Is there a cybersecurity workforce crisis in state governments, writing homework help

User Generated

puevfgvar15

Writing

Description

Topic: Cybersecurity for State Governments

This week, we consider the roles and responsibilities of State Governments. The U.S. Constitution reserves to the statesany power or function that is not explicitly given to the federal government. Throughout the years, the definitions and allocations of roles, responsibilities, and powers of state governments versus the federal government have been debated and modified through both legislative (laws) and judicial actions (Supreme Court decisions). But, the bottom line is that states and state governors still have substantial responsibilities and obligations to provide protections for their citizens. These obligations include a duty to protect their states' citizens, businesses, and infrastructures against cyber threats.

In the readings, you will find reports, news items, and other documents which discuss the problems of implementing cybersecurity for and by state governments. These problems include the need to find ways in which states and the federal government can cooperate to improve cybersecurity, especially in the area of critical infrastructure protection. (Critical infrastructure protection is a major concern of state governments especially since many of these infrastructures are owned and operated locally.)

We will also consider the problems and responsibilities that state governments have with respect to recruiting, hiring, and retaining a qualified and motivated cybersecurity workforce. And, in addition to developing cybersecurity workers for their own needs, the states also have a responsibility to educate and train a cybersecurity workforce for business, industry, and other organizations.

Major Assignment due this weekCase Study #3: Is there a cybersecurity workforce crisis in state governments?

  • Debate: As governor, how will your administration improve cybersecurity for the state's Critical Infrastructures?

    Prepare a three to five paragraph introduction (briefing statement) for a general election debate question:

    As governor, how will your administration improve cybersecurity for the state's Critical Infrastructures?

    This question will be asked of all gubernatorial candidates participating in a state-level debate (you should not address any single candidate or party).

    Your introduction must provide enough information that the candidates understand key terms as defined by you for the debate question:

    • What is meant by "cybersecurity" for critical infrastructures?"
    • Where have past state government administrations supported or fallen short in promoting cybersecurity for critical infrastructures?
    • What is meant by "Threats" (i.e. individual hackers, politically motivated hacktivists, criminal enterprises, and unfriendly "nation state" actors)

    If you need help getting started, take a look at this report: http://www.nga.org/files/live/sites/NGA/files/pdf/1011GOVGUIDEHS.PDF or, run this Google search: https://www.google.com/search?q=governors+critical+infrastructure 

    Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

    Timeliness of Initial Posting
    Briefing Statement or Paper
    Timeliness of Postings
    Quality of Discussion Postings
    Overall Score

    Case Study #3: Is there a cybersecurity workforce crisis in state governments??

    Case Scenario:

    A membership organization for state government officials has asked your cybersecurity consulting firm to partner with it in developing a one-day workshop on workforce development needs for cybersecurity workers. Your part in this endeavor is to provide the coordinating committee with a position paper which discusses the question: “Is there a cybersecurity workforce crisis in state governments? Your paper should be no more than 3 pages in length and must address both sides of the question (“yes, there is a crisis” and “no, there is not a crisis”).

    Research:

    1.Read / Review the Week 5 readings.

    2.Research authoritative sources which support the “Yes” side of the question. Here are several sources to help you get started:

    a.http://www.pewtrusts.org/en/research-and-analysis/blogs/stateline/2015/5/11/hiring-cybersecurity-staff-is-hard-for-states

    b.http://www.nga.org/files/live/sites/NGA/files/pdf/2014/1410TheCybersecurityWorkforce.pdf 

    c. Comparing Private Sector and Government Worker Salaries   http://reason.org/news/show/public-sector-private-sector-salary  (This source argues both sides of the compensation / education arguments.)

    3.Research authoritative sources which support the “No” side of the question. For example, states may have a shortage of workers overall. Or, the lack of competitive compensation claim may be inaccurate. Or, you may find that the shortage of cybersecurity workers is unrelated to the type of employer (that is, everyone is having problems finding qualified personnel).

    a.Budgetary Constraints (p. 3, Figure 1.4) http://www.csg.org/knowledgecenter/docs/ta0210workshortage.pdf 

    b.IT Workforce hiring issues: http://www.nascio.org/Portals/0/Publications/Documents/NASCIO_ITWorkforce_UnderPressure.pdf 

    c.State vs Private Compensation (see “Conclusions” on p. 15) https://www.aei.org/wp-content/uploads/2014/04/-biggs-overpaid-or-underpaid-a-statebystate-ranking-of-public-employee-compensation_112536583046.pdf 

    d.Global talent gap http://thehill.com/blogs/congress-blog/technology/239113-cybersecurity-talent-worse-than-a-skills-shortage-its-a 

    4.Review the best practice recommendations from the NICE report. Select three to five best practices which state governments could benefit from implementing.  http://niccs.us-cert.gov/sites/default/files/documents/files/Best%20Practices%20for%20Planning%20a%20Cybersecurity%20Workforce_062813_v4.2_FINAL_NICE%20branded_0.pdf 

    5.Review alternative recommendations for attracting and retaining qualified talent (workers) to a state or region. Select 3 or more which you believe would be beneficial for state government hiring efforts for cybersecurity personnel.

    a.About Good Neighbor Next Door (ask yourself if this program or something similar should be extended to cybersecurity personnel) http://portal.hud.gov/hudportal/HUD?src=/program_offices/housing/sfh/reo/goodn/gnndabot 

    b.Attracting Big Talent to Small Cities http://www.hreonline.com/HRE/view/story.jhtml?id=534358095

    c.7 Ways to Attract and Retain Talent (without having to compete on salaries) http://www.oyginc.com/articles/attractarticle1/  

    d.Government Needs to Rethink How They Attract IT Talent  http://www.governing.com/columns/tech-talk/gov-remaking-your-workforce.html 

    Write:

    Write a two to three page summary of your research. At a minimum, your summary must include the following:

    1.An introduction or overview of the cybersecurity workforce issues which impact State governments. This overview should address the political, economic, socio-cultural (included education), and technological factors which contribute to the perceived lack of qualified cybersecurity workers. This introduction should be suitable for an executive audience.

    2.A separate section which addresses three to five specific reasons why states have difficulty hiring a sufficient number of trained and qualified cybersecurity workers for positions in state agencies and offices. 

    3.A separate section which addresses three to five specific “non-cybersecurity” reasons why a workforce shortage affecting state governments may currently exist. You may also choose to argue that the workforce shortage arises out of state budget problems rather than training and education or salary.

    4.A recommendations section which addresses three to five marketing or hiring actions which state governments could take to attract cybersecurity talent and reduce or alleviate a cybersecurity workforce shortage for trained and qualified cybersecurity personnel. These recommendations should include several alternative practices which deemphasize salary.

    Your white paper should use standard terms and definitions for cybersecurity and privacy. The following sources are recommended:

    •ISACA Glossary http://www.isaca.org/pages/glossary.aspx 

    •Guidelines on Security and Privacy in Public Cloud Computing http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-144.pdf 

    Submit For Grading

    Submit your case study in MS Word format (.docx or .doc file) using the Case Study #1 Assignment in your assignment folder. (Attach the file.)

    Formatting Instructions

    Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources > APA Resources.

    Additional Information

    1.You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. These items are graded under Professionalism and constitute 20% of the assignment grade. 

    2.You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university’s Academic Integrity policy.

    Rubric Name: Case Study #3 Rubric

    Criteria
    Overall Score

    User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

    Explanation & Answer

    please find the attached file. please let me know if you need any adjustments made. always a pleasure working with you. good bye

    Running head: CYBER SECURITY CRISIS

    1

    Cyber Security Crisis
    Name
    Tutor
    Institution
    Course
    Date

    CYBER SECURITY CRISIS

    2

    Part One
    Cyber security
    Cyber security which is also referred as information technology security is the focus on
    the protection of computers, data, programs and also networks from unauthorized or unintended
    access, destruction or change (Burges, 2010). It thus involves the protection procedures and thus
    the process of ensuring that there is critical infrastructure continuity and also the remaining of all
    the key sources in their right state. Cyber security is what is essential primarily to the strategy of
    nationwide security.
    Cyber security for the Critical infrastructure involving the physical and also the virtual
    assets is a very vital issue. This is because it would incapacitate the critical infrastructure which
    can result in a debilitating impact that would compromise on the state and the nation’s key
    systems. There is the need for the state to identify all the key systems and thus the critical
    infrastructure and its resources which would aid in the enhancing of cyber security. The
    identification of the critical infrastructure is what forms the base for the development of the
    necessary and the required strategies to ensure cyber security is achieved. The preserving of the
    infrastructure and its assets from all the potential disasters is thus a critical component for the
    strategy of homeland security.
    The promotion of critical infrastructure cyber security by the state governments
    The administrations of the state government in the past have supported and also fallen
    short in relation to critical infrastructures and the promotion of cyber security. The above has
    happened because of reasons which include the need to identify and also have an understanding
    of critical infrastructure and its interdependencies. The above would assist in the full

    CYBER SECURITY CRISIS

    3

    comprehension o...


    Anonymous
    Really helped me to better understand my coursework. Super recommended.

    Studypool
    4.7
    Trustpilot
    4.5
    Sitejabber
    4.4

    Similar Content

    Related Tags