Compare and Contrast Cybersecurity Strategy Guidelines, computer science homework help
Scenario: Your company hasassigned you to serve as an industry subject matter expert and advisor for a cyber policy competition team for alocal university. This year, the team will be competing in an internationalCyber Policy competition in Washington, DC. The policy question for this year’scompetition is: what is the best approachfor developing a national cybersecurity strategy? The competition will haveone U.S. team and nine additional teams from Europe (4 teams) and theCommonwealth nations (5 teams). The university students have asked you to help themunderstand the problem space and the likely approaches that competing teamswill take. To accomplish this goal, you have decided to prepare a white paper in which you compare the European Union Agency for Network and Information Security (ENISA) guidancedocument for cybersecurity strategies to a similar document prepared by the Commonwealth Telecommunications Organization(CTO). ENISA provides cybersecurity guidance for member states of theEuropean Union (http://europa.eu/index_en.htm). CTO provides cybersecurity guidance for members of the Commonwealth of Nations (http://www.commonwealthofnations.org/).Your starting point for your analysis will be outlinesof the two documents (Table 1 and Table 2) which were provided to the teams bythe competition’s organizers. Research:Review the document outlines provided in Tables1 and 2 (at the end of this document). Download and review the full documentsCTO: http://www.cto.int/media/fo-th/cyb-sec/Commonwealth%20Approach%20for%20National%20Cybersecurity%20Strategies.pdfENISA: https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/national-cyber-security-strategies-an-implementation-guide/at_download/fullReportDevelop five or more points which are commonacross the two documents. (Similarities)Identify and review at least three unique itemsin each document. (Differences)Research three or more national cybersecuritystrategies from EU or Commonwealth nations which were written in or availablein English (see the list in Appendix 1 of the CTO document). How comprehensive are these documents whencompared to either the ENISA or the CTO guidance? From these documents and theENISA / CTO guidelines, develop an answer to the question: Why should everynation have a cybersecurity strategy?Write:Write a five (5) to eight(8) page white paper in which you summarize your research and discuss thesimilarities and differences between the two guidance documents. You shouldfocus upon clarity and conciseness more than length when determining whatcontent to include in your paper. At a minimum, your white paper must includethe following:Anintroduction or overview of nationalcybersecurity strategies. Explain the purpose of a national cybersecuritystrategy and how it is used. Answer the question: why should every nation havea cybersecurity strategy? (Make sure that you address the importance of suchstrategies to small, resource-poor nations as well as to wealthy, developednations.)Aseparate section in which you discuss the common principles and guidelines(similarities) found in both guidance documents (ENISA & CTO). Aseparate section in which you discuss the unique aspects of the CTO principlesand guidelines for national cybersecurity strategies.Aseparate section in which you discuss the unique aspects of the ENISAprinciples and guidelines for national cybersecurity strategies.A section in which you present yourrecommendations to the competition team as to the approach (next steps) theyshould take in further refining their answer to the competition question: what is the best approach for developing a nationalcybersecurity strategy? Submit For Grading Submityour white paper in MS Word format (.docx or .doc file) using the OPEN DataAssignment in your assignment folder. (Attach the file.)Youmust also submit your white paper to TurnItIn before the due date for thisassignment.Additional InformationYourwhite paper should use standard terms and definitions for cybersecurityconcepts. The following sources are recommended:ISACAGlossary http://www.isaca.org/pages/glossary.aspxGuidelineson Security and Privacy in Public Cloud Computing http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-144.pdfGlossarysections in the two guidance documents (ENISA & CTO)Youare expected to credit your sources using in-text citations and reference listentries. Both your citations and your reference list entries must comply withAPA 6th edition Style requirements. Failure to credit your sources will resultin penalties as provided for under the university’s Academic Integrity policy. UseAPA 6th edition style (formatting) for the organization andappearance of the MS Word document that you submit to your assignment folder. Thisincludes margins, section headings, and consistent use of fonts (Times NewRoman 12 in black), paragraph styles (first line indent by ½ inch), and linespacing (double). Formatting requirements and examples are found under Course Resources> APA Resources. Your file should contain both a title page and a separateReferences page. Use page breaks to ensure that the title page and referencespage are separate from the body of the paper. Youare expected to write grammatically correct English in every assignment thatyou submit for grading. Do not turn in any work without (a) using spell check,(b) using grammar check, (c) verifying that your punctuation is correct and (d)reviewing your work for correct word usage and correctly structured sentencesand paragraphs. These items are graded under Professionalism and constitute 15%of the assignment grade. Table 1. Outline for Commonwealth Approach for DevelopingNational Cybersecurity Strategies (Commonwealth TelecommunicationsOrganisation, 2015).3 CREATING AND USING A NATIONAL CYBERSECURITY STRATEGY3.1 Development of the Strategy3.1.1 An approach to design of the strategy: risk-based andoutcome-focused3.1.2 The use of a maturity model3.1.3 Key performance indicators3.1.4 Resources and market forces3.1.5 Communicating its concepts and ideas3.2 Delivering the Strategy3.3 Reviewing the Strategy4 KEY ELEMENTS OF A CYBERSECURITY STRATEGY4.1 Introduction and background section4.2 Guiding principles section4.3 Vision and strategic goals section4.4 Objectives and priorities section – using a risk-based approach4.5 Stakeholder section4.6 Governance and management structure4.7 Strategy implementation section4.7.1 Legal and regulatory framework4.7.2 Capacity Building4.7.3 Awareness4.7.4 Local technical capability4.7.5 Incident response4.8 Monitoring and evaluationTable 2. Outline for National Cyber Security Strategies:Practical Guide on Development and Execution (European Network andInformation Security Agency, 2012).2 National cyber security strategy lifecycle3 Develop and execute the national cyber-security strategy 3.1 Set the vision, scope, objectives and priorities3.2 Follow a national risk assessment approach3.3 Take stock of existing policies, regulations and capabilities3.4 Develop a clear governance structure 3.5 Identify and engage stakeholders 3.6 Establish trusted information-sharing mechanisms3.7 Develop national cyber contingency plans3.8 Organise cyber security exercises3.9 Establish baseline security requirements 3.10 Establish incident reporting mechanisms3.11 User awareness 3.12 Foster R&D3.13 Strengthen training and educational programmes3.14 Establish an incident response capability 3.15 Address cyber crime 3.16 Engage in international cooperation 3.17 Establish a public–private partnership3.18 Balance security with privacy 4 Evaluate and adjust the national cyber-security strategy 4.1 Evaluation approach 4.2 Key performance indicatorsReferences:Commonwealth Telecommunications Organisation. (2015). Commonwealth approach for developingnational cybersecurity strategies. London, UK: Author. Retrieved from http://www.cto.int/media/fo-th/cyb-sec/Commonwealth%20Approach%20for%20National%20Cybersecurity%20Strategies.pdfEuropean Network and Information Security Agency. (2012). National cyber security strategies:Practical guide on development and execution. Heraklion, Crete, Greece:Author. Retrieved from https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/national-cyber-security-strategies-an-implementation-guide/at_download/fullReport
THIS QUESTION IS UNSOLVED!
Request a custom answer for this question