Project 5: Administration Cybersecurity Policy Review Step 12

 

Project 5: Administration Cybersecurity Policy Review
Step 12: Compile Final Report on National Cybersecurity Policy

Throughout this project, you have reviewed and analyzed the presidential administration’s cybersecurity policy, FISMA, and NIST. You will now compile your findings in a final report for your boss to deliver to the board of directors. Refer to the for additional guidelines.

Submit your completed final report.

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

  • 1.4: Tailor communications to the audience.
  • 2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.
  • 7.1: Evaluate national cybersecurity policy.

 

Instruction for the Final Report: Administration Cybersecurity Policy Review

This comprehensive report should include the sections listed below and conclude with a statement that addresses (agree or disagree) with the following comment:

“Not all federal agencies need to follow FISMA or NIST recommendations for maintaining cybersecurity. After all, if the cyberinfrastructure of a government agency is attacked, no real harm is done to anyone except the complainants.”

Review the work you have done throughout the project. If necessary, review the eLearning modules in steps 1 and 5 and your Simtray Report completed in Step 4 along with the feedback from your instructor. And remember to tailor your report to your nontechnical audience.

Be sure to address the following items at some point in your report:

  • Document the cybersecurity policy issues faced by the United States.
  • Analyze the interrelations among cybersecurity technology decisions and cybersecurity policies.
  • Translate how cybersecurity policy choices affect cybersecurity technology research and development.
  • Compare and contrast key federal and state cybersecurity standards.
  • Assess the key points and principles in the NIST standards for cloud cybersecurity.
  • Develop an awareness program of the linkage(s) between US national security and US national priorities for securing cyberspace.
  • Compare and contrast US cybersecurity standards bodies.
  • Identify stakeholders to be contacted in the event of an organizational cybersecurity incident.
  • Compare and contrast cyberdefense and cyberattack, and discuss the relevant policies that underpin each term.

Report Sections

  • Title Page
  • Table of Contents
  • Introduction
  • Key Current Administration Cybersecurity Policy Tenets
  • Key Prior Administration Cybersecurity Policy Tenets
  • Comparison of Current and Prior Tenets
  • FISMA Conclusions
  • NIST Conclusions
    • Conclusion
    • Pro/Con Current vs. Prior
    • Pro/Con FISMA Regulation
    • Pro/Con NIST Guidelines
    • Reference Page