Compare / Contrast Two State Government IT Security Policies
For this research-based report, you will perform a comparative analysis that examines the strengths and weaknesses of two existing IT Security Policies published by state governments for their operating departments and agencies (agencies and offices of the executive branch under the leadership of the state governors). (You will select two policies from the table under Research > Item #1.)
Your specific focus for this analysis will be how these states issued policies guide the implementation of (a) Risk Analysis (aligned with NIST SP 800-30 and SP 800-37) and (b) System Authorization processes aligned with the seven (7) domains of the Certified Authorization Professional certification.
Your analysis must consider best practices and other recommendations for improving cybersecurity for state government information technology operations (i.e. those operated by or for state agencies and offices). Your paper should also address the question: why should every nation have a comprehensive IT security policy for state agencies and offices that implement risk assessment processes and system authorization processes to reduce and mitigate risk?
Read / Review:
1. Review the seven (7) domains of the Certified Authorization Professional (in the course textbook):
· Information Security Risk Management Program
· Scope of the Information System
· Selection and Approval of Security and Privacy Controls
· Implementation of Security and Privacy Controls
· Assessment/Audit of Security and Privacy Controls
· Authorization/Approval of Information System
· Continuous Monitoring
2. Review the NIST best practices guidance in NIST SP 800-30 and NIST SP 800-37 (read chapters 1 & 2 in each document).
Research:
1. Select two state government IT Security Policies from the list below.
State
IT Security Policy
Illinois
https://www2.illinois.gov/sites/doit/support/policies/Documents/Overarching%20Enterprise%20Information%20Security%20Policy.pdf
Project 2: Compare / Contrast Two State Government IT Security Policies
For this research-based report, you will perform a comparative analysis that examines the strengths and weaknesses of two existing IT Security Policies published by state governments for their operating departments and agencies (agencies and offices of the executive branch under the leadership of the state governors). (You will select two policies from the table under Research > Item #1.)
Your specific focus for this analysis will be how these states issued policies guide the implementation of (a) Risk Analysis (aligned with NIST SP 800-30 and SP 800-37) and (b) System Authorization processes aligned with the seven (7) domains of the Certified Authorization Professional certification.
Your analysis must consider best practices and other recommendations for improving cybersecurity for state government information technology operations (i.e. those operated by or for state agencies and offices). Your paper should also address the question: why should every nation have a comprehensive IT security policy for state agencies and offices that implement risk assessment processes and system authorization processes to reduce and mitigate risk?
Read / Review:
3. Review the seven (7) domains of the Certified Authorization Professional (in the course textbook):
· Information Security Risk Management Program
· Scope of the Information System
· Selection and Approval of Security and Privacy Controls
· Implementation of Security and Privacy Controls
· Assessment/Audit of Security and Privacy Controls
· Authorization/Approval of Information System
· Continuous Monitoring
4. Review the NIST best practices guidance in NIST SP 800-30 and NIST SP 800-37 (read chapters 1 & 2 in each document).
Research:
2. Select two state government IT Security Policies from the list below.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
