Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/clouawmm/public_html/wp-includes/functions.php on line 6114
ENISA Vs Commonwealth Approaches to Developing National Cybersecurity Strategies - Cloud Essays

Browse Our Directory

ENISA Vs Commonwealth Approaches to Developing National Cybersecurity Strategies

$40.00

Paper #4: Compare / Contrast the ENISA and Commonwealth Approaches to Developing National Cybersecurity Strategies

Scenario:

 Your company has assigned you to serve as an industry subject matter expert and advisor for a cyber policy competition team for a local university. This year, the team will be competing in an international Cyber Policy competition in Washington, DC. The policy question for this year’s competition is: what is the best approach for developing a national cybersecurity strategy? The competition will have one U.S. team and nine additional teams from Europe (4 teams) and the Commonwealth nations (5 teams).

The university students have asked you to help them understand the problem space and the likely approaches that competing teams will take. To accomplish this goal, you have decided to prepare a white paper in which you compare the European Union Agency for Network and Information Security (ENISA) guidance document for cybersecurity strategies to a similar document prepared by the Commonwealth Telecommunications Organization (CTO). ENISA provides cybersecurity guidance for member states of the European Union (http://europa.eu/index_en.htm ). CTO provides cybersecurity guidance for members of the Commonwealth of Nations (http://www.commonwealthofnations.org/).

Your starting point for your analysis will be outlines of the two documents (Table 1 and Table 2) which were provided to the teams by the competition’s organizers.

Research:

  1. Review the document outlines provided in Tables 1 and 2 (at the end of this document).
  2. Download and review the full documents
    1. CTO: http://www.cto.int/media/fo-th/cyb-sec/Commonwealth%20‌Approach%20‌for%20‌National%20‌Cybersecurity%20Strategies.pdf
    2. ENISA: http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/an-evaluation-framework-for-cyber-security-strategies-1/an-evaluation-framework-for-cyber-security-strategies/at_download/fullReport
  3. Develop five or more points which are common across the two documents. (Similarities)
  4. Identify and review at least three unique items in each document. (Differences)
  5. Research three or more national cybersecurity strategies from EU or Commonwealth nations which were written in or available in English (see the list in Appendix 1 of the CTO document). How comprehensive are these documents when compared to either the ENISA or the CTO guidance? From these documents and the ENISA / CTO guidelines, develop an answer to the question: Why should every nation have a cybersecurity strategy?

Write:

Write a five (5) to eight (8) page white paper in which you summarize your research and discuss the similarities and differences between the two guidance documents. You should focus upon clarity and conciseness more than length when determining what content to include in your paper. At a minimum, your white paper must include the following:

  1. An introduction or overview of national cybersecurity strategies. Explain the purpose of a national cybersecurity strategy and how it is used. Answer the question: why should every nation have a cybersecurity strategy? (Make sure that you address the importance of such strategies to small, resource-poor nations as well as to wealthy, developed nations.)
  2. A separate section in which you discuss the common principles and guidelines (similarities) found in both guidance documents (ENISA & CTO).
  3. A separate section in which you discuss the unique aspects of the CTO principles and guidelines for national cybersecurity strategies.
  4. A separate section in which you discuss the unique aspects of the ENISA principles and guidelines for national cybersecurity strategies.
  5. A section in which you present your recommendations to the competition team as to the approach (next steps) they should take in further refining their answer to the competition question: what is the best approach for developing a national cybersecurity strategy?
SKU: enisa-vs-commonwealth-approaches-to-developing-national-cybersecurity-strategies Category:
Share with others

Details

Paper #4: Compare / Contrast the ENISA and Commonwealth Approaches to Developing National Cybersecurity Strategies

Scenario:

 Your company has assigned you to serve as an industry subject matter expert and advisor for a cyber policy competition team for a local university. This year, the team will be competing in an international Cyber Policy competition in Washington, DC. The policy question for this year’s competition is: what is the best approach for developing a national cybersecurity strategy? The competition will have one U.S. team and nine additional teams from Europe (4 teams) and the Commonwealth nations (5 teams).

The university students have asked you to help them understand the problem space and the likely approaches that competing teams will take. To accomplish this goal, you have decided to prepare a white paper in which you compare the European Union Agency for Network and Information Security (ENISA) guidance document for cybersecurity strategies to a similar document prepared by the Commonwealth Telecommunications Organization (CTO). ENISA provides cybersecurity guidance for member states of the European Union (http://europa.eu/index_en.htm ). CTO provides cybersecurity guidance for members of the Commonwealth of Nations (http://www.commonwealthofnations.org/).

Your starting point for your analysis will be outlines of the two documents (Table 1 and Table 2) which were provided to the teams by the competition’s organizers.

Research:

  1. Review the document outlines provided in Tables 1 and 2 (at the end of this document).
  2. Download and review the full documents
    1. CTO: http://www.cto.int/media/fo-th/cyb-sec/Commonwealth%20‌Approach%20‌for%20‌National%20‌Cybersecurity%20Strategies.pdf
    2. ENISA: http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/an-evaluation-framework-for-cyber-security-strategies-1/an-evaluation-framework-for-cyber-security-strategies/at_download/fullReport
  3. Develop five or more points which are common across the two documents. (Similarities)
  4. Identify and review at least three unique items in each document. (Differences)
  5. Research three or more national cybersecurity strategies from EU or Commonwealth nations which were written in or available in English (see the list in Appendix 1 of the CTO document). How comprehensive are these documents when compared to either the ENISA or the CTO guidance? From these documents and the ENISA / CTO guidelines, develop an answer to the question: Why should every nation have a cybersecurity strategy?

Write:

Write a five (5) to eight (8) page white paper in which you summarize your research and discuss the similarities and differences between the two guidance documents. You should focus upon clarity and conciseness more than length when determining what content to include in your paper. At a minimum, your white paper must include the following:

  1. An introduction or overview of national cybersecurity strategies. Explain the purpose of a national cybersecurity strategy and how it is used. Answer the question: why should every nation have a cybersecurity strategy? (Make sure that you address the importance of such strategies to small, resource-poor nations as well as to wealthy, developed nations.)
  2. A separate section in which you discuss the common principles and guidelines (similarities) found in both guidance documents (ENISA & CTO).
  3. A separate section in which you discuss the unique aspects of the CTO principles and guidelines for national cybersecurity strategies.
  4. A separate section in which you discuss the unique aspects of the ENISA principles and guidelines for national cybersecurity strategies.
  5. A section in which you present your recommendations to the competition team as to the approach (next steps) they should take in further refining their answer to the competition question: what is the best approach for developing a national cybersecurity strategy?

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.