Compare Contrast Two State Government IT Security Policies writing homework help

repare a one page briefing statement (3 to 5 paragraphs) for a group of state government employees and local government city managers who are interested in learning more about the benefits of working with the Multi-State Information Sharing and Analysis Center (MS-ISAC). Their specific interest is in obtaining help in preventing data breaches since state agencies and city governments collect, process, transmit, and store large amounts of private information about individuals. This information includes
Student Records (K-12)
Online Reservation & Payment Systems for Parks & Recreation Facilities
Hospitals (Patient Records)
Vital Records (Birth / Death Certificates)
License Applications (Marriage, Business, Driver’s Licenses)
Building Permits (including architectural drawings and property information)
Your briefing statement should provide an independent perspective on the services provided by MS-ISAC and address concerns about the affordability of the ISAC’s services. Answer the questions:
Will working with MS-ISAC reduce the risks of data breaches in my organization?
Why or why not?
Who else could each city partner with to reduce the risks and impacts of data breaches?
Resource: https://msisac.cisecurity.org/about/services/
Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.
Timeliness of Initial Posting
On Time
Late
Very Late
No Submission
Timeliness of Briefing Statement or Paper
12 points
Posted briefing statement or paper before 11:59 PM ET on Friday.

10 points
Posted briefing statement or paper before 11:59 PM ET on Saturday.

5 points
Posted briefing statement or paper before 11:59 PM ET on Sunday.

0 points
Did not post a briefing statement or paper before 11:59 PM ET on Sunday.

Briefing Statement or Paper
Excellent
Outstanding
Acceptable
Needs Improvement
Needs Significant Improvement
Missing or No Work Submitted
Introduction to Briefing Statement or Paper
10 points
Provided an excellent introduction to the deliverable which clearly, concisely, and accurately addressed the topic of the briefing statement or paper. Appropriately paraphrased information from authoritative sources.

8.5 points
Provided an outstanding introduction to the deliverable which clearly and accurately addressed the topic of the briefing statement or paper. Appropriately paraphrased information from authoritative sources.

7 points
Provided an acceptable introduction to the deliverable which addressed the topic of the briefing statement or paper. Appropriately paraphrased information from authoritative sources.

6 points
Provided an introduction to the deliverable but the section lacked some required details. Information from authoritative sources was mentioned.

4 points
Attempted to provide an introduction to the deliverable but this section lacked detail and/or was not well supported by information drawn from authoritative sources (too many quotations or improper paraphrasing).

0 points
Introduction was missing or no work submitted.

Analysis
15 points
Provided an excellent analysis of the issues for the required briefing topic. Addressed at least three separate issues and provided appropriate examples for each. Appropriately used and cited information from authoritative sources.

13.5 points
Provided an outstanding analysis of the issues for the required briefing topic. Addressed at least two separate issues and provided appropriate examples for each. Appropriately used and cited information from authoritative sources.

12 points
Provided an acceptable analysis of the issues for the required briefing topic. Addressed at least one specific issue and provided an appropriate example. Appropriately used and cited information from authoritative sources.

11 points
Addressed the required briefing topic but the analysis lacked details or was somewhat disorganized. Appropriately used and cited information from authoritative sources.

8 points
Mentioned the required briefing topic but the analysis was very disorganized or off topic. OR, the analysis did not appropriately use information from authoritative sources (too many quotations or improper paraphrasing).

0 points
Analysis was missing or no work was submitted.

Summary
10 points
Included an excellent summary section for the briefing statement or paper which was on topic, well organized, and covered at least 3 key points. The summary contained at least one full paragraph.

8.5 points
Included an outstanding summary paragraph for the briefing statement or paper which was on topic and covered at least 3 key points.

7 points
Included a summary paragraph for the briefing statement or paper which was on topic and provided an appropriate closing.

6 points
Included a summary paragraph but, this section lacked content or was disorganized.

4 points
Included a few summary sentences for the briefing statement or paper.

0 points
Did not include a summary for the briefing statement or paper.

Use of Authoritative Sources
5 points
Included and properly cited three or more authoritative sources (no errors).

4 points
Included and properly cited three or more authoritative sources (minor errors allowable).

3 points
Included and cited two or more authoritative sources (minor errors allowable). Reference list entries contain sufficient information to enable the reader to find and retrieve the cited sources.

2 points
Included and cited at least one authoritative source (errors allowable in citations or reference entries). Reference list entries contain sufficient information to enable the reader to find and retrieve the cited sources.

1 point
Mentioned at least one authoritative source but, the citations and/or reference list entries lacked required information (not sufficient to retrieve the correct resource).

0 points
References and citations were missing. Or, no work submitted.

Professionalism
10 points
No formatting, grammar, spelling, or punctuation errors. Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.

8.5 points
Work contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance. Work needs some polishing to improve professional appearance.

7 points
Errors in formatting, spelling, grammar, or punctuation which need attention / editing to improve professional appearance of the work.

6 points
Submitted work has numerous errors in formatting, spelling, grammar, or punctuation. Substantial polishing / editing is required.

4 points
Submitted work is difficult to read and/or understand. OR, work has significant errors in formatting, spelling, grammar, punctuation, or word usage which detract from the overall professional appearance of the work.

0 points
No submission.

Timeliness of Postings
On Time
Late
Very Late
First Critique for Another Student
2 points
Posted a critique of another student’s briefing statement or paper before 11:59 pm ET on Saturday.

1 point
Posted a critique of another student’s briefing statement or paper before 11:59 pm ET on Sunday.

0 points
Did not post a critique of another student’s briefing statement or paper before 11:59 PM ET on Sunday.

Second Critique for Another Student
2 points
Posted a second critique of another student’s briefing statement or paper before 11:59 pm ET on Saturday.

1 point
Posted a second critique of another student’s briefing statement or paper before 11:59 pm ET on Sunday.

0 points
Did not post a second critique of another student’s briefing statement or paper before 11:59 PM ET on Sunday.

Follow-Up Reply or Discussion Participation
2 points
Posted a follow-up reply or discussion posting before 11:59 pm ET on Sunday.

0 points
Posted a follow-up reply or discussion posting after 11:59 pm ET on Sunday.

0 points
Did not post a follow-up reply in the week’s topic.

Second Follow-Up Reply or Discussion Posting
2 points
Posted a second follow-up reply or discussion posting before 11:59 pm ET on Sunday.

0 points
Posted a second follow-up reply or discussion posting after 11:59 pm ET on Sunday.

0 points
Did not post a second follow-up reply in the week’s topic.

Quality of Discussion Postings
Excellent
Acceptable
Needs Improvement
Low-Quality or No Work Submitted
Critique #1 for Another Student’s Briefing Statement or Paper
10 points
Posted an excellent critique for another student’s briefing statement or paper. Critique focused on ways in which the content could be improved and/or better organized. Provided 3 or more specific examples and added value to the discussion.

8.5 points
Posted an acceptable critique for another student’s briefing statement or paper. Critique focused on ways in which the content could be improved and/or better organized. Provided at least one specific example and added value to the discussion.

7 points
Posted a critique of another student’s briefing statement or paper. Critique provided at least one suggestion for improvement.

0 points
Posting was missing or did not add contain a critique of the briefing statement or paper.

Critique #2 for Another Student’s Briefing Statement or Paper
10 points
Posted an excellent critique for another student’s briefing statement or paper. Critique focused on ways in which the content could be improved and/or better organized. Provided 3 or more specific examples and added value to the discussion.

8.5 points
Posted an acceptable critique for another student’s briefing statement or paper. Critique focused on ways in which the content could be improved and/or better organized. Provided at least one specific example and added value to the discussion.

7 points
Posted a critique of a second student’s briefing statement or paper. Critique provided at least one suggestion for improvement.

0 points
Posting was missing or did not add contain a critique of the briefing statement or paper.

Follow-up Reply or Comment #1
5 points
Posted a follow-up reply or comment which added value to the discussion.

4 points
Posted an acceptable follow-up reply or comment which added some value to the discussion.

3 points
Posted a follow-up reply or comment but added little value to the discussion.

0 points
Posting was missing or did not add value to the discussion.

Follow-up Reply or Comment #2
5 points
Posted a follow-up reply or comment which added value to the discussion.

4 points
Posted an acceptable follow-up reply or comment which added some value to the discussion.

3 points
Posted a follow-up reply or comment but added little value to the discussion.

0 points
Posting was missing or did not add value to the discussion.

Overall Score
Excellent100 or more
Outstanding85 or more
Acceptable75 or more
Needs Improv
#2. 
Paper #3: Compare / Contrast Two State Government IT Security Policies
Scenario: 
Volunteers have been recruited to help state governments improve their cybersecurity practices. The coordinating committee has decided that the first task these volunteers undertake will be a comparative analysis which examines the strengths and weaknesses of existing IT Security Policies for state governments (agencies and offices of the executive branch under the leadership of the state governors). Since you volunteered early, you have your pick of any two states’  IT Security Policies from the list published by the Multi-State Information Sharing and Analysis Center (MSISAC). (See item #1 under Research.) 
Research:
1.Select two state government IT Security Policies. Use the list at https://msisac.cisecurity.org/state/   (if you encounter a broken link, you may search for that state’s policy or choose a different state).
2.Download and review your selected state governments’ IT Security Policy documents. 
3.Develop five or more points which are common across the two documents. (Similarities)
4.Identify and review at least three unique items in each document. (Differences)
5.Research best practices for IT Security and/or IT Security Policies for state governments. Here are two  sources which you may find helpful:
a.http://www.nascio.org/Portals/0/Publications/Documents/Deloitte-NASCIOCybersecurityStudy_2014.pdf  
b.http://www.nascio.org/Portals/0/Publications/Documents/NASCIO-SecurityFrameworks.pdf  
6.Using your research and your comparison of the two policy documents, develop an answer to the question: Why should every state government have an IT security policy for state agencies and offices under the state’s executive branch?
Write:
Write a five (5) to eight (8) page white paper in which you summarize your research and discuss the similarities and differences between the two IT security policy documents. You should focus upon clarity and conciseness more than length when determining what content to include in your paper. At a minimum, your white paper must include the following:
1.An introduction or overview of IT Security Policies for the executive branch of state governments (covering state agencies and offices in the executive branch including the governor’s office). Explain the purpose of an IT security policy and how it is used. Answer the question: why should every state in the nation have a comprehensive IT security policy for state agencies and offices? (Make sure that you address the importance of such strategies to small, resource-poor states as well as to large or wealthy states.) 
2.A separate section in which you discuss the common principles and policy sections / statements (similarities) found in both IT security policy documents. 
3.A separate section in which you discuss the unique aspects of the first state’s IT security policy document.
4.A separate section in which you discuss the unique aspects of the second state’s IT security policy document.
5.A section in which you discuss your evaluation of which state government has the better of the two IT security policy documents. You should also present best practice based recommendations for improvements for both IT security policy documents. (Note: you may have different recommendations for the individual policies depending upon the characteristics of each document.)
Submit For Grading 
1.Submit your white paper in MS Word format (.docx or .doc file) using the OPEN Data Assignment in your assignment folder. (Attach the file.)
2.You must also submit your white paper to TurnItIn before the due date for this assignment.
Additional Information
1.Your white paper should use standard terms and definitions for cybersecurity concepts. The following sources are recommended:
a.ISACA Glossary http://www.isaca.org/pages/glossary.aspx 
b.Guidelines on Security and Privacy in Public Cloud Computing http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-144.pdf 
2.You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university’s Academic Integrity policy. 
3.Use APA 6th edition style (formatting) for the organization and appearance of the MS Word document that you submit to your assignment folder. This includes margins, section headings, and consistent use of fonts (Times New Roman 12 in black), paragraph styles (first line indent by ½ inch), and line spacing (double). Formatting requirements and examples are found under Course Resources > APA Resources. Your file should contain both a title page and a separate References page. Use page breaks to ensure that the title page and references page are separate from the body of the paper. 
4.You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. These items are graded under Professionalism and constitute 15% of the assignment grade. 

have a comprehensive IT Security Policy? Addressed the importance of such strategies to small, resource-poor states as well as to larger or more wealthy states. The overview appropriately used information from 3 or more authoritative sources.

14 points
Provided an outstanding introduction or overview of IT Security Policies for the executive branch of state governments. Explained the purpose of an IT Security Policy and how it is used. Addressed the question: why should every state in the nation  have a comprehensive IT Security Policy? Addressed the importance of such strategies to small, resource-poor states as well as to larger or more wealthy states. The overview appropriately used information from 2 or more authoritative sources.

13 points
Introduced IT security policies; explained the purpose of an IT security policy for state governments and how such policies are used. Addressed the question: why should every state have an IT security policy? Mentioned the importance of such policies to small, resource-poor states as well as to larger or wealthier states. The overview appropriately used information from 1 or more authoritative sources.

11 points
Provided an overview of IT security policies but the section lacked important details. Information from authoritative sources was cited and used in the overview.

4 points
Attempted to provide an introduction to the paper but this section lacked detail and/or was not well supported by information drawn from authoritative sources. 

0 points
The introduction and/or overview sections of the paper were off topic. 

Common Principles / Policies / Guidance between the two IT Security Policies
15 points
Provided an excellent discussion of the common principles and policies (similarities) found in both IT security policies. Correctly identified the two states used for the analysis. Provided 5 or more specific examples of content which was similar between the two documents. Appropriately used information from 3 or more authoritative sources.

14 points
Provided an outstanding discussion of the common principles and policy sections / statements (similarities) found in both IT security policy documents. Correctly identified the two states used for the analysis. Provided 4 or more specific examples of content which was similar between the two documents.Appropriately used information from 2 or more authoritative sources.

13 points
Provided a discussion of the common principles and policy sections / statements (similarities) found in both IT security policy documents. Correctly identified the two states used for the analysis. Provided 3 or more specific examples of content which was similar between the two documents. Appropriately used information from 1 or more authoritative sources.

11 points
Provided a discussion of similarities between the two documents including at least two examples. Correctly identified the two states. Appropriately used information from authoritative sources.

4 points
Provided a discussion of similarities between the two documents including at least one example. The discussionlacked detail and/or was not well supported by information drawn from authoritative sources.

0 points
This section was missing, off topic, or failed to provide information about similarities in the two documents.

Unique Aspects of State #1’s IT Security Policy
15 points
Provided an excellent discussion of the unique aspects of the IT Security Policy for state #1. Provided 5 or more examples of specific principles or guidelines or other content which were unique to the policy document. Appropriately used information from 3 or more authoritative sources.

14 points
Provided an outstanding discussion of the unique aspects of the IT Security Policy for state #1. Provided 4 or more examples of specific principles or guidelines or other content which were unique to the policy document. Appropriately used information from 2 or more authoritative sources.

13 points
Provided a discussion of the unique aspects of the IT Security Policy for state #1. Provided 3 or more examples of specific principles or guidelines or other content which were unique to the policy document. Appropriately used information from 1 or more authoritative sources.

11 points
Provided a brief discussion of the unique aspects of the IT Security Policy for state #1. Provided 2 or more examples of specific principles or guidelines or other content which were unique to the policy document. Appropriately used information from authoritative sources.

4 points

 
“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”

https://nursing writers.com/wp-content/uploads/2020/08/logo-300×75-1.png
0
0

admin

https://nursing writers.com/wp-content/uploads/2020/08/logo-300×75-1.png

admin2020-12-13 21:37:552020-12-13 21:37:55Compare Contrast Two State Government IT Security Policies writing homework help

© Copyright – Graduate Paper Help

Vote hacking political science homework help

Scroll to top


Hi there! Click one of our representatives below and we will get back to you as soon as possible.


Chat with us on WhatsApp

"Is this qustion part of your assignmentt? We will write the assignment for you. click order now and get up to 40% Discount"