a comprehensive IT security policy for state agencies and offices? Make sure that you address: (a) leadership, (b) compliance with laws and regulations, and (c) best practices for
good government.

Submit for Grading

Submit your work in MS Word format (.docx or .doc file) using the Project 2 Assignment in your assignment folder. (Attach the file.)

Additional Information

1. Consult the grading rubric for specific content and formatting requirements for this assignment.

2. Your 5-8 page research-based report should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper.

3. Your paper should use standard terms and definitions for cybersecurity.

4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Paper_Template(TOC+TOF,2021).docx.

5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count.

6. You should write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. 

7. You must credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).

Copyright ©2022 by University of Maryland University College. All Rights Reserved

image1.png

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

I need exercise 4 and 5 ASAP lab09/noccalula-falls.bmp lab09/jaguar.jpg lab09/cheetah-family.jpg lab09/secret04.txt Reintroduction of

I need exercise 4 and 5 ASAP lab09/noccalula-falls.bmp lab09/jaguar.jpg lab09/cheetah-family.jpg lab09/secret04.txt Reintroduction of the cheetah in India involves the re-establishment of a population of cheetahs into areas where they had previously existed but were hunted into extinction during and after the Mughal Period, largely by Rajput and Maratha Indian royalty