Description
Examine the “Core Skills for Success..Analyze the primary manner in which these skills aid IT professionals when an organization must implement information system changes.examples of an IT professional’s application core
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Thank you for the opportunity to help you with your question!
The design and deployment of computers and computer systems is generally
considered the province of disciplines other than computer science.
Completion Status:
100%
Review
Review
Anonymous
Great content here. Definitely a returning customer.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
4 pages
Classification Of Concepts
There are various types of classifiers which include logistic regression, naïve Bayes, knearest neighbors, decision trees ...
Classification Of Concepts
There are various types of classifiers which include logistic regression, naïve Bayes, knearest neighbors, decision trees, and support vector ...
TSM 320 Carolinas College Number of Satellites in the GEO Systems Exam Practice
The manner in which a wireless signal move is often referred to as ………………………………… behavior .When ...
TSM 320 Carolinas College Number of Satellites in the GEO Systems Exam Practice
The manner in which a wireless signal move is often referred to as ………………………………… behavior .When a wave hits an object that is bigger than its wavelength the wave may bounce in different direction and this is called ………………………………..Antennas are active element and have gain such as OpAmp. T FDirectivity of antennas are based on the gain of antennas. T FActive gain is related to antennas and passive gains are related to amplifier. T F Multipath can degrade the strength and quality of the received signal and even cause corruption or cancelled signals due to the effect of different spreading delay of received signal. T FWhen it comes to degradation of signal in its propagation path the inverse square law is applied. This law states that the change in power of a signal is equal to 1 divided by the square of the change in
4 pages
Issc341 Discussion Virtual Lans
Discuss how and why a network engineer would want to implement Virtual LANs in their To begin with, a Virtual Local Area N ...
Issc341 Discussion Virtual Lans
Discuss how and why a network engineer would want to implement Virtual LANs in their To begin with, a Virtual Local Area Network (VLAN) is basically a ...
CSIA 360 UMUC WEEK 2 Project 2: Securing Digital Government
Project #2: Securing Digital Government Services
For this paper, you will research potential and existing security issues ...
CSIA 360 UMUC WEEK 2 Project 2: Securing Digital Government
Project #2: Securing Digital Government Services
For this paper, you will research potential and existing security issues affecting digital government websites. Government websites enable customers to enroll in programs and services, check the status of benefits, and receive information about the federal government’s activities. Your audience for this research report is the Chief Information Officer for a small federal agency who asked for assistance in developing a risk assessment and risk mitigation strategy for the agency’s digital government websites.
Note: this research report is separate from the report you previously prepared about OPEN data and may not reuse information from that report. This paper must address other types of government services. See Table 1 for the list of websites to use in your research.
For this report, you should begin by reviewing three or more specific digital government websites (from the list provided in Table 1) to determine:
(a)the types of information provided by the websites
(b)the types of services provided by the websites
(c)security issues which could impact the delivery of digital government services by the websites
After you have reviewed these websites, review the Federal Cybersecurity Risk Determination Report and Action Plan https://www.whitehouse.gov/wp-content/uploads/2018/05/Cybersecurity-Risk-Determination-Report-FINAL_May-2018-Release.pdf
to identify additional sources of risk that the agency must be aware of and should address in its planning. You should also review Executive Order 13800 Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/
Table 1. List of Digital Government Websites
Base URLs
BENEFITS.GOV
CANCER.GOV
CONSUMERFINANCE.GOV
DATA.GOV
DIGITALGOV.GOV
DISASTERASSISTANCE.GOV
FOODSAFETY.GOV
GRANTS.GOV
HEALTHCARE.GOV
HEALTHFINDER.GOV
MEDICARE.GOV
READY.GOV
RECREATION.GOV
REGULATIONS.GOV
RESEARCH.GOV
SAFERCAR.GOV
SERVE.GOV
STOPFAKES.GOV
USA.GOV
VOLUNTEER.GOV
Research:
Read / Review the Weekly readings
Research three or more attacks that could compromise the security of a Digital Government Website that uses Web Applications, a Web Server, and a Database Server. Here are some sources to get you started:
Web Applications Architectures and Security (in the Week 3 content module).
Cyber Vandalism -- https://www.digitalgov.gov/resources/readiness-recovery-response-social-media-cyber-vandalism-toolkit/
Cybersecurity: Actions needed to address challenges facing federal systems (GAO 15-573T) http://www.gao.gov/assets/670/669810.pdf
Review three or more websites that deliver digital government services (select from those listed in Table 1). What types of information or services are available via these websites? What population do these websites serve (who is in the intended audience for each website)?
As part of your Digital Government websites review, determine the types and sensitivity of information collected, displayed, processed, and stored by the Web applications that implement the Digital Government services.
See http://www.digitalgov.gov/resources/checklist-of-requirements-for-federal-digital-services/ for general security and privacy requirements.
See FIPS 199
for additional guidance on determining the sensitivity level of a Federal IT system. (See the section on public websites.)
Using FIPS 200, the NIST Cybersecurity Framework, and NIST SP 800-53, research the general types of security controls required by IT systems hosting the Digital Government service that you reviewed.
FIPS 200 https://doi.org/10.6028/NIST.FIPS.200
NIST Cybersecurity Framework https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
NIST SP 800-53 https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-53r4.pdf
Find three or more additional sources that provide information about best practice recommendations for ensuring the security of the Web Applications used to deliver Digital Government information and services. These additional sources can include analyst reports and/or news stories about recent attacks/threats, data breaches, cybercrime, cyber terrorism, etc. that impacted the security of digital government services.
What types of information or services are available via your selected Websites?
What populations do the websites serve (who is the intended audience)?
What sensitivity level are applicable to each Website (use FIPS 199 criteria).
What security issues did you observe during your review?
Write:
Write a five- to seven-page summary of your research. At a minimum, your summary must include the following:
1.An introduction or overview of digital government that provides definitions and addresses the laws, regulations, and policies that require federal agencies to provide information and services via the Web. This introduction should be suitable for an executive audience.
2.An overview of the information and services provided by the digital government Websites that you reviewed. Answer the following questions:
3.A separate section that addresses the architectures and security issues inherent in the use of Web applications when used to deliver the services provided by your selected digital government Website. Include 5 or more examples of security issues and address how these issues contribute to increased risk.
4.A separate section that includes recommendations for best practices for ensuring Web application security during the design, implementation, and operation of digital government websites. Include five or more best practice recommendations in your recommendations. (Hint: at least one of your recommendations should address use of the NIST Cybersecurity Framework. Another recommendation should address use of NIST SP 800-53 controls for ensuring security and privacy.)
5.A closing section in which you summarize your research and your recommendations.
3 pages
Storage Virtualization
allows for secure backup, archive, and recovery of data to SAN because it contains unique protocols such as to worry about ...
Storage Virtualization
allows for secure backup, archive, and recovery of data to SAN because it contains unique protocols such as to worry about the location of their data ...
University of California Irvine Art History Multiple Choice Questions
the instructions for the assignment and template are in the following files. The word doc contains the instructions.
University of California Irvine Art History Multiple Choice Questions
the instructions for the assignment and template are in the following files. The word doc contains the instructions.
Similar Content
What is the best programming laguage for Windows? Computer science help
best programming language when doing windows programming...
The Burden of Tobacco use in the US Presentation
Task: Develop a professional informational or decisional presentation (PowerPoint) on any subject of your choice. Deliver...
ITS 632 University of Cumberlands Data Exploration Discussion
Data exploration precedes data analysis and begins with a review of a large data set (often unstructured) to uncover initi...
University of Florida Computer Science Paper
my assignment is writing paper about cloud computing...
University of The Cumberlands Information Systems Case Study
Case Study
Introduction
The growth and explosion of the internet has led to a global market place.Companies can sell produ...
Campbellsville University Mobile Computing and Its Business Implication Paper
Explain the following topic - Mobile computing and its business implications
...
Final Penetration Test Proposal.docx
The rise of emerging technology and data processing has resulted in many organizations investing and consistently deployin...
E411 Cyber Security Presentation
Overwhelming the endpoints with traffic to disrupt IoT functionality Virtual location where users have virtual storage to ...
Excercises
1. What rate will be assigned to the rate variable when the user enters the following codes: The command that assigns the ...
Related Tags
Book Guides
Normal People
by Sally Rooney
Mrs Dalloway
by Virginia Woolf
The Tipping Point
by Malcolm Gladwell
Cant Hurt Me - Master Your Mind and Defy the Odds
by David Goggins
Siddhartha
by Hermann Hesse
The Girl With The Dragon Tattoo
by Stieg Larsson
Nervous Conditions
by Tsitsi Dangarembga
The BFG
by Roald Dahl
All the Kings Men
by Robert Penn Warren
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
4 pages
Classification Of Concepts
There are various types of classifiers which include logistic regression, naïve Bayes, knearest neighbors, decision trees ...
Classification Of Concepts
There are various types of classifiers which include logistic regression, naïve Bayes, knearest neighbors, decision trees, and support vector ...
TSM 320 Carolinas College Number of Satellites in the GEO Systems Exam Practice
The manner in which a wireless signal move is often referred to as ………………………………… behavior .When ...
TSM 320 Carolinas College Number of Satellites in the GEO Systems Exam Practice
The manner in which a wireless signal move is often referred to as ………………………………… behavior .When a wave hits an object that is bigger than its wavelength the wave may bounce in different direction and this is called ………………………………..Antennas are active element and have gain such as OpAmp. T FDirectivity of antennas are based on the gain of antennas. T FActive gain is related to antennas and passive gains are related to amplifier. T F Multipath can degrade the strength and quality of the received signal and even cause corruption or cancelled signals due to the effect of different spreading delay of received signal. T FWhen it comes to degradation of signal in its propagation path the inverse square law is applied. This law states that the change in power of a signal is equal to 1 divided by the square of the change in
4 pages
Issc341 Discussion Virtual Lans
Discuss how and why a network engineer would want to implement Virtual LANs in their To begin with, a Virtual Local Area N ...
Issc341 Discussion Virtual Lans
Discuss how and why a network engineer would want to implement Virtual LANs in their To begin with, a Virtual Local Area Network (VLAN) is basically a ...
CSIA 360 UMUC WEEK 2 Project 2: Securing Digital Government
Project #2: Securing Digital Government Services
For this paper, you will research potential and existing security issues ...
CSIA 360 UMUC WEEK 2 Project 2: Securing Digital Government
Project #2: Securing Digital Government Services
For this paper, you will research potential and existing security issues affecting digital government websites. Government websites enable customers to enroll in programs and services, check the status of benefits, and receive information about the federal government’s activities. Your audience for this research report is the Chief Information Officer for a small federal agency who asked for assistance in developing a risk assessment and risk mitigation strategy for the agency’s digital government websites.
Note: this research report is separate from the report you previously prepared about OPEN data and may not reuse information from that report. This paper must address other types of government services. See Table 1 for the list of websites to use in your research.
For this report, you should begin by reviewing three or more specific digital government websites (from the list provided in Table 1) to determine:
(a)the types of information provided by the websites
(b)the types of services provided by the websites
(c)security issues which could impact the delivery of digital government services by the websites
After you have reviewed these websites, review the Federal Cybersecurity Risk Determination Report and Action Plan https://www.whitehouse.gov/wp-content/uploads/2018/05/Cybersecurity-Risk-Determination-Report-FINAL_May-2018-Release.pdf
to identify additional sources of risk that the agency must be aware of and should address in its planning. You should also review Executive Order 13800 Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/
Table 1. List of Digital Government Websites
Base URLs
BENEFITS.GOV
CANCER.GOV
CONSUMERFINANCE.GOV
DATA.GOV
DIGITALGOV.GOV
DISASTERASSISTANCE.GOV
FOODSAFETY.GOV
GRANTS.GOV
HEALTHCARE.GOV
HEALTHFINDER.GOV
MEDICARE.GOV
READY.GOV
RECREATION.GOV
REGULATIONS.GOV
RESEARCH.GOV
SAFERCAR.GOV
SERVE.GOV
STOPFAKES.GOV
USA.GOV
VOLUNTEER.GOV
Research:
Read / Review the Weekly readings
Research three or more attacks that could compromise the security of a Digital Government Website that uses Web Applications, a Web Server, and a Database Server. Here are some sources to get you started:
Web Applications Architectures and Security (in the Week 3 content module).
Cyber Vandalism -- https://www.digitalgov.gov/resources/readiness-recovery-response-social-media-cyber-vandalism-toolkit/
Cybersecurity: Actions needed to address challenges facing federal systems (GAO 15-573T) http://www.gao.gov/assets/670/669810.pdf
Review three or more websites that deliver digital government services (select from those listed in Table 1). What types of information or services are available via these websites? What population do these websites serve (who is in the intended audience for each website)?
As part of your Digital Government websites review, determine the types and sensitivity of information collected, displayed, processed, and stored by the Web applications that implement the Digital Government services.
See http://www.digitalgov.gov/resources/checklist-of-requirements-for-federal-digital-services/ for general security and privacy requirements.
See FIPS 199
for additional guidance on determining the sensitivity level of a Federal IT system. (See the section on public websites.)
Using FIPS 200, the NIST Cybersecurity Framework, and NIST SP 800-53, research the general types of security controls required by IT systems hosting the Digital Government service that you reviewed.
FIPS 200 https://doi.org/10.6028/NIST.FIPS.200
NIST Cybersecurity Framework https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
NIST SP 800-53 https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-53r4.pdf
Find three or more additional sources that provide information about best practice recommendations for ensuring the security of the Web Applications used to deliver Digital Government information and services. These additional sources can include analyst reports and/or news stories about recent attacks/threats, data breaches, cybercrime, cyber terrorism, etc. that impacted the security of digital government services.
What types of information or services are available via your selected Websites?
What populations do the websites serve (who is the intended audience)?
What sensitivity level are applicable to each Website (use FIPS 199 criteria).
What security issues did you observe during your review?
Write:
Write a five- to seven-page summary of your research. At a minimum, your summary must include the following:
1.An introduction or overview of digital government that provides definitions and addresses the laws, regulations, and policies that require federal agencies to provide information and services via the Web. This introduction should be suitable for an executive audience.
2.An overview of the information and services provided by the digital government Websites that you reviewed. Answer the following questions:
3.A separate section that addresses the architectures and security issues inherent in the use of Web applications when used to deliver the services provided by your selected digital government Website. Include 5 or more examples of security issues and address how these issues contribute to increased risk.
4.A separate section that includes recommendations for best practices for ensuring Web application security during the design, implementation, and operation of digital government websites. Include five or more best practice recommendations in your recommendations. (Hint: at least one of your recommendations should address use of the NIST Cybersecurity Framework. Another recommendation should address use of NIST SP 800-53 controls for ensuring security and privacy.)
5.A closing section in which you summarize your research and your recommendations.
3 pages
Storage Virtualization
allows for secure backup, archive, and recovery of data to SAN because it contains unique protocols such as to worry about ...
Storage Virtualization
allows for secure backup, archive, and recovery of data to SAN because it contains unique protocols such as to worry about the location of their data ...
University of California Irvine Art History Multiple Choice Questions
the instructions for the assignment and template are in the following files. The word doc contains the instructions.
University of California Irvine Art History Multiple Choice Questions
the instructions for the assignment and template are in the following files. The word doc contains the instructions.
Earn money selling
your Study Documents