Compare and Contrast IT Security Policies (State Governments)

Question: Compare / Contrast Two Propound Synod IT Pawn PoliciesScenario: Volunteers own been recruited to aid propound synods rectify their cyberpawn habits. The coordinating committee has ruled that the chief function these volunteers promise get be a relatively decomposition which examines the strengths and weaknesses of material IT Pawn Policies for propound synods (agencies and dutys of the adherent shoot beneath the example of the propound governors). Since you volunteered forthcoming, you own your glean of any two propounds' IT Pawn Policies from the register published by the Multi-State Information Sharing and Decomposition Center (MSISAC). (See part #1 beneath Research.) Research: 1.    Select two propound synod IT Pawn Policies. Use the register at https://msisac.cisecurity.org/state/   (if you engagement a gentle coalesce, you may pursuit for that propound's device or adopt a opposed propound). 2.    Download and reconsideration your selected propound synods' IT Pawn Device instruments. 3.    Develop five or past points which are dishonorable despite the two instruments. (Similarities) 4.    Identify and reconsideration at last three choice parts in each instrument. (Differences) 5.    Repursuit best habits for IT Pawn and/or IT Pawn Policies for propound synods. Here are two  sources which you may confront aidful: a.    http://www.nascio.org/Portals/0/Publications/Documents/Deloitte-NASCIOCybersecurityStudy_2014.pdf   b.    http://www.nascio.org/Portals/0/Publications/Documents/NASCIO-SecurityFrameworks.pdf   6.    Using your repursuit and your comparison of the two device instruments, clear an acceptance to the question: Why should whole propound synod own an IT pawn device for propound agencies and dutys beneath the propound's adherent shoot? Write: Write a five (5) to view (8) page innocent monograph in which you digest your repursuit and debate the similarities and differences among the two IT pawn device instruments. You should rendezvous upon clarity and succinctness past than diffusiveness when determining what resigned to emorganization in your monograph. At a reserve, your innocent monograph must emorganization the forthcoming: 1.    An preliminary or overview of IT Pawn Policies for the adherent shoot of propound synods (covering propound agencies and dutys in the adherent shoot including the governor's duty). Explain the scope of an IT pawn device and how it is used. Acceptance the question: why should whole propound in the race own a ample IT pawn device for propound agencies and dutys? (Make unfailing that you oration the consequence of such strategies to minute, resource-poor propounds as well-behaved-behaved as to ample or rich propounds.) 2.    A detached exception in which you debate the dishonorable principles and device exceptions / propoundments (similarities) base in twain IT pawn device instruments. 3.    A detached exception in which you debate the choice aspects of the chief propound's IT pawn device instrument. 4.    A detached exception in which you debate the choice aspects of the cooperate propound's IT pawn device instrument. 5.    A exception in which you debate your evaluation of which propound synod has the amend of the two IT pawn device instruments. You should to-boot bestow best habit domiciled recommendations for rectifyments for twain IT pawn device instruments. (Note: you may own opposed recommendations for the identical policies depending upon the characteristics of each instrument.) 6.    A detached exception in which you digest your repursuit and recommendations. Submit For Grading Submit your innocent monograph in MS Account format (.docx or .doc finish) using the OPEN Data Assignment in your assignment folder. (Attach the finish.) Additional Information 1.    Your innocent monograph should use criterion provisions and definitions for cyberpawn concepts. The forthcoming sources are recommended: a.    ISACA Glossary http://www.isaca.org/pages/glossary.aspx b.    Guidelines on Pawn and Privacy in Public Cloud Computing http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-144.pdf 2.    You are expected to belief your sources using in-text citations and intimation register entries. Twain your citations and your intimation register entries must render after a while APA 6th edition Diction requirements. Failure to belief your sources get product in penalties as granted for beneath the university's Academic Integrity device. 3.    Use APA 6th edition diction (formatting) for the construction and coming of the MS Account instrument that you suggest to your assignment folder. This embodys margins, exception headings, and congruous use of fonts (Times New Roman 12 in sombre), paragraph dictions (chief verse clog by ½ inch), and verse spacing (double). Formatting requirements and examples are base beneath Course Resources > APA Resources. Your finish should hold twain a inscription page and a detached References page. Use page breaks to enunfailing that the inscription page and intimations page are detached from the organization of the monograph. 4.    You are expected to transcribe grammatically redress English in whole assignment that you suggest for grading. Do not round in any labor after a whileout (a) using attraction curb, (b) using rhetoric curb, (c) verifying that your punctuation is redress and (d) reconsiderationing your labor for redress account custom and redressly structured sentences and paragraphs.