Why should every nation have a cybersecurity strategy

Assignment Help Other Subject
Reference no: EM131072225

I have attacted a SAMPLE Paper and the TEMPLATE you will be using for this paper. Please make sure you follow the paper template and check the sample paper so as to know how you will be formatting the paper.

Scenario:

Your company has assigned you to serve as an industry subject matter expert and advisor for a cyber policy competition team for a local university. This year, the team will be competing in an international Cyber Policy competition in Washington, DC. The policy question for this year's competition is: what is the best approach for developing a national cybersecurity strategy? The competition will have one U.S. team and nine additional teams from Europe (4 teams) and the Commonwealth nations (5 teams).

The university students have asked you to help them understand the problem space and the likely approaches that competing teams will take. To accomplish this goal, you have decided to prepare a white paper in which you compare the European Union Agency for Network and Information Security (ENISA) guidance document for cybersecurity strategies to a similar document prepared by the Commonwealth Telecommunications Organization(CTO). ENISA provides cybersecurity guidance for member states of the European Union (https://europa.eu/index_en.htm ). CTO provides cybersecurity guidance for members of the Commonwealth of Nations (https://www.commonwealthofnations.org/).

Your starting point for your analysis will be outlines of the two documents (Table 1 and Table 2) which were provided to the teams by the competition's organizers.

Research:

1. Review the document outlines provided in Tables 1 and 2 (at the end of this document).

2. Download and review the full documents

a. CTO: https://www.cto.int/media/fo-th/cyb-sec/Commonwealth%20Approach%20for%20National%20Cybersecurity%20Strategies.pdf

b. ENISA: https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/national-cyber-security-strategies-an-implementation-guide/at_download/fullReport

3. Develop five or more points which are common across the two documents. (Similarities)

4. Identify and review at least three unique items in each document. (Differences)

5. Research three or more national cybersecurity strategies from EU or Commonwealth nations which were written in or available in English (see the list in Appendix 1 of the CTO document). How comprehensive are these documents when compared to either the ENISA or the CTO guidance? From these documents and the ENISA / CTO guidelines, develop an answer to the question: Why should every nation have a cybersecurity strategy?

Write:

Write a five (5) page white paper in which you summarize your research and discuss the similarities and differences between the two guidance documents. You should focus upon clarity and conciseness more than length when determining what content to include in your paper. At a minimum, your white paper must include the following:

1. An introduction or overview of national cybersecurity strategies. Explain the purpose of a national cybersecurity strategy and how it is used.

Answer the question: why should every nation have a cybersecurity strategy? (Make sure that you address the importance of such strategies to small, resource-poor nations as well as to wealthy, developed nations.)

2. A separate section in which you discuss the common principles and guidelines (similarities) found in both guidance documents (ENISA & CTO).

3. A separate section in which you discussthe unique aspects of the CTO principles and guidelines for national cybersecurity strategies.

4. A separate section in which you discuss the unique aspects of the ENISA principles and guidelines for national cybersecurity strategies.

5. A section in which you present your recommendationsto the competition team as to the approach (next steps) they should take in further refining their answer to the competition question: what is the best approach for developing a national cybersecurity strategy?

Additional Information

1. Your white paper should use standard terms and definitions for cybersecurity concepts. The following sources are recommended:

a. NICCS Glossary https://niccs.us-cert.gov/glossary

b. Guidelines on Security and Privacy in Public Cloud Computing https://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf

c. Glossary sections in the two guidance documents (ENISA & CTO)

2. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university's Academic Integrity policy.

3. Use APA 6th edition style (formatting) for the organization and appearance of the MS Word document that you submit to your assignment folder. This includes margins, section headings, and consistent use of fonts (Times New Roman 12 in black), paragraph styles (first line indent by ½ inch), and line spacing (double). Formatting requirements and examples are found under Course Resources> APA Resources. Your file should contain both a title page and a separate References page. Use page breaks to ensure that the title page and references page are separate from the body of the paper.

4. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. These items are graded under Professionalism and constitute 15% of the assignment grade.

Table 1. Outline for Commonwealth Approach for Developing National Cybersecurity Strategies (Commonwealth Telecommunications Organisation, 2015).

3 CREATING AND USING A NATIONAL CYBERSECURITY STRATEGY

3.1 Development of the Strategy

3.1.1 An approach to design of the strategy: risk-based and outcome-focused

3.1.2 The use of a maturity model

3.1.3 Key performance indicators

3.1.4 Resources and market forces

3.1.5 Communicating its concepts and ideas

3.2 Delivering the Strategy

3.3 Reviewing the Strategy

 

4 KEY ELEMENTS OF A CYBERSECURITY STRATEGY

4.1 Introduction and background section

4.2 Guiding principles section

4.3 Vision and strategic goals section

4.4 Objectives and priorities section - using a risk-based approach

4.5 Stakeholder section

4.6 Governance and management structure

4.7 Strategy implementation section

4.7.1 Legal and regulatory framework

4.7.2 Capacity Building

4.7.3 Awareness

4.7.4 Local technical capability

4.7.5 Incident response

4.8 Monitoring and evaluation

Table 2. Outline for National Cyber Security Strategies: Practical Guide on Development and Execution (European Network and Information Security Agency, 2012).

2 National cyber security strategy lifecycle

 

3 Develop and execute the national cyber-security strategy

3.1 Set the vision, scope, objectives and priorities

3.2 Follow a national risk assessment approach

3.3 Take stock of existing policies, regulations and capabilities

3.4 Develop a clear governance structure

3.5 Identify and engage stakeholders

3.6 Establish trusted information-sharing mechanisms

3.7 Develop national cyber contingency plans

3.8 Organise cyber security exercises

3.9 Establish baseline security requirements

3.10 Establish incident reporting mechanisms

3.11 User awareness

3.12 Foster R&D

3.13 Strengthen training and educational programmes

3.14 Establish an incident response capability

3.15 Address cyber crime

3.16 Engage in international cooperation

3.17 Establish a public-private partnership

3.18 Balance security with privacy

 

4 Evaluate and adjust the national cyber-security strategy

4.1 Evaluation approach

4.2 Key performance indicators

Attachment:- assign.rar

Reference no: EM131072225

Questions Cloud

Inventory for using the retail method : Curtis Company must estimate its ending inventory and has the following information available from the most recent accounting period: Compute the December 31 inventory for Curtis using the retail method.
Validity of the performance measure estimates : What impact would running the simulation experiment until all subassemblies had been moved to the final assembly process have on the validity of the performance measure estimates?
Supply and demand functions for each type of labour : Suppose that the demand for high-skill workers lies everywhere above the demand for low-skill workers. Illustrate on a diagram the supply and demand functions for each type of labour, and the equilibrium for each type of worker.
Assembly process requests waiting for a subassembly : Tell why the quantity: Number of final assembly process requests waiting for a subassembly is not an effective performance measure for the simulation experiment in this chapter.
Why should every nation have a cybersecurity strategy : Develop five or more points which are common across the two documents. (Similarities) Identify and review at least three unique items in each document.
Compute the value of the deadweight loss associated : Compute the value of the deadweight loss associated with having an unregulated monopoly relative to having a regulated monopoly where a price is permitted that covers ATC.
Validate the function search one by searching : Validate the function Search One by searching from rack location row 2 column 2 as shown in Figure 18-2 in the right and up direction.
The process steps in the simulation model : Based on the process steps in the simulation model, tell why the bin states: occupied with a subassembly of type one, two, three, or four that is committed to the final assembly process are necessary.
Graph this cost and demand structure : What price would the monopolist charge if he were unregulated, and what would be his profit per unit?

Reviews

Write a Review

Other Subject Questions & Answers

  Massachusetts bay colony with the virginia colony

Compare and contrast the Massachusetts Bay Colony with the Virginia colony. Pay particular attention to (a) motives for colonization, (b) government, and (c) economics.

  An abstract is essentially a summary it is an overview of

assignment research paper on student-selected topic. papers must be 10-12 pages of text. they must include captioned

  New testament teachings of loving our enemy

In view of the New Testament Teachings of loving our enemy/Neighbor discuss the role of imprecatory prayers (psalms) for today? "can we pray against people or things today? Use scriptures

  Important agent of socialization

Write a 1000-word (minimum) paper, using APA standards, that addresses the following questions: Families have changed greatly over the past 60 years, and they continue to become more diverse.

  Differential effects of a body image exposure session

Read the article "Differential Effects of a Body Image Exposure Session on Smoking Urge Between Physically Active and Sedentary Female Smokers,"and identify the research questions and/or hypotheses as they are stated.

  How you intend to ensure the organizations vision mission

write a proposal of no more than 750 words outlining the research approach you will use for your strategic plan due in

  Examine role of federal in healthcare delivery

Select one federal and one state Agency which regulates healthcare and examine its role in healthcare delivery, its main functions and how it implements those functions.

  Describe personality and its significance

What is personality and why is it important to study? What famous theorist comes to mind when we discuss personality?

  Method for mitigating property damage from wildfires

Which of the following is NOT an appropriate method for mitigating property damage from wildfires? Which of the following is an example of a factor that influences a location’s physical vulnerability to natural disasters?

  Describe a musculoskeletal injury

Describe a musculoskeletal injury that can occur during a recreational activity (torn medical mensicus, rotator cuff tendonitis, etc.). What specific structures become injured? What symptoms will someone have? What are some treatments for this pro..

  Prepare an expository paper explaining something to audience

The student is required to prepare an expository (explanatory) paper that explains something to the audience. This paper is a piece of academic writing that requires a more abstract, critical, and thoughtful level of inquiry.

  Buisness values of xml to organizations described in case

What is the buisness values of XML to the organizations described in this case? How are they able to achieve such large returns on investment?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd