• Make Order

  • order processing

  • Approve and Get
    your Order
Order Now

Cybersecurity for OPEN Data

Criteria   
Excellent

Criterion Score
Introduction or Overview for OPEN Data
15 points
Provided an excellent overview of OPEN Data which provided definitions and addressed the laws, regulations, and policies which require federal agencies to identify and publish datasets and information collections. Discussed the role of the executive branchs Open Data / Open Government policies in making data available via Data.Gov. The overview appropriately used information from 3 or more authoritative sources.

Benefits & Value of Open Data for Businesses and the General Public
20 points
Provided an excellent discussion of the value (benefits) of Open Data. Provided five or more specific examples of how government provided Open Data is being used by businesses or the general public. Appropriately used information from 3 or more authoritative sources.

Security Issues for Open Data
15 points
Provided an excellent discussion which addressed security issues (e.g. confidentiality, integrity, availability, authenticity, and non-repudiation ) which could impact the usefulness of Open Data. Provided 5 or more specific examples of how these issues are currently addressed by federal policies and plans for Open Data. Mentioned the role that NIST plays in providing guidance for security for Open Data portals and information. Appropriately used information from 3 or more authoritative sources.

Best Practice Recommendations for Open Data Security
15 points
Provided an excellent discussion of best practice recommendations for ensuring the confidentiality, integrity, availability, authenticity, and non-repudiation of Open Data. Included 5 or more specific recommendations. Appropriately used information from 3 or more authoritative sources including NIST’s Cybersecurity Framework and NIST SP 800-53.

Summary of Research and Recommendations
10 points
Provided an excellent summary of the research and recommendations for this deliverable. Summary was clear, concise, and accurate. Appropriately used information from authoritative sources.
8.5 points

Addressed security issues using standard cybersecurity terminology
5 points
Demonstrated excellence in the use of standard cybersecurity terminology to support discussion of security issues. Appropriately used 5 or more standard terms.

Professionalism Part 1: Consistent Use and Formatting for Citations and Reference List
5 points
Work contains a reference list containing entries for all cited resources. Sufficient information is provided to allow a reader to find and retrieve the cited sources. Reference list entries and in-text citations are consistently and correctly formatted using an appropriate citation style (APA, MLA, etc.).

Professionalism Part 2: Organization & Appearance
5 points
Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.

Professionalism Part 3: Execution
10 points
No formatting, grammar, spelling, or punctuation errors.

You can leave a response, or trackback from your own site.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes