Compare / Contrast the ENISA and Commonwealth Approaches to Developing National Cybersecurity Strategies, assignment help
Paper #4: Compare / Contrast the ENISA and CommonwealthApproaches to Developing National Cybersecurity StrategiesScenario: Your Company has assigned you to serve as anindustry subject matter expert and advisor for a cyber policy competition teamfor a local university. This year, the team will be competing in aninternational Cyber Policy competition in Washington, DC. The policy questionfor this year’s competition is: what is the best approach for developing anational cybersecurity strategy? The competition will have one U.S. team andnine additional teams from Europe (4 teams) and the Commonwealth nations (5teams). The university students have asked you to help themunderstand the problem space and the likely approaches that competing teamswill take. To accomplish this goal, you have decided to prepare a white paperin which you compare the European Union Agency for Network and InformationSecurity (ENISA) guidance document for cybersecurity strategies to a similardocument prepared by the Commonwealth Telecommunications Organization (CTO).ENISA provides cybersecurity guidance for member states of the European Union http://europa.eu/index_en.htm. CTOprovides cybersecurity guidance for members of the Commonwealth of Nations http://www.commonwealthofnations.org/.Your starting point for your analysis will be outlines ofthe two documents (Table 1 and Table 2) which were provided to the teams by thecompetition’s organizers. Research:1. Review thedocument outlines provided in Tables 1 and 2 (at the end of this document).2. Download and review the full documentsa. CTO: http://www.cto.int/media/fo-th/cyb-sec/Commonwealth%20Approach%20for%20National%20Cybersecurity%20Strategies.pdfb. ENISA: https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/national-cyber-security-strategies-an-implementation-guide/at_download/fullReport3. Develop five ormore points which are common across the two documents. (Similarities)4. Identify and review atleast three unique items in each document. (Differences)5. Research three ormore national cybersecurity strategies from EU or Commonwealth nationswhich were written in or available in English (see the list in Appendix 1 ofthe CTO document). How comprehensive arethese documents when compared to either the ENISA or the CTO guidance? From thesedocuments and the ENISA / CTO guidelines, develop an answer to the question:Why should every nation have a cybersecurity strategy?Write: Write a five (5) to eight (8) page white paperin which you summarize your research and discuss the similarities anddifferences between the two guidance documents. You should focus upon clarityand conciseness more than length when determining what content to include inyour paper. At a minimum, your white paper must include the following:1. An introduction or overview of national cybersecuritystrategies. Explain the purpose of a national cybersecurity strategy and how itis used. Answer the question: why should every nation have a cybersecuritystrategy? (Make sure that you address the importance of such strategies tosmall, resource-poor nations as well as to wealthy, developed nations.)2. A separate section in which you discuss the commonprinciples and guidelines (similarities) found in both guidance documents(ENISA & CTO). 3. A separate section in which you discuss the uniqueaspects of the CTO principles and guidelines for national cybersecuritystrategies.4. A separate section in which you discuss the uniqueaspects of the ENISA principles and guidelines for national cybersecuritystrategies.5. A section in which you present your recommendations tothe competition team as to the approach (next steps) they should take infurther refining their answer to the competition question: what is the bestapproach for developing a national cybersecurity strategy? Additional Information1. Your white paper should use standard terms anddefinitions for cybersecurity concepts. The following sources are recommended:a. ISACA Glossary http://www.isaca.org/pages/glossary.aspx b. Guidelines on Security and Privacy in Public CloudComputing http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-144.pdfc. Glossary sections in the two guidance documents (ENISA& CTO)2. You are expected to credit your sources using in-textcitations and reference list entries. Both your citations and your referencelist entries must comply with APA 6th edition Style requirements. Failure tocredit your sources will result in penalties as provided for under theuniversity’s Academic Integrity policy. 3. Use APA 6th edition style (formatting) for theorganization and appearance of the MS Word document that you submit to yourassignment folder. This includes margins, section headings, and consistent useof fonts (Times New Roman 12 in black), paragraph styles (first line indent by½ inch), and line spacing (double). Your file should contain both a title pageand a separate References page. Use page breaks to ensure that the title pageand references page are separate from the body of the paper. 4. You are expectedto write grammatically correct English in every assignment that you submitfor grading. Do not turn in any work without (a) using spell check, (b) usinggrammar check, (c) verifying that your punctuation is correct and (d) reviewingyour work for correct word usage and correctly structured sentences andparagraphs. These items are graded under Professionalism and constitute 15% of the assignment grade. Table 1. Outlinefor Commonwealth Approach for Developing National Cybersecurity Strategies(Commonwealth Telecommunications Organisation, 2015).3 CREATING AND USING A NATIONAL CYBERSECURITY STRATEGY3.1 Development of the Strategy3.1.1 An approach to design of the strategy: risk-based andoutcome-focused3.1.2 The use of a maturity model3.1.3 Key performance indicators3.1.4 Resources and market forces3.1.5 Communicating its concepts and ideas3.2 Delivering the Strategy3.3 Reviewing the Strategy4 KEY ELEMENTS OF A CYBERSECURITY STRATEGY4.1 Introduction and background section4.2 Guiding principles section4.3 Vision and strategic goals section4.4 Objectives and priorities section – using a risk-basedapproach4.5 Stakeholder section4.6 Governance and management structure4.7 Strategy implementation section4.7.1 Legal and regulatory framework4.7.2 Capacity Building4.7.3 Awareness4.7.4 Local technical capability4.7.5 Incident response4.8 Monitoring and evaluationTable 2. Outlinefor National Cyber Security Strategies: Practical Guide on Development andExecution (European Network and Information Security Agency, 2012).2 National cyber security strategy lifecycle3 Develop and execute the national cyber-security strategy 3.1 Set the vision, scope, objectives and priorities3.2 Follow a national risk assessment approach3.3 Take stock of existing policies, regulations andcapabilities3.4 Develop a clear governance structure 3.5 Identify and engage stakeholders 3.6 Establish trusted information-sharing mechanisms3.7 Develop national cyber contingency plans3.8 Organise cyber security exercises3.9 Establish baseline security requirements 3.10 Establish incident reporting mechanisms3.11 User awareness 3.12 Foster R&D3.13 Strengthen training and educational programmes3.14 Establish an incident response capability 3.15 Address cyber crime 3.16 Engage in international cooperation 3.17 Establish a public–private partnership3.18 Balance security with privacy 4 Evaluate and adjust the national cyber-security strategy 4.1 Evaluation approach 4.2 Key performance indicatorsReferences:Commonwealth Telecommunications Organisation. (2015).Commonwealth approach for developing national cybersecurity strategies. London,UK: Author. Retrieved from http://www.cto.int/media/fo-th/cyb-sec/Commonwealth%20Approach%20for%20National%20Cybersecurity%20Strategies.pdfEuropean Network and Information Security Agency. (2012).National cyber security strategies: Practical guide on development andexecution. Heraklion, Crete, Greece: Author. Retrieved from https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/national-cyber-security-strategies-an-implementation-guide/at_download/fullReport
THIS QUESTION IS UNSOLVED!
Request a custom answer for this question