Need Help with this Question or something similar to this? We got you! Just fill out the order form (follow the link below), and your paper will be assigned to an expert to help you ASAP.
I need an explanation for this Computer Science question to help me study.
Project #2: Securing Digital Government Services
For this paper, you will research potential and existing security issues affecting digital government websites. Government websites enable customers to enroll in programs and services, check the status of benefits, and receive information about the federal government’s activities. Your audience for this research report is the Chief Information Officer for a small federal agency who asked for assistance in developing a risk assessment and risk mitigation strategy for the agency’s digital government websites.
Note: this research report is separate from the report you previously prepared about OPEN data and may not reuse information from that report. This paper must address other types of government services. See Table 1 for the list of websites to use in your research.
For this report, you should begin by reviewing three or more specific digital government websites (from the list provided in Table 1) to determine:
(a)the types of information provided by the websites
(b)the types of services provided by the websites
(c)security issues which could impact the delivery of digital government services by the websites
After you have reviewed these websites, review the Federal Cybersecurity Risk Determination Report and Action Plan https://www.whitehouse.gov/wp-content/uploads/2018/05/Cybersecurity-Risk-Determination-Report-FINAL_May-2018-Release.pdf to identify additional sources of risk that the agency must be aware of and should address in its planning. You should also review Executive Order 13800 Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/
Table 1. List of Digital Government Websites
Base URLs
BENEFITS.GOV
CANCER.GOV
CONSUMERFINANCE.GOV
DATA.GOV
DIGITALGOV.GOV
DISASTERASSISTANCE.GOV
FOODSAFETY.GOV
GRANTS.GOV
HEALTHCARE.GOV
HEALTHFINDER.GOV
MEDICARE.GOV
READY.GOV
RECREATION.GOV
REGULATIONS.GOV
RESEARCH.GOV
SAFERCAR.GOV
SERVE.GOV
STOPFAKES.GOV
USA.GOV
VOLUNTEER.GOV
Research:
Read / Review the Weekly readings Research three or more attacks that could compromise the security of a Digital Government Website that uses Web Applications, a Web Server, and a Database Server. Here are some sources to get you started:
Web Applications Architectures and Security (in the Week 3 content module). Cyber Vandalism — https://www.digitalgov.gov/resources/readiness-recovery-response-social-media-cyber-vandalism-toolkit/ Cybersecurity: Actions needed to address challenges facing federal systems (GAO 15-573T) http://www.gao.gov/assets/670/669810.pdf
Review three or more websites that deliver digital government services (select from those listed in Table 1). What types of information or services are available via these websites? What population do these websites serve (who is in the intended audience for each website)? As part of your Digital Government websites review, determine the types and sensitivity of information collected, displayed, processed, and stored by the Web applications that implement the Digital Government services.
See http://www.digitalgov.gov/resources/checklist-of-requirements-for-federal-digital-services/ for general security and privacy requirements. See FIPS 199 for additional guidance on determining the sensitivity level of a Federal IT system. (See the section on public websites.)
Using FIPS 200, the NIST Cybersecurity Framework, and NIST SP 800-53, research the general types of security controls required by IT systems hosting the Digital Government service that you reviewed.
FIPS 200 https://doi.org/10.6028/NIST.FIPS.200 NIST Cybersecurity Framework https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf NIST SP 800-53 https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-53r4.pdf
Find three or more additional sources that provide information about best practice recommendations for ensuring the security of the Web Applications used to deliver Digital Government information and services. These additional sources can include analyst reports and/or news stories about recent attacks/threats, data breaches, cybercrime, cyber terrorism, etc. that impacted the security of digital government services.
What types of information or services are available via your selected Websites? What populations do the websites serve (who is the intended audience)? What sensitivity level are applicable to each Website (use FIPS 199 criteria). What security issues did you observe during your review?
Write:
Write a five- to seven-page summary of your research. At a minimum, your summary must include the following:
1.An introduction or overview of digital government that provides definitions and addresses the laws, regulations, and policies that require federal agencies to provide information and services via the Web. This introduction should be suitable for an executive audience.
2.An overview of the information and services provided by the digital government Websites that you reviewed. Answer the following questions:
3.A separate section that addresses the architectures and security issues inherent in the use of Web applications when used to deliver the services provided by your selected digital government Website. Include 5 or more examples of security issues and address how these issues contribute to increased risk.
4.A separate section that includes recommendations for best practices for ensuring Web application security during the design, implementation, and operation of digital government websites. Include five or more best practice recommendations in your recommendations. (Hint: at least one of your recommendations should address use of the NIST Cybersecurity Framework. Another recommendation should address use of NIST SP 800-53 controls for ensuring security and privacy.)
5.A closing section in which you summarize your research and your recommendations.
Submit for Grading
Submit your work in MS Word format (.docx or .doc file) using the Project 2 Assignment in your assignment folder. (Attach the file.)
Additional Information
Consult the grading rubric for specific content and formatting requirements for this assignment. Your 5- to 7-page paper should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper. Your paper should use standard terms and definitions for cybersecurity. See Course Content > Course Resources > Cybersecurity Concepts Review for recommended resources. The CSIA program recommends you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. You can find APA formatting guidelines and examples under Content > Course Resources > APA Resources. You can use the provided APA template file (MS Word format) CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be a separate page at the end of your file. These pages do not count towards the assignment’s page count. You should write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct, and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. You must credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).Research paper :Black chain (Be approximately four to six pages in length, not including the required cover page and reference page.): nursing case study help
I’m studying and need help with a Computer Science question to help me learn.
Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?
Your paper should meet the following requirements:
• Be approximately four to six pages in length, not including the required cover page and reference page.
• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations
• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.post and two reply
I’m studying for my English class and need an explanation.
https://www.creativitypost.com/business/creativity_is_messy
Use the title of the article as the first line of your post in bold print.
Paragraph 1: (10-15 sentences) Briefly describes the main ideas. Give examples. What conclusions did the author make? Use your own words. No quotes or bullet points. Paragraph 2: (10-15 sentences) Give your critique of the ideas. Put some thought into your response. Do not give additional summary, instead evaluate the article and give your opinion. What do you think were the best points? Explain your reasoning. What were the weak points? Are there any relevant ideas that were not discussed? What do you think is innovative about the author’s thinking? Why did you select this article? Discuss how the ideas relate to your life experiences. Give an example. Make sure you include first person comments: “I selected this article because… I think the author’s best ideas are….because…I think the weak points are.. I think the author neglected to point out that….I think these ideas are creative because….These ideas are relevant to me because….
After submitting your post, review and comment on TWO other student’s posts. Each reply should be a paragraph of 100-125 words. Include thoughtful comments that specifically relate to the post. Give your opinion of this individual and their creative accomplishments. What aspect of the post impressed you most? Why? Generic comments like That’s interesting! ! That’s very creative do not count towards the minimum requirement.Please note: your reply should be original and and give your opinion. Do not restate another student’s reply. Reply to a different post if someone has already stated what you were going to say.