follow the attach document to complete this work.  Please note: Make sure it aligns with the attach rubric.Project 2: Compare / Contrast Two

follow the attach document to complete this work. 

Please note: Make sure it aligns with the attach rubric.

Project 2: Compare / Contrast Two State Government IT Security Policies

For this research-based report, you will perform a comparative analysis that examines the strengths and weaknesses of two existing IT Security Policies published by state governments for their operating departments and agencies (agencies and offices of the executive branch under the leadership of the state governors). (You will select two policies from the table under Research > Item #1.)

Your specific focus for this analysis will be how these states issued policies guide the implementation of (a) Risk Analysis (aligned with NIST SP 800-30 and SP 800-37) and (b) System Authorization processes aligned with the seven (7) domains of the Certified Authorization Professional certification.

Your analysis must consider best practices and other recommendations for improving cybersecurity for state government information technology operations (i.e. those operated by or for state agencies and offices). Your paper should also address the question: why should every nation have a comprehensive IT security policy for state agencies and offices that implement risk assessment processes and system authorization processes to reduce and mitigate risk?

Read / Review:

1. Review the seven (7) domains of the Certified Authorization Professional (in the course textbook):

· Information Security Risk Management Program

· Scope of the Information System

· Selection and Approval of Security and Privacy Controls

· Implementation of Security and Privacy Controls

· Assessment/Audit of Security and Privacy Controls

· Authorization/Approval of Information System

· Continuous Monitoring

2. Review the NIST best practices guidance in NIST SP 800-30 and NIST SP 800-37 (read chapters 1 & 2 in each document).

Research:

1. Select two state government IT Security Policies from the list below.

State

IT Security Policy

Illinois

Project 2: Compare / Contrast Two State Government IT Security Policies

For this research-based report, you will perform a comparative analysis that examines the strengths and weaknesses of two existing IT Security Policies published by state governments for their operating departments and agencies (agencies and offices of the executive branch under the leadership of the state governors). (You will select two policies from the table under Research > Item #1.)

Your specific focus for this analysis will be how these states issued policies guide the implementation of (a) Risk Analysis (aligned with NIST SP 800-30 and SP 800-37) and (b) System Authorization processes aligned with the seven (7) domains of the Certified Authorization Professional certification.

Your analysis must consider best practices and other recommendations for improving cybersecurity for state government information technology operations (i.e. those operated by or for state agencies and offices). Your paper should also address the question: why should every nation have a comprehensive IT security policy for state agencies and offices that implement risk assessment processes and system authorization processes to reduce and mitigate risk?

Read / Review:

3. Review the seven (7) domains of the Certified Authorization Professional (in the course textbook):

· Information Security Risk Management Program

· Scope of the Information System

· Selection and Approval of Security and Privacy Controls

· Implementation of Security and Privacy Controls

· Assessment/Audit of Security and Privacy Controls

· Authorization/Approval of Information System

· Continuous Monitoring

4. Review the NIST best practices guidance in NIST SP 800-30 and NIST SP 800-37 (read chapters 1 & 2 in each document).

Research:

2. Select two state government IT Security Policies from the list below.

State

IT Security Policy

Illinois

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

IfSuccessful_Status GA_Status_Icon SAM_Logotruefalse

IfSuccessful_Status GA_Status_Icon SAM_Logo true false ID FirstName LastName AssignmentGUID UserID false rohan maharjan {308B14B0-E32E-42D1-BE7D-54EE2E09B8CD} {308B14B0-E32E-42D1-BE7D-54EE2E09B8CD} ID FirstName LastName ProjectName SubmissionNum MaxScore Score EngineVersion ID StepNumber Description IfSuccessful StepScore StepMaxScore ErrorText ActionName StepActionOrder ConsultantID FirstName Last 110345 Jenette Masterson 110347 Victorina Hogg 110349 Marguerite Hathcock 110351 Sid Ortiz 110352 Glenn Testani

can you complete cis 120 assigment access

can you complete cis 120 assigment access assignment Sheet1 PolicyNumber CustomerID Premium Coverage U20011 11005 215 1,000,000 U21145 11022 226 1,000,000 U22138 11041 278 2,000,000 U22269 11042 301 2,000,000 U20771 11048 315 2,000,000