Can we ensure that Digital Government services are secure?

Anonymous
timer Asked: Oct 21st, 2018
account_balance_wallet $30

Question Description

Case Study #2: Can we ensure that Digital Government services are secure?

Case Scenario:

You have been asked to participate in a panel discussion of security issues affecting digital government Websites. Each panel member has been asked to select a specific Website (from the list provided in Table 1) and then research (a) the information and services that it provides and (b) the security issues which could impact the delivery of digital government services. Your two to three page summary of your research will be provided to the panel audience in advance of the discussion.

Table 1. List of Approved Digital Government Websites

Base URLs

BENEFITS.GOV

CANCER.GOV

CONSUMERFINANCE.GOV

DATA.GOV

DIGITALGOV.GOV

DISASTERASSISTANCE.GOV

FOODSAFETY.GOV

GRANTS.GOV

HEALTHCARE.GOV

HEALTHFINDER.GOV

MEDICARE.GOV

READY.GOV

RECREATION.GOV

REGULATIONS.GOV

RESEARCH.GOV

SAFERCAR.GOV

SERVE.GOV

STOPFAKES.GOV

USA.GOV

VOLUNTEER.GOV

Research:

  • Read / Review the Week 3 readings.
  • Research three or more attacks which could compromise the security of a Digital Government Website which uses Web Applications, a Web Server, and a Database Server. Here are some sources to get you started:
  • Review the Website for a digital government service (select one of the Websites listed in Table 1). What types of information or services are available via your selected Website? What population does this Website serve (who is the intended audience)?
  • As part of your Digital Government Website review, determine the types and sensitivity of information collected, displayed, processed, and stored by the Web applications which implement the Digital Government service.
  • Using FIPS 200 and NIST SP 800-53, research the general types of security controls which are required for the IT systems hosting the Digital Government service that you reviewed. (FIPS and NIST SP documents can be retrieved from http://csrc.nist.gov/publications )
  • Find three or more additional sources which provide information about best practice recommendations for ensuring the security of the Web Applications used to deliver Digital Government information and services. These additional sources can include analyst reports and/or news stories about recent attacks / threats, data breaches, cybercrime, cyber terrorism, etc. which impacted the security of digital government services.
    • What types of information or services are available via your selected Website?
    • What population does this Website serve (who is the intended audience)?
    • What sensitivity level which should be assigned to the Website (use FIPS 199 criteria).
    • What security issues were observed during your review?

Write:

Write a two to three page summary of your research. At a minimum, your summary must include the following:

1.An introduction or overview of digital government which provides definitions and addresses the laws, regulations, and policies which require that federal agencies provide information and services via the Web. This introduction should be suitable for an executive audience.

2.An overview of the information and services provided by your selected digital government Website. Answer the following questions:

3.A separate section which addresses the architectures and security issues inherent in the use of Web applications when used to deliver the services provided by your selected digital government Website.

4.A separate section which includes recommendations for best practices for ensuring Web application security during the design, implementation, and operation of digital government websites. Include five or more best practice recommendations in your discussion.

5.A closing section in which you summarize your research and your recommendations.

Submit For Grading

Submit your research summary document in MS Word format (.docx or .doc file) using the Case Study #2 Assignment in your assignment folder. (Attach the file.)

Additional Information

  • Consult the grading rubric for specific content and formatting requirements for this assignment.
  • Your [length] page [assignment] should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper.
  • Your paper should use standard terms and definitions for cybersecurity. See Course Content > Cybersecurity Concepts Review for recommended resources.
  • The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,Nov2014).docx.
  • You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count.
  • You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.
  • You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).

Unformatted Attachment Preview

CSIA 360: Cybersecurity in Government Organizations Case Study #2: Can we ensure that Digital Government services are secure? Case Scenario: You have been asked to participate in a panel discussion of security issues affecting digital government Websites. Each panel member has been asked to select a specific Website (from the list provided in Table 1) and then research (a) the information and services that it provides and (b) the security issues which could impact the delivery of digital government services. Your two to three page summary of your research will be provided to the panel audience in advance of the discussion. Table 1. List of Approved Digital Government Websites BENEFITS.GOV DIGITALGOV.GOV HEALTHCARE.GOV RECREATION.GOV SERVE.GOV Base URLs CANCER.GOV CONSUMERFINANCE.GOV DISASTERASSISTANCE.GOV FOODSAFETY.GOV HEALTHFINDER.GOV MEDICARE.GOV REGULATIONS.GOV RESEARCH.GOV STOPFAKES.GOV USA.GOV DATA.GOV GRANTS.GOV READY.GOV SAFERCAR.GOV VOLUNTEER.GOV Research: 1. Read / Review the Week 3 readings. 2. Research three or more attacks which could compromise the security of a Digital Government Website which uses Web Applications, a Web Server, and a Database Server. Here are some sources to get you started: a. Web Applications Architectures and Security (in the Week 3 content module). b. Cyber Vandalism -- https://www.digitalgov.gov/resources/readiness-recovery-responsesocial-media-cyber-vandalism-toolkit/ c. Cybersecurity: Actions needed to address challenges facing federal systems (GAO 15573T) http://www.gao.gov/assets/670/669810.pdf d. Cognitive Hacking and Digital Government: Digital Identity http://www.ists.dartmouth.edu/library/78.pdf e. US-Cert Publications (See Technical Reports section) https://www.us-cert.gov/securitypublications#reports 3. Review the Website for a digital government service (select one of the Websites listed in Table 1). What types of information or services are available via your selected Website? What population does this Website serve (who is the intended audience)? 4. As part of your Digital Government Website review, determine the types and sensitivity of information collected, displayed, processed, and stored by the Web applications which implement the Digital Government service. a. See http://www.digitalgov.gov/resources/checklist-of-requirements-for-federal-digitalservices/ for general security and privacy requirements. CSIA 360: Cybersecurity in Government Organizations b. See FIPS 199 for additional guidance on determining the sensitivity level of a Federal IT system. (See the section on public websites.) 5. Using FIPS 200 and NIST SP 800-53, research the general types of security controls which are required for the IT systems hosting the Digital Government service that you reviewed. (FIPS and NIST SP documents can be retrieved from http://csrc.nist.gov/publications ) 6. Find three or more additional sources which provide information about best practice recommendations for ensuring the security of the Web Applications used to deliver Digital Government information and services. These additional sources can include analyst reports and/or news stories about recent attacks / threats, data breaches, cybercrime, cyber terrorism, etc. which impacted the security of digital government services. Write: Write a two to three page summary of your research. At a minimum, your summary must include the following: 1. An introduction or overview of digital government which provides definitions and addresses the laws, regulations, and policies which require that federal agencies provide information and services via the Web. This introduction should be suitable for an executive audience. 2. An overview of the information and services provided by your selected digital government Website. Answer the following questions: a. What types of information or services are available via your selected Website? b. What population does this Website serve (who is the intended audience)? c. What sensitivity level which should be assigned to the Website (use FIPS 199 criteria). d. What security issues were observed during your review? 3. A separate section which addresses the architectures and security issues inherent in the use of Web applications when used to deliver the services provided by your selected digital government Website. 4. A separate section which includes recommendations for best practices for ensuring Web application security during the design, implementation, and operation of digital government websites. Include five or more best practice recommendations in your discussion. 5. A closing section in which you summarize your research and your recommendations. Submit For Grading Submit your research summary document in MS Word format (.docx or .doc file) using the Case Study #2 Assignment in your assignment folder. (Attach the file.) Additional Information 1. Consult the grading rubric for specific content and formatting requirements for this assignment. CSIA 360: Cybersecurity in Government Organizations 2. Your [length] page [assignment] should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper. 3. Your paper should use standard terms and definitions for cybersecurity. See Course Content > Cybersecurity Concepts Review for recommended resources. 4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,Nov2014).docx. 5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count. 6. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. 7. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.). ...
Purchase answer to see full attachment

Tutor Answer

ProfDwayne01
School: University of Maryland

Hello, Check the paperThank you for your time

Running head: DIGITAL GOVERNMENT SERVICES

DIGITAL GOVERNMENT SERVICES
Name
October 21, 2018

1

DIGITAL GOVERNMENT SERVICES
Introduction
Delivery of services by many governments has seen rapid changes over the years with the
revolution of the internet. Creation of digital governance has enabled many of them to keep up
with their citizens’ expectation of smooth, easily accessible and efficient government services.
Using dedicated websites, web applications, and other APIs, governments have created a way of
interacting with the citizens and delivering services in a much more efficient and secure way than
before. In the United States, there are laws that govern the dissemination of information to people
through websites and other forms of digital services. These include connected government Act
which was put in place in January 2018 and provides for mobile-friendly government websites.
Similarly, the Government Paperwork Elimination Act of 1998 was enacted so as to allow citizens
to transact with the government electronically and also to allow the federal agencies to store data
and maintain the collected data electronically (Bonitto, 2018).
Case study: Consumerfinance.gov website
This United States agency website deals with ensuring financial fairness to the citizens. On
the home page of this w...

flag Report DMCA
Review

Anonymous
Excellent job

Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors