Complete a Cybersecurity Policy Review, assignment help

User Generated

zoebpxrgg86

Computer Science

Description

Instruction for the Final Report

Administration Cybersecurity Policy Review

This comprehensive report should include the sections listed below and conclude with a statement that addresses (agree or disagree) with the following comment:

"Not all federal agencies need to follow FISMA or NIST recommendations for maintaining cybersecurity. After all, if the cyberinfrastructure of a government agency is attacked, no real harm is done to anyone except the complainants."

Review the work you have done throughout the project. If necessary, review the eLearning modules in steps 1 and 5 and your Simtray Report completed in Step 4 along with the feedback from your instructor. And remember to tailor your report to your nontechnical audience.

Be sure to address the following items at some point in your report:

  • Document the cybersecurity policy issues faced by the United States.
  • Analyze the interrelations among cybersecurity technology decisions and cybersecurity policies.
  • Translate how cybersecurity policy choices affect cybersecurity technology research and development.
  • Compare and contrast key federal and state cybersecurity standards.
  • Assess the key points and principles in the NIST standards for cloud cybersecurity.
  • Develop an awareness program of the linkage(s) between US national security and US national priorities for securing cyberspace.
  • Compare and contrast US cybersecurity standards bodies.
  • Identify stakeholders to be contacted in the event of an organizational cybersecurity incident.
  • Compare and contrast cyberdefense and cyberattack, and discuss the relevant policies that underpin each term.

Report Sections

  • Title Page
  • Table of Contents
  • Introduction
  • Key Current Administration Cybersecurity Policy Tenets
  • Key Prior Administration Cybersecurity Policy Tenets
  • Comparison of Current and Prior Tenets
  • FISMA Conclusions
  • NIST Conclusions
    • Conclusion
    • Pro/Con Current vs. Prior
    • Pro/Con FISMA Regulation
    • Pro/Con NIST Guidelines
    • Reference Page

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: CYBERSECURITY POLICY REVIEW

Cyber security
Name
Professor
Institution
Course
Date

1

CYBERSECURITY POLICY REVIEW

2

Table of contents
Introduction…………………………………………………………………………….……….3
Key current administration cybersecurity policy tenets………………………………...………3
Key prior administration cybersecurity policy tenets……………………………………….....3/4
Comparison of the prior and present tenets……………………………………………………4/5
NIST conclusions, pros and cons………………………………………………………………5
FISMA conclusions, pros and cons……………………………………………………………6 /7
Conclusion……………………………………………………………………………………..7/8
References………………………………………………………………………………………..9

CYBERSECURITY POLICY REVIEW

3

Introduction
Cyber security refers to the protection of computer programs, networks, and data from
access by unauthorized access, alteration or destruction. In most cases, cybersecurity focuses on
ensuring that an organization can secure its data and information stored in the computers without
the fear of attacks by other parties with malicious intentions. Insecurities of the computer
systems have led to the loss of valuable data rendering the organization vulnerable to outside
threats that may affect their business operations (The United States, 2015). Some of the security
issues affecting computer systems including hacking and virus infections that may lead to loss of
data and make it hard for business operations to be successful. The overall performance of an
organization thus gets affected by the insecurities of the computer systems. However, policies
have been formulated to address the issue, but due to some challenges, they do not adequately
address the cyber security issue.
Key current administration cybersecurity policy tenets
Protection of computer systems can at times be inappropriately conflated with concepts
like surveillance, gathering intelligence and privacy. For cyber security to be efficient, the
management of information systems must play a vital role in ensuring that employees and the
management understand the significance of having a ...


Anonymous
Awesome! Made my life easier.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags