Question Details

(solution) Write a five (5) to eight (8) page summary of your research. You


Write a five (5) to eight (8) page summary of your research. You should focus upon clarity and conciseness more than length when determining what content to include in your paper. At a minimum, your summary must include the following:

An introduction or overview of OPEN Data which provides definitions and addresses the laws, regulations, and policies which require federal agencies to identify and publish datasets and information collections. Discuss the role of the executive branch?s Open Data / Open Government policies in making data available via Data.Gov. This introduction should be suitable for an executive audience.

A separate section in which you discuss the value (benefits) of Open Data. This section should provide several specific examples of how government provided Open Data is being used by businesses and the general public.

A separate section in which you address security issues (confidentiality, integrity, availability, authenticity, and non-repudiation ) which can impact the usefulness of Open Data and how these issues are currently being addressed by the federal policies and plans for Open Data. Again, you should provide examples of issues and mitigations or solutions.

A section in which you address best practice recommendations for ensuring the confidentiality, integrity, availability, authenticity, and non-repudiation of Open Data. 

Please find attached more instructions.


Paper #1: Can we ensure that Open Data is useful AND secure?

 

Scenario:

 

A federal agency has asked your cybersecurity consulting firm to provide it with a white paper

 

that discusses the issues of usefulness and security in regards to Open Data. The white paper is intended

 

for a group of executives at the agency who are opposed to the planned conversion of its current

 

controlled distribution for several highly valuable and frequently requested datasets (DVDs purchased

 

through the Government Printing Office) to OPEN Data distribution via the government?s Data.Gov

 

portal (website). Currently, these data sets are purchased by businesses and academic institutions and

 

are used for a variety of purposes.

 

A customer satisfaction survey revealed that purchasers are willing to change over to the new

 

Open Data distribution method for data sets. But, the agency head has received phone calls from several

 

large and politically well-connected customers who expressed concerns about potential issues with the

 

integrity and authenticity of downloaded data. The agency?s executives were also surveyed and they

 

provided the following security-related items in a list of concerns for the planned conversion to an Open

 

Data delivery method:

 

a. Confidentiality / Privacy (ensuring proper redaction)

 

b. Data integrity

 

c. Data authenticity

 

d. Availability (reliability) of the Open Data service (website)

 

e. Non-repudiation of data sets

 

Research:

 

1. Read / Review the weekly readings.

 

2. Research the federal government?s OPEN Data mandate. Here are some sources that you may find

 

useful:

 

a. https://www.whitehouse.gov/sites/default/files/omb/memoranda/2013/m-13-13.pdf

 

(includes significant discussion of security issues and policy solutions including

 

references to FIPS 199 and NIST SP-800-53)

 

b. https://www.whitehouse.gov/sites/default/files/microsites/ostp/us_open_data_action_

 

plan.pdf

 

c. http://www.data.gov

 

d. http://www.data.gov/privacy-policy#data_policy

 

e. https://www.whitehouse.gov/sites/default/files/omb/memoranda/2014/m-14-06.pdf

 

3. Research how government information, e.g. OPEN Data, is used by businesses and the general

 

public. Here are some sources to get you started:

 

a. 7 Ways Companies Are Using the Government's Open Data

 

http://mashable.com/2013/05/30/7-ways-government-open-data/

 

b. Government open data proves a treasure trove for savvy businesses

 

http://www.computerworld.com/article/2488683/business-intelligence-governmentopen-data-proves-a-treasure-trove-for-savvy-businesses.html c. Open data: Unlocking innovation and performance with liquid information

 

http://www.mckinsey.com/insights/business_technology/open_data_unlocking_innovati

 

on_and_performance_with_liquid_information

 

4. Research the issues that can arise when businesses depend upon the confidentiality, integrity,

 

availability, authenticity, and non-repudiation of government provided Open Data. Suggested

 

sources include:

 

a. Authenticating Digital Government Information

 

http://scholarship.richmond.edu/cgi/viewcontent.cgi?article=1954&context=law-facultypublications

 

b. Legal and Institutional Challenges for Opening Data Across Public Sectors

 

http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?

 

direct=true&db=iih&AN=97430297&site=eds-live&scope=site

 

c. Risk Analysis to Overcome Barriers to Open Data http://ezproxy.umuc.edu/login?

 

url=http://search.ebscohost.com/login.aspx?

 

direct=true&db=poh&AN=93550378&site=eds-live&scope=site

 

d. Reconciling Contradictions of Open Data Regarding Transparency, Privacy, Security and

 

Trust http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?

 

direct=true&db=iih&AN=97430299&site=eds-live&scope=site

 

5. Find five or more best practice recommendations for ensuring the security (confidentiality, integrity,

 

availability, authenticity, non-repudiation) of information provided by the federal government

 

through its OPEN Data initiative. N.B. For the purposes of this assignment, you may treat ?licensing?

 

concerns as an ?availability? issue.

 

Write:

 

Write a five (5) to eight (8) page summary of your research. You should focus upon clarity and

 

conciseness more than length when determining what content to include in your paper. At a minimum,

 

your summary must include the following:

 

1. An introduction or overview of OPEN Data which provides definitions and addresses the laws,

 

regulations, and policies which require federal agencies to identify and publish datasets and

 

information collections. Discuss the role of the executive branch?s Open Data / Open Government

 

policies in making data available via Data.Gov. This introduction should be suitable for an executive

 

audience.

 

2. A separate section in which you discuss the value (benefits) of Open Data. This section should

 

provide several specific examples of how government provided Open Data is being used by

 

businesses and the general public.

 

3. A separate section in which you address security issues (confidentiality, integrity, availability,

 

authenticity, and non-repudiation ) which can impact the usefulness of Open Data and how these

 

issues are currently being addressed by the federal policies and plans for Open Data. Again, you

 

should provide examples of issues and mitigations or solutions.

 

4. A section in which you address best practice recommendations for ensuring the confidentiality,

 

integrity, availability, authenticity, and non-repudiation of Open Data. Additional Information

 

1. Your white paper should use standard terms and definitions for cybersecurity concepts. The

 

following sources are recommended: ISACA Glossary http://www.isaca.org/pages/glossary.aspx Guidelines on Security and Privacy in Public Cloud Computing

 

http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-144.pdf

 

2. You are expected to credit your sources using in-text citations and reference list entries. Both your

 

citations and your reference list entries must comply with APA 6th edition Style requirements. Failure

 

to credit your sources will result in penalties as provided for under the university?s Academic

 

Integrity policy.

 

3. Use APA 6th edition style (formatting) for the organization and appearance of the MS Word document

 

that you submit to your assignment folder. This includes margins, section headings, and consistent

 

use of fonts (Times New Roman 12 in black), paragraph styles (first line indent by ½ inch), and line

 

spacing (double). Formatting requirements and examples are found under Course Resources > APA

 

Resources. Your file should contain both a title page and a separate References page. Use page

 

breaks to ensure that the title page and references page are separate from the body of the paper.

 

4. You are expected to write grammatically correct English in every assignment that you submit for

 

grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying

 

that your punctuation is correct and (d) reviewing your work for correct word usage and correctly

 

structured sentences and paragraphs. These items are graded under Professionalism and constitute

 

15% of the assignment grade. Rubric Name: Paper #1 OPEN Data (Rubric)

 

Criteria

 

Introduction or Overview for OPEN

 

Data Excellent Outstanding Acceptable Improvement 20 points 18 points 16 points 14 points Provided an

 

excellent overview

 

of OPEN Data which

 

provided definitions

 

and addressed the

 

laws, regulations,

 

and policies which

 

require federal

 

agencies to identify

 

and publish datasets

 

and information

 

collections.

 

Discussed the role of

 

the executive Provided an

 

outstanding

 

overview of OPEN

 

Data which provided

 

definitions and

 

addressed the legal

 

and policy

 

requirements for

 

Open Data

 

participation by

 

federal agencies.

 

Discussed the role of

 

the executive

 

branch?s Open Data / Provided an

 

overview of OPEN

 

Data. Discussed the

 

role of the executive

 

branch?s Open Data /

 

Open Government

 

policies in making

 

data available via

 

Data.Gov. The

 

overview

 

appropriately used

 

information from 1

 

or more

 

authoritative Provided an

 

overview but the

 

section lacked

 

important details

 

about Open Data

 

initiatives and

 

policies. Information

 

from authoritative

 

sources was cited

 

and used in the

 

overview. Benefits & Value of Open Data for

 

Businesses and the General Public Security Issues for Open Data branch?s Open Data /

 

Open Government

 

policies in making

 

data available via

 

Data.Gov. The

 

overview

 

appropriately used

 

information from 3

 

or more

 

authoritative

 

sources. Open Government

 

policies in making

 

data sets and

 

information

 

collections available

 

via Data.Gov. The

 

sources.

 

overview

 

appropriately used

 

information from 2

 

or more

 

authoritative

 

sources. 20 points 18 points Provided an

 

excellent discussion

 

of the value

 

(benefits) of Open

 

Data. Provided five

 

or more specific

 

examples of how

 

government

 

provided Open Data

 

is being used by

 

businesses or the

 

general public.

 

Appropriately used

 

information from 3

 

or more

 

authoritative

 

sources. Provided an

 

outstanding

 

discussion of the

 

value (benefits) of

 

Open Data. Provided

 

three or more

 

specific examples of

 

how government

 

provided Open Data

 

is being used by

 

businesses or the

 

general public.

 

Appropriately used

 

information from 2

 

or more

 

authoritative

 

sources. Provided a

 

discussion of the

 

value (benefits) of

 

Open Data. Provided

 

at least one example

 

of how government

 

provided Open Data

 

is being used by

 

businesses or the

 

general public.

 

Appropriately used

 

information from 1

 

or more

 

authoritative

 

sources. 15 points 14 points 13 points 11 points Provided an

 

excellent discussion

 

which addressed

 

security issues (e.g.

 

confidentiality,

 

integrity, availability,

 

authenticity, and

 

non-repudiation )

 

which could impact

 

the usefulness of

 

Open Data. Provided

 

5 or more specific Provided an

 

outstanding

 

discussion which

 

addressed security

 

issues (e.g.

 

confidentiality,

 

integrity, availability,

 

authenticity, and

 

non-repudiation )

 

which could impact

 

the usefulness of

 

Open Data. Provided Provided a

 

discussion of

 

security issues

 

(confidentiality,

 

integrity, availability,

 

authenticity, and

 

non-repudiation )

 

which could impact

 

the usefulness of

 

Open Data. Provided

 

at least one example

 

of how these issues Discussion provided

 

some information

 

aboutsecurity issues

 

(confidentiality,

 

integrity, availability,

 

authenticity, and

 

non-repudiation )

 

which could impact

 

the usefulness of

 

Open Data.

 

Mentioned

 

information 16 points

 

14 points Provided a

 

discussion of the

 

value (benefits) of

 

Open

 

Data.Appropriately

 

used

 

information

 

authoritative

 

sources. examples of how

 

these issues are

 

currently addressed

 

by federal policies

 

and plans for Open

 

Data. Mentioned the

 

role that NIST plays

 

in providing

 

guidance for security

 

for Open Data

 

portals and

 

information.

 

Appropriately used

 

information from 3

 

or more

 

authoritative

 

sources. 15 points Best Practice Recommendations for

 

Open Data Security Addressed security issues using

 

standard cybersecurity terminology 3 or more specific

 

examples of how

 

these issues are

 

currently addressed

 

by federal policies

 

and plans for Open

 

Data. Mentioned the

 

role that NIST plays

 

in providing

 

guidance for security

 

for Open Data

 

portals and

 

information.

 

Appropriately used

 

information from 2

 

or more

 

authoritative

 

sources. 14 points are currently

 

addressed by federal

 

policies and plans.

 

obtained from

 

Appropriately used

 

authoritative

 

information from 1

 

sources.

 

or more

 

authoritative

 

sources. 13 points Provided an

 

excellent discussion

 

of best practice

 

recommendations

 

for ensuring the

 

confidentiality,

 

integrity, availability,

 

authenticity, and

 

non-repudiation of

 

Open Data. Included

 

5 or more specific

 

recommendations.

 

Appropriately used

 

information from 3

 

or more

 

authoritative

 

sources. Provided an

 

outstanding

 

discussion of best

 

practice

 

recommendations

 

for ensuring the

 

confidentiality,

 

integrity, availability,

 

authenticity, and

 

non-repudiation of

 

Open Data. Included

 

4 or more specific

 

recommendations.

 

Appropriately used

 

information from 2

 

or more

 

authoritative

 

sources. Provided a

 

discussion of best

 

practice

 

recommendations

 

for ensuring the

 

confidentiality,

 

integrity, availability,

 

authenticity, and

 

non-repudiation of

 

Open Data. Included

 

3 or more specific

 

recommendations.

 

Appropriately used

 

information from 1

 

or more

 

authoritative

 

sources. 11 points 5 points 4 points 3 points 2 points Demonstrated

 

excellence in the

 

integration of

 

standard

 

cybersecurity Provided an

 

outstanding

 

integration of

 

standard

 

cybersecurity Integrated standard

 

cybersecurity

 

terminology into the

 

into the case study Used standard

 

cybersecurity

 

terminology but this

 

usage was not well

 

integrated with the Discussion provided

 

some information

 

about best practices

 

for ensuring security

 

for Open Data.

 

Mentioned

 

information

 

obtained from

 

authoritative

 

sources. terminology into the terminology into the

 

case study.

 

case study. discussion. 2 points

 

5 points

 

Work has no more

 

than three

 

Work contains a

 

paragraphs with

 

reference list

 

omissions of

 

Work contains a

 

Work contains a

 

containing entries

 

citations crediting

 

reference list

 

reference list

 

for all cited

 

sources for facts and

 

containing entries

 

containing entries

 

resources. Reference

 

information. Work

 

for all cited

 

for all cited

 

list entries and incontains a reference

 

resources. One or

 

resources. No more

 

text citations are

 

list containing

 

two minor errors in than 3 minor errors

 

correctly formatted

 

entries for cited

 

APA format for inin APA format for inusing the

 

resources. Work

 

text citations and/or text citations and/or

 

appropriate APA

 

contains no more

 

reference list entries. reference list entries.

 

style for each type of

 

than 5 minor errors

 

resource.

 

in APA format for intext citations and/or

 

reference list entries. 4 points APA Formatting for Citations and

 

Reference List 4 points

 

5 points 3 points 3 points

 

2 points Submitted work has

 

minor style or

 

formatting flaws but

 

Submitted work

 

still presents a

 

shows outstanding professional

 

Professionalism Part I: Organization &

 

organization and the appearance.

 

Appearance

 

use of color, fonts,

 

Submitted work is

 

titles, headings and well organized and

 

sub-headings, etc. is appropriately uses

 

appropriate to the

 

color, fonts, and

 

assignment type.

 

section headings

 

(per the

 

assignment?s

 

directions). Organization and/or

 

appearance of

 

submitted work

 

could be improved

 

through better use

 

of fonts, color, titles,

 

headings, etc. OR

 

Submitted work has

 

multiple style or

 

formatting errors.

 

Professional

 

appearance could be

 

improved. Professionalism Part II: Execution 13 points 11 points Errors in formatting,

 

spelling, grammar, or

 

punctuation which

 

detract from Submitted work has

 

numerous errors in

 

formatting, spelling,

 

grammar, or 15 points 14 points No formatting,

 

Work contains minor

 

grammar, spelling, or errors in formatting,

 

punctuation errors. grammar, spelling or

 

punctuation which Submitted work has

 

multiple style or

 

formatting errors.

 

Organization and

 

professional

 

appearance need

 

substantial

 

improvement. do not significantly

 

impact professional

 

appearance. Overall Score Excellent

 

90 or more Outstanding

 

80 or more professional

 

appearance of the

 

submitted work. Acceptable

 

70 or more punctuation. Work is

 

unprofessional in

 

appearance. Improvement

 


Solution details:
STATUS
Answered
QUALITY
Approved
ANSWER RATING

This question was answered on: Jan 30, 2021

PRICE: $15

Solution~0001017880.zip (25.37 KB)

Buy this answer for only: $15

This attachment is locked

We have a ready expert answer for this paper which you can use for in-depth understanding, research editing or paraphrasing. You can buy it or order for a fresh, original and plagiarism-free solution (Deadline assured. Flexible pricing. TurnItIn Report provided)

Pay using PayPal (No PayPal account Required) or your credit card . All your purchases are securely protected by .
SiteLock

About this Question

STATUS

Answered

QUALITY

Approved

DATE ANSWERED

Jan 30, 2021

EXPERT

Tutor

ANSWER RATING

GET INSTANT HELP/h4>

We have top-notch tutors who can do your essay/homework for you at a reasonable cost and then you can simply use that essay as a template to build your own arguments.

You can also use these solutions:

  • As a reference for in-depth understanding of the subject.
  • As a source of ideas / reasoning for your own research (if properly referenced)
  • For editing and paraphrasing (check your institution's definition of plagiarism and recommended paraphrase).
This we believe is a better way of understanding a problem and makes use of the efficiency of time of the student.

NEW ASSIGNMENT HELP?

Order New Solution. Quick Turnaround

Click on the button below in order to Order for a New, Original and High-Quality Essay Solutions. New orders are original solutions and precise to your writing instruction requirements. Place a New Order using the button below.

WE GUARANTEE, THAT YOUR PAPER WILL BE WRITTEN FROM SCRATCH AND WITHIN A DEADLINE.

Order Now