Description
Question A
- Research 4 different four information security certifications.
- Outline how each may help or hinder the personnel and their careers.
- Select one that you desire and justify your answer.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Just what I was looking for! Super helpful.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
ENG 3105 BU Why It Is Important to Know Your Audience when Writing a Business Document Essay
Here is the description for Project 1: Business Letter. For your convenience, I have also attached an assessment chart fo ...
ENG 3105 BU Why It Is Important to Know Your Audience when Writing a Business Document Essay
Here is the description for Project 1: Business Letter. For your convenience, I have also attached an assessment chart for you. Use it to review your work prior to sending in its final draft.ENG Final Draft Business Letter Submission Deadline:Final Draft Setup Requirement: Polished, properly formatted, one-page letter Single-spaced 11 or 12-point Times New Roman fontWHAT: Write a 1-page business letter appropriate for the professional workplace.HOW: The business letter will be addressed to a classmate and will capture the classmate’s attention; describe (briefly) the steps of process writing; present a persuasive argument to motivate the classmate to use steps in process writing indevelopment of his/her written assignments throughout the semester; demonstrate your knowledge of process writing, your ability to craft a professional letter, andyour skill at persuading a reader to action.WHY: This assignment strengthens your ability to analyze, synthesize, and evaluate main ideas inproduction of a common communication document. It demonstrates writing as a process thatrequires substantive revision, and it promotes communication skills aimed at a specific audienceabout a particular subject for a defined purpose while advancing your understanding of yourstrengths as a writer of persuasive business materials.
Phase 2 Draft Assignment
Phase 2 Draft Plan (Group) AssignmentThis is the second assignment of the phased group activity. The objective is to devel ...
Phase 2 Draft Assignment
Phase 2 Draft Plan (Group) AssignmentThis is the second assignment of the phased group activity. The objective is to develop a draft BC/DR Plan according to researched industry standards and best practices. Please use the detailed template provided as a separate attachment as an outline. Each group will complete all components of the assignment by the due date indicated in the syllabus schedule. Since this is a draft, you may only have some preliminary data in several sections. This is fine with the expectations that you will be maturing these sections. However, please strive to arrive at some preliminary information for each section. There are five primary (or high level) sections to this draft plan that is detailed in the rubric:Draft plan purpose and invoking the plan (sections 1-11 in template)Response Scenarios (to map to risk area of your 1st group assignment) – Sections 12-20 in templateDraft plan review and maintenance, diagrams and plan checklist (Sections 13-15 in template)Incident notification, COAs, and damage assessment (Sections 16-19 in template)Business recovery phase & Appendix (Sections 20-21 in template with Appendix)Please complete all areas of the plan realizing that you will be maturing these sections as you proceed through the course. Always keep in mind the business scenario (OptiPress) and your group risk assessment exercise to complete the sections of the plan. You can tailor each of the sections as you deem appropriate. Important: Because this is a draft plan, you need not provide graphics (i.e., charts, measures) or references. However, you do need to provide at least a preliminary outline of your flow diagrams for Section 14. These are not expected to be mature at this point, but there should be a basic set of diagrams provided. Any additional graphics, charts or measures you wish to provide should be included with your final product in phase 4. Weekly conference discussions will highlight concepts related to incident-response handing, disaster-recovery planning, and business continuity planning and processes.Please stay aligned to the sections. However, you may include a discussion of later technologies that may reside in the template. One example is section 11 – Emergency management standards. The Tape retention policies may be dated (or still appropriate for use). You can refresh this section as appropriate to address how OptiPress would address this policy. Assignment Consideration:1.Please ensure that the draft plan incorporates the key elements identified in Phase 1 (except for graphs and references), complete with mitigation strategies demonstrating an understanding of course concepts, analysis and critical thinking.2.Ensure that the draft plan contains response scenarios that align well with identified risks. 3.Ensure that your paper is well organized and presented in a professional format. Grading Rubric:The following grading rubric applies:
5 pages
Closure Of A Set Of Functional Dependencies
What is meant by the closure of a set of functional dependencies? What is meant by the closure of a set of functional depe ...
Closure Of A Set Of Functional Dependencies
What is meant by the closure of a set of functional dependencies? What is meant by the closure of a set of functional dependencies?
OPEN Data: How can we ensure that Open Data is useful AND secure?
Scenario:
A federal agency has asked your cybersecurity
consulting firm to provide it with a white paper that discusses ...
OPEN Data: How can we ensure that Open Data is useful AND secure?
Scenario:
A federal agency has asked your cybersecurity
consulting firm to provide it with a white paper that discusses the issues of
usefulness and security in regards to Open Data. The white paper is intended
for a group of executives at the agency who are opposed to the planned
conversion of its current controlled distribution for several highly valuable
and frequently requested datasets (DVDs purchased through the Government
Printing Office) to OPEN Data
distribution via the government’s Data.Gov portal (website). Currently, these
data sets are purchased by businesses and academic institutions and are used
for a variety of purposes.
A customer satisfaction survey revealed that purchasers
are willing to change over to the new Open
Data distribution method for data sets. But, the agency head has received
phone calls from several large and politically well-connected customers who
expressed concerns about potential issues with the integrity and authenticity
of downloaded data. The agency’s executives were also surveyed and they
provided the following security-related items in a list of concerns for the
planned conversion to an Open Data
delivery method:
a. Confidentiality / Privacy (ensuring proper redaction)
b. Data
integrity
c. Data
authenticity
d. Availability
(reliability) of the Open Data service (website)
e. Non-repudiation
of data sets
Research:
1.
Read / Review the weekly readings.
2.
Research the federal government’s OPEN Data mandate. Here are some sources
that you may find useful:
a.
https://www.whitehouse.gov/sites/default/files/omb/memoranda/2013/m-13-13.pdf
(includes significant discussion of security issues and policy solutions
including references to FIPS 199 and NIST SP-800-53)
b.
https://www.whitehouse.gov/sites/default/files/microsites/ostp/us_open_data_action_plan.pdf
c.
http://www.data.gov
d.
http://www.data.gov/data-policy
e.
https://www.whitehouse.gov/sites/default/files/omb/memoranda/2014/m-14-06.pdf
f.
3.
Research how government information, e.g. OPEN Data, is used by businesses and the
general public. Here are some sources to get you started:a.
7
Ways Companies Are Using the Government's Open Data http://mashable.com/2013/05/30/7-ways-government-open-data/
b.
Government
open data proves a treasure trove for savvy businesses http://www.computerworld.com/article/2488683/business-intelligence-government-open-data-proves-a-treasure-trove-for-savvy-businesses.html
c.
Open data:
Unlocking innovation and performance with liquid information http://www.mckinsey.com/insights/business_technology/open_data_unlocking_innovation_and_performance_with_liquid_information
2. Research
the issues that can arise when businesses depend upon the confidentiality, integrity, availability, authenticity, and non-repudiation of government provided Open Data. Suggested sources include:
a. Authenticating Digital Government
Information http://scholarship.richmond.edu/cgi/viewcontent.cgi?article=1954&context=law-faculty-publications
b. Legal and Institutional Challenges for
Opening Data Across Public Sectors http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=iih&AN=97430297&site=eds-live&scope=site
c. Risk Analysis to Overcome Barriers to Open
Data http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=poh&AN=93550378&site=eds-live&scope=site
d. Reconciling Contradictions of Open Data
Regarding Transparency, Privacy, Security and Trust http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=iih&AN=97430299&site=eds-live&scope=site
3. Find
five or more best practice recommendations for ensuring the security
(confidentiality, integrity, availability, authenticity, non-repudiation) of
information provided by the federal government through its OPEN Data
initiative. N.B. For the purposes of
this assignment, you may treat “licensing” concerns as an “availability” issue.
Write:
Write a five (5) to eight
(8) page summary of your research. You should focus upon clarity and
conciseness more than length when determining what content to include in your
paper. At a minimum, your summary must include the following:
1. An
introduction or overview of OPEN Data which
provides definitions and addresses the laws, regulations, and policies which
require federal agencies to identify and publish datasets and information
collections. Discuss the role of the executive branch’s Open Data / Open Government policies in making data available via
Data.Gov. This introduction should be suitable for an executive audience.a.
7
Ways Companies Are Using the Government's Open Data http://mashable.com/2013/05/30/7-ways-government-open-data/
b.
Government
open data proves a treasure trove for savvy businesses http://www.computerworld.com/article/2488683/business-intelligence-government-open-data-proves-a-treasure-trove-for-savvy-businesses.html
c.
Open data:
Unlocking innovation and performance with liquid information http://www.mckinsey.com/insights/business_technology/open_data_unlocking_innovation_and_performance_with_liquid_information
2. Research
the issues that can arise when businesses depend upon the confidentiality, integrity, availability, authenticity, and non-repudiation of government provided Open Data. Suggested sources include:
a. Authenticating Digital Government
Information http://scholarship.richmond.edu/cgi/viewcontent.cgi?article=1954&context=law-faculty-publications
b. Legal and Institutional Challenges for
Opening Data Across Public Sectors http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=iih&AN=97430297&site=eds-live&scope=site
c. Risk Analysis to Overcome Barriers to Open
Data http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=poh&AN=93550378&site=eds-live&scope=site
d. Reconciling Contradictions of Open Data
Regarding Transparency, Privacy, Security and Trust http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=iih&AN=97430299&site=eds-live&scope=site
3. Find
five or more best practice recommendations for ensuring the security
(confidentiality, integrity, availability, authenticity, non-repudiation) of
information provided by the federal government through its OPEN Data
initiative. N.B. For the purposes of
this assignment, you may treat “licensing” concerns as an “availability” issue.
Write:
Write a five (5) to eight
(8) page summary of your research. You should focus upon clarity and
conciseness more than length when determining what content to include in your
paper. At a minimum, your summary must include the following:
1. An
introduction or overview of OPEN Data which
provides definitions and addresses the laws, regulations, and policies which
require federal agencies to identify and publish datasets and information
collections. Discuss the role of the executive branch’s Open Data / Open Government policies in making data available via
Data.Gov. This introduction should be suitable for an executive audience.1. A
separate section in which you discuss the value (benefits) of Open Data. This section should provide several
specific examples of how government provided Open Data is being used by businesses and the general public.
2. A
separate section in which you address security issues (confidentiality,
integrity, availability, authenticity, and non-repudiation ) which can impact
the usefulness of Open Data and how these
issues are currently being addressed by the federal policies and plans for Open Data. Again, you should provide
examples of issues and mitigations or solutions.
3.
A section in which you address best practice recommendations for
ensuring the confidentiality, integrity, availability, authenticity, and
non-repudiation of Open Data.
Submit For Grading
1. Submit
your white paper in MS Word format (.docx or .doc file) using the OPEN Data
Assignment in your assignment folder. (Attach the file.)
2. You
must also submit your white paper to TurnItIn before the due date for this
assignment.
Additional Information
1. Your
white paper should use standard terms and definitions for cybersecurity
concepts. The following sources are recommended:
a. NICCS
Glossary http://niccs.us-cert.gov/glossary
b. Guidelines on Security and Privacy in Public
Cloud Computing http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf
2. You
are expected to credit your sources using in-text citations and reference list
entries. Both your citations and your reference list entries must comply with
APA 6th edition Style requirements. Failure to credit your sources will result
in penalties as provided for under the university’s Academic Integrity policy.
3. Use
APA 6th edition style (formatting) for the organization and
appearance of the MS Word document that you submit to your assignment folder. This
includes margins, section headings, and consistent use of fonts (Times New
Roman 12 in black), paragraph styles (first line indent by ½ inch), and line
spacing (double). Formatting requirements and examples are found under Course Resources
> APA Resources. Your file should contain both a title page and a separate
References page. Use page breaks to ensure that the title page and references
page are separate from the body of the paper.
4. You
are expected to write grammatically correct English in every assignment that
you submit for grading. Do not turn in any work without (a) using spell check,
(b) using grammar check, (c) verifying that your punctuation is correct and (d)
reviewing your work for correct word usage and correctly structured sentences
and paragraphs. These items are graded under Professionalism and constitute 15%
of the assignment grade.
Computer Science Question
QUESTION 45During which phase of the COBIT ISS management life cycle do you review how you are going to manage your IT inv ...
Computer Science Question
QUESTION 45During which phase of the COBIT ISS management life cycle do you review how you are going to manage your IT investment such as contracts, service level agreements (SLAs), and new policy ideas?Plan and OrganizeAcquire and ImplementDeliver and SupportMonitor and Evaluate2 points QUESTION 46What is the primary goal of business process reengineering?To implement an enterprise resource systemTo determine management bonusesTo improve business processesTo develop new security policies
6 pages
Cmit495 Assignment 2
CMIT 495 Current Trends and Projects in Computer Networks and Security Login to your newly created AWS account and take a ...
Cmit495 Assignment 2
CMIT 495 Current Trends and Projects in Computer Networks and Security Login to your newly created AWS account and take a screen capture of the ...
Similar Content
ISOL 634 University of The Cumberlands Advantages of Using Layers of Protection Analysis
Explain the advantages of using Layers of Protection Analysis (LOPA). What are the potential disadvantages? What would you...
NECBF Business Global Strategy Question Case Study
This week, you have read about entrepreneurship in a global economy. For your written assignment this week, complete a cas...
Follow the steps please !
1. I need you to write my in 10-12 minute presentation that I car record . That's < 3 minutes per person. The topic is ...
android platform help
Provide this answer promptly....
Python assignment
Program assignment Python...
CS 652 Colorado Technical University Amazon Operating Systems Security Paper
New Content: Secure CommunicationsCommunications SummarySummarize each of the major types of computer communications used ...
214578 2
1. Define and provide an example of Rule Coverage and Accuracy Coverage of a rule: refers to the portion (or fraction) of ...
Law.edited 1
As a digital forensics investigator, I am well qualified to give this testimony to this honorable court. First, I am well-...
Mike 1
File name: F007_Discussion_Question_2_Addition.edited.docx (18.38K)...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
ENG 3105 BU Why It Is Important to Know Your Audience when Writing a Business Document Essay
Here is the description for Project 1: Business Letter. For your convenience, I have also attached an assessment chart fo ...
ENG 3105 BU Why It Is Important to Know Your Audience when Writing a Business Document Essay
Here is the description for Project 1: Business Letter. For your convenience, I have also attached an assessment chart for you. Use it to review your work prior to sending in its final draft.ENG Final Draft Business Letter Submission Deadline:Final Draft Setup Requirement: Polished, properly formatted, one-page letter Single-spaced 11 or 12-point Times New Roman fontWHAT: Write a 1-page business letter appropriate for the professional workplace.HOW: The business letter will be addressed to a classmate and will capture the classmate’s attention; describe (briefly) the steps of process writing; present a persuasive argument to motivate the classmate to use steps in process writing indevelopment of his/her written assignments throughout the semester; demonstrate your knowledge of process writing, your ability to craft a professional letter, andyour skill at persuading a reader to action.WHY: This assignment strengthens your ability to analyze, synthesize, and evaluate main ideas inproduction of a common communication document. It demonstrates writing as a process thatrequires substantive revision, and it promotes communication skills aimed at a specific audienceabout a particular subject for a defined purpose while advancing your understanding of yourstrengths as a writer of persuasive business materials.
Phase 2 Draft Assignment
Phase 2 Draft Plan (Group) AssignmentThis is the second assignment of the phased group activity. The objective is to devel ...
Phase 2 Draft Assignment
Phase 2 Draft Plan (Group) AssignmentThis is the second assignment of the phased group activity. The objective is to develop a draft BC/DR Plan according to researched industry standards and best practices. Please use the detailed template provided as a separate attachment as an outline. Each group will complete all components of the assignment by the due date indicated in the syllabus schedule. Since this is a draft, you may only have some preliminary data in several sections. This is fine with the expectations that you will be maturing these sections. However, please strive to arrive at some preliminary information for each section. There are five primary (or high level) sections to this draft plan that is detailed in the rubric:Draft plan purpose and invoking the plan (sections 1-11 in template)Response Scenarios (to map to risk area of your 1st group assignment) – Sections 12-20 in templateDraft plan review and maintenance, diagrams and plan checklist (Sections 13-15 in template)Incident notification, COAs, and damage assessment (Sections 16-19 in template)Business recovery phase & Appendix (Sections 20-21 in template with Appendix)Please complete all areas of the plan realizing that you will be maturing these sections as you proceed through the course. Always keep in mind the business scenario (OptiPress) and your group risk assessment exercise to complete the sections of the plan. You can tailor each of the sections as you deem appropriate. Important: Because this is a draft plan, you need not provide graphics (i.e., charts, measures) or references. However, you do need to provide at least a preliminary outline of your flow diagrams for Section 14. These are not expected to be mature at this point, but there should be a basic set of diagrams provided. Any additional graphics, charts or measures you wish to provide should be included with your final product in phase 4. Weekly conference discussions will highlight concepts related to incident-response handing, disaster-recovery planning, and business continuity planning and processes.Please stay aligned to the sections. However, you may include a discussion of later technologies that may reside in the template. One example is section 11 – Emergency management standards. The Tape retention policies may be dated (or still appropriate for use). You can refresh this section as appropriate to address how OptiPress would address this policy. Assignment Consideration:1.Please ensure that the draft plan incorporates the key elements identified in Phase 1 (except for graphs and references), complete with mitigation strategies demonstrating an understanding of course concepts, analysis and critical thinking.2.Ensure that the draft plan contains response scenarios that align well with identified risks. 3.Ensure that your paper is well organized and presented in a professional format. Grading Rubric:The following grading rubric applies:
5 pages
Closure Of A Set Of Functional Dependencies
What is meant by the closure of a set of functional dependencies? What is meant by the closure of a set of functional depe ...
Closure Of A Set Of Functional Dependencies
What is meant by the closure of a set of functional dependencies? What is meant by the closure of a set of functional dependencies?
OPEN Data: How can we ensure that Open Data is useful AND secure?
Scenario:
A federal agency has asked your cybersecurity
consulting firm to provide it with a white paper that discusses ...
OPEN Data: How can we ensure that Open Data is useful AND secure?
Scenario:
A federal agency has asked your cybersecurity
consulting firm to provide it with a white paper that discusses the issues of
usefulness and security in regards to Open Data. The white paper is intended
for a group of executives at the agency who are opposed to the planned
conversion of its current controlled distribution for several highly valuable
and frequently requested datasets (DVDs purchased through the Government
Printing Office) to OPEN Data
distribution via the government’s Data.Gov portal (website). Currently, these
data sets are purchased by businesses and academic institutions and are used
for a variety of purposes.
A customer satisfaction survey revealed that purchasers
are willing to change over to the new Open
Data distribution method for data sets. But, the agency head has received
phone calls from several large and politically well-connected customers who
expressed concerns about potential issues with the integrity and authenticity
of downloaded data. The agency’s executives were also surveyed and they
provided the following security-related items in a list of concerns for the
planned conversion to an Open Data
delivery method:
a. Confidentiality / Privacy (ensuring proper redaction)
b. Data
integrity
c. Data
authenticity
d. Availability
(reliability) of the Open Data service (website)
e. Non-repudiation
of data sets
Research:
1.
Read / Review the weekly readings.
2.
Research the federal government’s OPEN Data mandate. Here are some sources
that you may find useful:
a.
https://www.whitehouse.gov/sites/default/files/omb/memoranda/2013/m-13-13.pdf
(includes significant discussion of security issues and policy solutions
including references to FIPS 199 and NIST SP-800-53)
b.
https://www.whitehouse.gov/sites/default/files/microsites/ostp/us_open_data_action_plan.pdf
c.
http://www.data.gov
d.
http://www.data.gov/data-policy
e.
https://www.whitehouse.gov/sites/default/files/omb/memoranda/2014/m-14-06.pdf
f.
3.
Research how government information, e.g. OPEN Data, is used by businesses and the
general public. Here are some sources to get you started:a.
7
Ways Companies Are Using the Government's Open Data http://mashable.com/2013/05/30/7-ways-government-open-data/
b.
Government
open data proves a treasure trove for savvy businesses http://www.computerworld.com/article/2488683/business-intelligence-government-open-data-proves-a-treasure-trove-for-savvy-businesses.html
c.
Open data:
Unlocking innovation and performance with liquid information http://www.mckinsey.com/insights/business_technology/open_data_unlocking_innovation_and_performance_with_liquid_information
2. Research
the issues that can arise when businesses depend upon the confidentiality, integrity, availability, authenticity, and non-repudiation of government provided Open Data. Suggested sources include:
a. Authenticating Digital Government
Information http://scholarship.richmond.edu/cgi/viewcontent.cgi?article=1954&context=law-faculty-publications
b. Legal and Institutional Challenges for
Opening Data Across Public Sectors http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=iih&AN=97430297&site=eds-live&scope=site
c. Risk Analysis to Overcome Barriers to Open
Data http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=poh&AN=93550378&site=eds-live&scope=site
d. Reconciling Contradictions of Open Data
Regarding Transparency, Privacy, Security and Trust http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=iih&AN=97430299&site=eds-live&scope=site
3. Find
five or more best practice recommendations for ensuring the security
(confidentiality, integrity, availability, authenticity, non-repudiation) of
information provided by the federal government through its OPEN Data
initiative. N.B. For the purposes of
this assignment, you may treat “licensing” concerns as an “availability” issue.
Write:
Write a five (5) to eight
(8) page summary of your research. You should focus upon clarity and
conciseness more than length when determining what content to include in your
paper. At a minimum, your summary must include the following:
1. An
introduction or overview of OPEN Data which
provides definitions and addresses the laws, regulations, and policies which
require federal agencies to identify and publish datasets and information
collections. Discuss the role of the executive branch’s Open Data / Open Government policies in making data available via
Data.Gov. This introduction should be suitable for an executive audience.a.
7
Ways Companies Are Using the Government's Open Data http://mashable.com/2013/05/30/7-ways-government-open-data/
b.
Government
open data proves a treasure trove for savvy businesses http://www.computerworld.com/article/2488683/business-intelligence-government-open-data-proves-a-treasure-trove-for-savvy-businesses.html
c.
Open data:
Unlocking innovation and performance with liquid information http://www.mckinsey.com/insights/business_technology/open_data_unlocking_innovation_and_performance_with_liquid_information
2. Research
the issues that can arise when businesses depend upon the confidentiality, integrity, availability, authenticity, and non-repudiation of government provided Open Data. Suggested sources include:
a. Authenticating Digital Government
Information http://scholarship.richmond.edu/cgi/viewcontent.cgi?article=1954&context=law-faculty-publications
b. Legal and Institutional Challenges for
Opening Data Across Public Sectors http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=iih&AN=97430297&site=eds-live&scope=site
c. Risk Analysis to Overcome Barriers to Open
Data http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=poh&AN=93550378&site=eds-live&scope=site
d. Reconciling Contradictions of Open Data
Regarding Transparency, Privacy, Security and Trust http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=iih&AN=97430299&site=eds-live&scope=site
3. Find
five or more best practice recommendations for ensuring the security
(confidentiality, integrity, availability, authenticity, non-repudiation) of
information provided by the federal government through its OPEN Data
initiative. N.B. For the purposes of
this assignment, you may treat “licensing” concerns as an “availability” issue.
Write:
Write a five (5) to eight
(8) page summary of your research. You should focus upon clarity and
conciseness more than length when determining what content to include in your
paper. At a minimum, your summary must include the following:
1. An
introduction or overview of OPEN Data which
provides definitions and addresses the laws, regulations, and policies which
require federal agencies to identify and publish datasets and information
collections. Discuss the role of the executive branch’s Open Data / Open Government policies in making data available via
Data.Gov. This introduction should be suitable for an executive audience.1. A
separate section in which you discuss the value (benefits) of Open Data. This section should provide several
specific examples of how government provided Open Data is being used by businesses and the general public.
2. A
separate section in which you address security issues (confidentiality,
integrity, availability, authenticity, and non-repudiation ) which can impact
the usefulness of Open Data and how these
issues are currently being addressed by the federal policies and plans for Open Data. Again, you should provide
examples of issues and mitigations or solutions.
3.
A section in which you address best practice recommendations for
ensuring the confidentiality, integrity, availability, authenticity, and
non-repudiation of Open Data.
Submit For Grading
1. Submit
your white paper in MS Word format (.docx or .doc file) using the OPEN Data
Assignment in your assignment folder. (Attach the file.)
2. You
must also submit your white paper to TurnItIn before the due date for this
assignment.
Additional Information
1. Your
white paper should use standard terms and definitions for cybersecurity
concepts. The following sources are recommended:
a. NICCS
Glossary http://niccs.us-cert.gov/glossary
b. Guidelines on Security and Privacy in Public
Cloud Computing http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf
2. You
are expected to credit your sources using in-text citations and reference list
entries. Both your citations and your reference list entries must comply with
APA 6th edition Style requirements. Failure to credit your sources will result
in penalties as provided for under the university’s Academic Integrity policy.
3. Use
APA 6th edition style (formatting) for the organization and
appearance of the MS Word document that you submit to your assignment folder. This
includes margins, section headings, and consistent use of fonts (Times New
Roman 12 in black), paragraph styles (first line indent by ½ inch), and line
spacing (double). Formatting requirements and examples are found under Course Resources
> APA Resources. Your file should contain both a title page and a separate
References page. Use page breaks to ensure that the title page and references
page are separate from the body of the paper.
4. You
are expected to write grammatically correct English in every assignment that
you submit for grading. Do not turn in any work without (a) using spell check,
(b) using grammar check, (c) verifying that your punctuation is correct and (d)
reviewing your work for correct word usage and correctly structured sentences
and paragraphs. These items are graded under Professionalism and constitute 15%
of the assignment grade.
Computer Science Question
QUESTION 45During which phase of the COBIT ISS management life cycle do you review how you are going to manage your IT inv ...
Computer Science Question
QUESTION 45During which phase of the COBIT ISS management life cycle do you review how you are going to manage your IT investment such as contracts, service level agreements (SLAs), and new policy ideas?Plan and OrganizeAcquire and ImplementDeliver and SupportMonitor and Evaluate2 points QUESTION 46What is the primary goal of business process reengineering?To implement an enterprise resource systemTo determine management bonusesTo improve business processesTo develop new security policies
6 pages
Cmit495 Assignment 2
CMIT 495 Current Trends and Projects in Computer Networks and Security Login to your newly created AWS account and take a ...
Cmit495 Assignment 2
CMIT 495 Current Trends and Projects in Computer Networks and Security Login to your newly created AWS account and take a screen capture of the ...
Earn money selling
your Study Documents