Securing digital government services project

Assignment Help Computer Network Security
Reference no: EM132620866

CSIA360 Cybersecurity in Government Organizations - University of Maryland Global Campus

Project : Securing Digital Government Services

For this paper, you will research potential and existing security issues affecting digital government websites. Government websites enable customers to enroll in programs and services, check the status of benefits, and receive information about the federal government's activities. Your audience for this research reportis the Chief Information Officer for a small federal agency who asked for assistance in developing a risk assessment and risk mitigation strategy for the agency's digital government websites.

Note: this research report is separate from the report you previously prepared about OPEN data and may not reuse information from that report. This paper must address other types of government services. See Table 1 for the list of websites to use in your research.

For this report, you should begin by reviewing three or more specific digital government websites (from the list provided in Table 1) to determine:
(a) the types of information provided by the websites
(b) the types of services provided by the websites
(c) security issues which could impact the delivery of digital government services by the websites

Research:
1. Read / Review the Weekly readings
2. Research three or more attacks that could compromise the security of a Digital Government Website that uses Web Applications, a Web Server, and a Database Server.Here are some sources to get you started:
a. Web Applications Architectures and Security (in the Week 3 content module).
b. Cyber Vandalism
c. Cybersecurity: Actions needed to address challenges facing federal systems (GAO 15-573T)
3. Review three or morewebsitesthat deliverdigital government services (select from those listed in Table 1). What types of information or services are available via these websites? What population do these websites serve (who is in the intended audience for each website)?
4. As part of your Digital Government websites review, determine the types and sensitivity of information collected, displayed, processed, and stored by the Web applicationsthat implement the Digital Government services.
a. See general security and privacy requirements.
b. See FIPS for additional guidance on determining the sensitivity level of a Federal IT system. (See the section on public websites.)
5. Using FIPS 200, the NIST Cybersecurity Framework, and NIST SP 800-53, research the general types of security controls required by IT systems hosting the Digital Government service that you reviewed.
a. FIPS 200
b. NIST Cybersecurity Framework
c. NIST SP 800-53
6. Find three or more additional sources that provide information about best practice recommendations for ensuring the security of the Web Applications used to deliver Digital Government information and services. These additional sources can include analyst reports and/ornews stories about recent attacks/threats, data breaches, cybercrime, cyber terrorism, etc.that impacted the security of digital government services.

Write:
Write a five- to seven-page summary of your research. At a minimum, your summary must include the following:
1. An introduction or overview of digital government thatprovides definitions and addresses the laws, regulations, and policies that require federal agencies toprovide information and services via the Web. This introduction should be suitable for an executive audience.
2. An overview of the information and services provided by the digital government Websites that you reviewed. Answer the following questions:
a. What types of information or services are available via your selected Websites?
b. What populations do the websites serve (who is the intended audience)?
c. What sensitivity level are applicable to each Website (use FIPS 199 criteria).
d. What security issues did you observe during your review?
3. A separate section that addresses the architectures and security issues inherent in the use of Web applications when used to deliver the services provided by your selected digital government Website. Include 5 or more examples of security issues and address how these issues contribute to increased risk.
4. A separate section that includes recommendations forbest practices for ensuring Web application security during the design, implementation, and operation of digital government websites. Include five or more best practice recommendations in your recommendations. (Hint: at least one of your recommendations should address use of the NIST Cybersecurity Framework. Another recommendation should address use of NIST SP 800-53 controls for ensuring security and privacy.)
5. A closing section in which you summarize your research and your recommendations.

Additional Information

1. Consult the grading rubric for specific content and formatting requirements for this assignment.

2. Your 5- to 7-pagepaper should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper.

3. Your paper should use standard terms and definitions for cybersecurity.

4. The CSIA program recommends you follow standard APA formatting since this will give you a document that meets the "professional appearance" requirements. You can find APA formatting guidelines and examples under Content >Course Resources > APA Resources.

5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be a separate page at the end of your file. These pages do not count towards the assignment's page count.

6. You shouldwrite grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct, and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.

7. You must credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).

Reference no: EM132620866

Questions Cloud

Find some data that reflect populations in rural arkansas : Find some DATA that reflect populations in rural Arkansas and Explain how they will benefit for from Telehealth - how will the laws help you to leverage
Effect of different sugars on the growth of yeast : They want to see if coconut sugar is better or worse than plain table sucrose (normal sugar) on the growth of yeast.
What is the environmental hazard : Who is at risk, what is the environmental hazard, where does this hazard come from and what health problems caused by the pollutant?
Find What weights should Corporation A use for Debt capital : 10 Million shares of common stock trading at $22 per share. What weights should Corporation A use for Debt capital when calculating its WACC?
Securing digital government services project : Project Securing Digital Government Services - security issues which could impact the delivery of digital government services by the websites
What is the powerhouse of a cell : What is the powerhouse of a cell?
What is Firm UVWs WACC : If the tax rate is 30%, what is Firm UVW s WACC? Express your answers in strictly numerical terms. For example, if the answer is 5%, write 0.05"
Nine characteristics shared by all living organisms : What are the nine characteristics shared by all living organisms?
Explain efficient and responsive supply chain : Describe the steps involved in designing goods and services. Explain efficient and responsive supply chain.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Network analysis using wireshark

Designed to develop deeper analytical understanding of different distributed network conditions - develop an analytical understanding of different distributed network

  Write a page scenario in which a malware attack occurs

Detail the particular malware, the exploited vulnerability, and its attack vector in your scenario.

  Describe how a hacker might go about cracking

Describe how a hacker might go about cracking a message encrypted with each type of algorithm -  algorithm where the advantages clearly outweigh the disadvantages.

  Analyze wireless network vulnerabilities exploited by hacker

Analyze wireless network vulnerabilities exploited by hackers. Design plans that remove Trojans, backdoors, and malware from infected systems.

  Explain how would you apply operation security opsec

network security-operation security in a corporation - word count 200how would you apply operation security opsec

  Describe the topic data center security

Describe the topic "Data Center Security" 500-700 word, double spaced, written in APA format, showing sources and a bibliography. Prepare a 15 presentation.

  Describe the concept and function of electronic money

Identify potential solutions for these issues and evaluate their ability to protect both payers and receivers. You must remember this homework has to be plagiarism free thanks

  Method of establishing compliance of it security controls

Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations

  What is cyber security and what are some of its key concept

What is cyber security, and what are some of its key concepts? What are the most significant threats to your data, and what are some of the root causes of those threats

  What is the benefit of checking server certificates

Typically the public SSH keys used by servers are not signed by any certificate authority, but the SSH protocol does support checking certificates. Why, in practice, are server certificates rarely signed? What is the benefit of checking server cert..

  Explain the advantages and disadvantages of using wi-fi

The guide should briefly explain the advantages and disadvantages of using Wi-Fi, and provide some guidelines as to when Wi-Fi is an appropriate solution.

  Implementation of the security recommendations

Describe how each of the OSs chosen will be updated and patched. Justify your choice based on the security of the OS along with cost considerations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd