Sign In
Not register? Register Now!
Pages:
3 pages/≈825 words
Sources:
4 Sources
Style:
APA
Subject:
IT & Computer Science
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 21.87
Topic:

Federal and State policy comparison IT Science Research Paper

Research Paper Instructions:

To prepare for the fast-paced cyber battles in ELITE, the first step is to watch the introductory video titled "ELITE Overview" (https://youtu(dot)be./53ex6.Yty6qU). This is the first of three videos that will prepare and guide you in completing the tabletop exercise.
Once you have viewed the video, begin familiarizing yourself with the contents of both the Application Model Reference and the ELITE Student Manual. Begin to learn about ELITE and your assigned sector by reading sections in the student manual: "2.1. Themes" through "2.5.2. Team Goals." This will give you an overview of the exercise and your team's objectives and perspectives. For an idea of decisions that will need to be made relevant to your sector, see the appropriate table in "3. Decision Reference" in the Application Model Reference.
After you finish the video and reading, proceed to the next step, in which your team will address policies in your sector at the federal and state levels. To prepare for the fast-paced cyber battles in ELITE, the first step is to watch the introductory video titled "ELITE Overview". This is the first of three videos that will prepare and guide you in completing the tabletop exercise.
Once you have viewed the video, begin familiarizing yourself with the contents of both the Application Model Reference and the ELITE Student Manual. Begin to learn about ELITE and your assigned sector by reading sections in the student manual: "2.1. Themes" through "2.5.2. Team Goals." This will give you an overview of the exercise and your team's objectives and perspectives. For an idea of decisions that will need to be made relevant to your sector, see the appropriate table in "3. Decision Reference" in the Application Model Reference.
After you finish the video and reading, proceed to the next step, in which your team will address policies in your sector at the federal and state levels.
In the previous step, you were provided with a video and reference materials that gave you an overview of the tabletop exercise and the sector assigned to you. Now, each team will need to prepare a brief, itemized list of cybersecurity policy issues as it applies to the team's assigned sector. After completing the list, with the same industry-specific focus, each team will write a two- to three-page Federal and State Policy Comparison report that compares and contrasts federal policies with individual state standards that might exist.

Research Paper Sample Content Preview:

Federal and State Policy Comparison
Author Name
Institutional Affiliation
Course Number and Name
Instructor Name
Assignment Due Date
The Goals and Mission of Federal Government
In the Elite simulation, the teams of Avisitel, Federal Government, DTL Power, Hytema and Mistral Bank have to collaborate with one another and work to establish a series of cybersecurity policy issues that can be compared and contrasted against state and federal policies of the real world (Konisky, 2009). In the simulation, the first team will act as the Federal Government and will be responsible for having a short description, a list of cybersecurity policy issues and information about the standards that could be compared to the government level standards. This particular team can be regarded as the Cyber Security Command (CSC), which is a branch of the Department of Homeland Security. Its primary goal is to prepare a plan to preserve cyber emergencies that could arise in both the private and public sectors of America (USA).
The Federal Government is provided with up to $15.6 billion every year in order to help them identify and protect people or agencies against cybersecurity threats that directly or indirectly impact the state, federal and local IT infrastructures. Its main responsibilities will be (but are not limited to) to fund cybersecurity research, lay down strong cybersecurity policies and control technical advisories given to the agencies operating privately.
In the simulator, the combined goals of all the teams are to ensure maximum national security and to provide different companies a way to get more and more profit. In addition, they will strive for great or optimal results (Sinardet, 2012). The Federal Government is also responsible for keeping national sentiments high in terms of cybersecurity goals. Besides, it has to ensure the cybersecurity of the nation at any cost. All of these goals are going to be measured on the index, ranging from 0 to 200, and the ultimate goal’s rate needs to be 100 which can be regarded as an excellent level on the index.
The Comparison of State and Federal Policies
It should be noticed that Maryland and the Federal Government have their own policies regarding cybersecurity; this is because the focus of both parties is different from one another. A few main points from the cybersecurity legislation for Maryland (2019) are improving the security practices of the government, ensuring the security of connected devices and promising security during government elections (Skobelev, et al., 2019). These are the main policies of Maryland, while the policies of the Federal Government are establishing comprehensive cybersecurity strategies, ensuring the safety of federal information and systems, secu...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

You Might Also Like Other Topics Related to scientific essays:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!