Policy Framing Report: Cybersecurity Framework and Controls

Verified

Added on  2023/05/30

|7
|1205
|129
Report
AI Summary
This report delves into the critical aspects of policy framing, focusing on the legal landscape, best practices, and security controls relevant to business management. It begins by identifying applicable laws such as the NG911 Advancement Act, RAY BAUM'S Act, and Kari's Law, highlighting their impact on project management. The report then outlines best practices, emphasizing the importance of operational information sharing. It reviews current policies, standards, and procedures, particularly in the context of the Nextgen project, noting the significance of training and competitive compensation. Furthermore, the report explores security controls, including intrusion of cybersecurity policy and the implementation of firewalls, passwords, and data backups to protect sensitive information. It also addresses the requirements of a cybersecurity framework, specifically version 1.1, and identifies essential measures for securing e-enabled supply chains, such as structured data management. The report concludes by providing a comprehensive overview of the key elements necessary for effective policy framing in a digital environment.
Document Page
Running head: POLICY FRAMING
Policy Framing
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
POLICY FRAMING
Table of Contents
Determine applicable laws...............................................................................................................3
Identify best practices......................................................................................................................4
Review current policies, standards, and procedures........................................................................4
Select and populate security controls..............................................................................................5
Identify requirements for cybersecurity framework........................................................................5
Select appropriate security controls for e-Enabled supply chain.....................................................6
References........................................................................................................................................7
Document Page
3
POLICY FRAMING
Determine applicable laws
The laws that are applicable in the commencement of the business management are as
follows: -
NG911 Advancement Act of 2017
S.2061
115th Congress
Introduced: November 2017
This law states that the modernization of the 9-11 system will be performed with the help
of the law that is stated in order to commence the project management and this is the main reason
that the processing of the management of Nexgen is completed with ease ad this is the sole
reason that the business management is performed with better management of policy building
RAY BAUM'S Act of 2018
H.R.1625 (Division P)
115th Congress
March 2018
This bill directs to the FCC towards the processing of the (1) completion and this is
considered to be one of the main reason that portrays the function of the Nexgen. This
methodology is also responsible for better understanding of the policy building
Kari's Law of 2017
H.R.582
115th Congress
January 2018
Document Page
4
POLICY FRAMING
This law is used in order to commence the processing of the management of the better
management of the system and conduct the functioning in an efficient manner b reducing the
product terminology from 911 to 11
NG911 Advancement Act of 2012
H.R.3630 (Subtitle E)
112th Congress
February 201
This law helps in storing of $115 million for the Nextgen processing in order to process the
better functioning of the project (Johnson, 2015).
Identify best practices
The best practice that is permed by the Nextgen is that the operational information that is
generated is shared amongst the business inaugurals. This leads to the fact that the business
management of the entire project gets easier and this is one of the main reason that results in
better management of the entire project. Again if the data that were generated were not shared
the main problem that would be present is that the higher authorities will not be able to
understand the functioning efficiency of the project. In case this happens the higher authorities
will not be capable enough to understand the flaws that are present in the commencing of the
project.
Review current policies, standards, and procedures
The policy that are present in the projection of the business management of Nextgen
includes provisioning is better in training and this is the reason that the sustainability of the
project management is very high. This is the sole reason that the efficiency of the better
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
POLICY FRAMING
management of the project is performed with the proper management of the project (Koelle &
Strijland, 2013). This is the main reason that the management of the projects are very well
performed, another major advantage that is present in the course of the management of Nextgen
includes the fact that the salary that is provided is the best in class. This is one of the main reason
that the standards of the entire business organization is very high. In case the payment of the
business organization would not have been this high the main issue that would have been present
is that sustainability rate would have decreased
Select and populate security controls
Security controls include intrusion of cyber security policy in the commencement of the
project. This is one of the major reasons that the data that are stored in the data base of the
organization stays protected. In case the projecting of the data is performed with higher security
measures it can be stated that the data will be having a higher security. This is one of the main
reason that the management of the project is well performed (Johnson, 2015).
Identify requirements for cybersecurity framework
Cyber security framework version 1.1 is used. This version mainly deals with the
recovery, identity, protection, detection and responding of the project management issues. This is
one of the main reason that the cybersecurity framework will be performed with high efficiency
The main requirement that are required for keeping the data protected from cybercrimes are
as follows: -
Implementing firewall in the system.
Document Page
6
POLICY FRAMING
The main reason of implementing of the firewall in the data base of Nextgen is that the data
that are stored in the data base will be having a better security and this is the main reason that
implementing the firewall will help in protecting the data
Introducing password and questionnaire
Introducing password and questionnaire includes the fact that the management of the data
that are stored in the data base will be done in an appropriate manner and imposters cannot gain
access the data
Keeping backup
Keeping back up of the data helps in storing the data in a safer manner and this also helps in
restring the data after the data gets deleted in an initial stage (Davis & Davis 2017).
Select appropriate security controls for e-Enabled supply chain
The most important method that can be used for the security control of the e-Enabled
supply chain is by implementing structures in data set management. With the help of the
structuring of data in the data base the main benefit that is enjoyed includes better management
of the data that are stored in the data base (Davis, 2016 April).
Document Page
7
POLICY FRAMING
References
Davis, T. L. (2016, April). Global SESAR1/NextGEN Internet based ATN infrastructure.
In Integrated Communications Navigation and Surveillance (ICNS), 2016 (pp. 1-17).
IEEE.
Davis, T., & Davis, L. (2017). Commercial Aviation Cyber Security: Current State and Essential
Reading. SAE International.
Johnson, C. W. (2015). Cyber Security and the Future of Air Traffic Management: Identifying
the Challenges for NextGen and SESAR.
Johnson, C. W. (2015). Cyber security and the future of safety-critical air traffic management:
identifying the challenges under NextGen and SESAR.
Koelle, R., & Hawley, M. (2012, April). Sesar security 2020: How to embed and assure security
in system-of-systems engineering?. In Integrated Communications, Navigation and
Surveillance Conference (ICNS), 2012 (pp. E8-1). IEEE.
Koelle, R., & Strijland, W. (2013, April). Semantic driven security assurance for system
engineering in SESAR/NextGen. In Integrated Communications, Navigation and
Surveillance Conference (ICNS), 2013 (pp. 1-12). IEEE.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]