Administration Cybersecurity Policy Review
It is important for you as a policy professional to understand a range of policies set forth by past, current, and future US presidential administrations. Cybersecurity professionals must understand the impact of an administration’s policy content from multiple perspectives. Analysis of US government cyber policy with current and historical perspectives is pertinent to senior cybersecurity staff in order to assist in the management of cybersecurity risks.
This is the fifth of six sequential projects. In this project, you will analyze the current and previous administration’s cybersecurity policies within the context of current cybersecurity concerns. You will identify the issues in the policies about which an organization should be concerned, taking into account the effects of the policy on civil liberties with some focus on FISMA and NIST. You will also evaluate FISMA’s ability to both assess compliance and insure accountability.
By the end of the course, you will understand the effect that administration cybersecurity policy has on your own organization—public or private sector.
There are 12 steps in this project. Begin with a review of your project scenario.
Transcript:
As the newly hired cybersecurity policy analyst, you are the most qualified in your company to understand the overall framework of cybersecurity initiatives, which often change and evolve over several presidential administrations.
Knowing your background, your boss asks you to prepare a comprehensive overview that compares cyber policy principles from the prior administration to the current. He will present the report to the board of directors.
“It’s important for us to take a step back periodically to see where we’ve been, where we are now, and where we are going,” he says.
The report can include recommendations for improving the current policies with a look toward maintaining civil liberties. The report, your boss says, also should feature updates and the effects of the Federal Information Security Management Acts, or FISMA, of 2002 and 2014. It should also consider the role that the National Institute of Standards and Technology, or NIST, assumes in terms of cybersecurity policy.
You realize that your report has to be crafted in plain language so that the board members who do not have the technical background in cybersecurity matters will understand.
Creating such a broad-based document will require some historical research as well as a look at the current laws. It is due in two weeks, so it’s best to get started right away.
Step 1: Complete the Developing Cybersecurity Law and Policy eLearning Module
Before you begin the analysis for your report, you should understand how cybersecurity laws and policies are developed. Complete the Developing Cybersecurity Law and Policy eLearning module to better introduce yourself to some key concepts of cyber law, including transnational issues and the absence of law, jurisdiction, and attribution.
You will also cover continuously shifting internet governance through the Internet Corporation for Assigned Numbers and Names (ICANN) and the International Telecommunications Union (ITU). In addition, the module discusses the domain name system (DNS), human rights, and the challenges of monocultures. Take notes on key concepts that will help you in your analysis.
Step 2: Project Practice – SIMTRAY Federal Cybersecurity Agency: Day 1
In the previous step, you were introduced to how cybersecurity laws and policies are developed. You will continue familiarizing yourself with federal regulations and laws by exploring the SIMTRAY titled, “Federal Cybersecurity Agency: Find Your Way in Three Days.”
SIMTRAY is a simulation that presents you with scenarios that will provide insight into how governments ensure the security of their networks and what role they play in addressing issues that arise in private industry. Some of the issues and topics addressed in this exercise include categorizing information types, intellectual property issues (intellectual property – cybersecurity), cybersecurity law, Common Criteria Evaluation and Validation Scheme (CCEVS), state cybersecurity law, broadband, and the TIE model.
The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need. Record your best score and at least one lesson learned from the exercise to include in your report at the end of the three-day simulation.
Step 3: Project Practice – SIMTRAY Federal Cybersecurity Agency: Day 2
In the previous step, you started to examine the SIMTRAY, “Federal Cybersecurity Agency: Find Your Way in Three Days.” In this step, continue to focus on SIMTRAY, but document the specific issues that you believe could be better addressed by federal policy. You may encounter the following topics in this exercise: categorizing information types, intellectual property issues (intellectual property – cybersecurity), cybersecurity law, Common Criteria Evaluation and Validation Scheme (CCEVS), state cybersecurity law, broadband, and the TIE model.
The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need. Record your best score and at least one lesson learned from the exercise to include in your report at the end of the three-day simulation.
Step 4: Project Practice – SIMTRAY Federal Cybersecurity Agency: Day 3
In this step, you should continue to explore the scenarios within SIMTRAY, “Federal Cybersecurity Agency: Find Your Way in Three Days.” If you have not already, you will most likely encounter the following topics in this exercise: classifying information types, intellectual property issues (intellectual property – cybersecurity), cybersecurity law, Common Criteria Evaluation and Validation Scheme (CCEVS), state cybersecurity law, broadband, and the TIE model. Document events that you experience in the exercise that might affect the federal policy. Think about how these issues will be affected by current or pending legislation and begin to explore how you might be able to influence Congress to pass appropriate legislation.
The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need. Compile your recorded scores, lessons learned and documented industry issues into a one-page report.
Submit your report for feedback.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.