+1(316)4441378

+44-141-628-6690

Cybersecurity for OPEN Data

Criteria   
Excellent

Criterion Score
Introduction or Overview for OPEN Data
15 points
Provided an excellent overview of OPEN Data which provided definitions and addressed the laws, regulations, and policies which require federal agencies to identify and publish datasets and information collections. Discussed the role of the executive branchs Open Data / Open Government policies in making data available via Data.Gov. The overview appropriately used information from 3 or more authoritative sources.

Benefits & Value of Open Data for Businesses and the General Public
20 points
Provided an excellent discussion of the value (benefits) of Open Data. Provided five or more specific examples of how government provided Open Data is being used by businesses or the general public. Appropriately used information from 3 or more authoritative sources.

Security Issues for Open Data
15 points
Provided an excellent discussion which addressed security issues (e.g. confidentiality, integrity, availability, authenticity, and non-repudiation ) which could impact the usefulness of Open Data. Provided 5 or more specific examples of how these issues are currently addressed by federal policies and plans for Open Data. Mentioned the role that NIST plays in providing guidance for security for Open Data portals and information. Appropriately used information from 3 or more authoritative sources.

Best Practice Recommendations for Open Data Security
15 points
Provided an excellent discussion of best practice recommendations for ensuring the confidentiality, integrity, availability, authenticity, and non-repudiation of Open Data. Included 5 or more specific recommendations. Appropriately used information from 3 or more authoritative sources including NIST’s Cybersecurity Framework and NIST SP 800-53.

Summary of Research and Recommendations
10 points
Provided an excellent summary of the research and recommendations for this deliverable. Summary was clear, concise, and accurate. Appropriately used information from authoritative sources.
8.5 points

Addressed security issues using standard cybersecurity terminology
5 points
Demonstrated excellence in the use of standard cybersecurity terminology to support discussion of security issues. Appropriately used 5 or more standard terms.

Professionalism Part 1: Consistent Use and Formatting for Citations and Reference List
5 points
Work contains a reference list containing entries for all cited resources. Sufficient information is provided to allow a reader to find and retrieve the cited sources. Reference list entries and in-text citations are consistently and correctly formatted using an appropriate citation style (APA, MLA, etc.).

Professionalism Part 2: Organization & Appearance
5 points
Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.

Professionalism Part 3: Execution
10 points
No formatting, grammar, spelling, or punctuation errors.

 

You can place an order similar to this with us. You are assured of an authentic custom paper delivered within the given deadline besides our 24/7 customer support all through.

 

Latest completed orders:

# topic title discipline academic level pages delivered
6
Writer's choice
Business
University
2
1 hour 32 min
7
Wise Approach to
Philosophy
College
2
2 hours 19 min
8
1980's and 1990
History
College
3
2 hours 20 min
9
pick the best topic
Finance
School
2
2 hours 27 min
10
finance for leisure
Finance
University
12
2 hours 36 min
[order_calculator]