CYB 670 – Project 1
Step 7: Compare International Security Policies (4 pages)
Now that you and the team members have viewed the conference material submission from all the countries, add a column to the policy matrix for each country represented in the conference. In this column, you and the other members of your team will compare and contrast each of their policies to those of your country.
In your comparison, be sure to address the following policy aspects of their submissions:
- security and risk management
- asset security
- communications and network security
- security engineering policies
- identity and access management policy
- data acquisition, preservation, analysis, and transfer
If one or more of the countries do not have a specific policy addressing these issues, that should also be noted in your updated report.
In accordance with your team agreement, a designated team member should submit your policy matrix for feedback.
Step 9: Determine the Methodology and Create the Checklist (3pages)
In this step, your team will continue to develop the security checklist. You and your team members will detail the method used to develop the checklist. While developing your checklist, you should include (but you are not limited to) the following components:
- communications and data-sharing policies and the network devices that will be used to implement these policies
- firewalls and how the rule sets will be determined
- systems certification and accreditation demonstrations as required by network administrators who are hosting the summit
- secure communications protocols
- digital authentication mechanisms—How will your nation team establish PKI systems and develop public/private key mechanisms as well as digital certificates? Will your nation team have a centralized key storage system? How else will you establish trust between the nations? You do not have to build an encrypted communications system for your nation team, but you should provide your plan for trusted communications in your Network Security Checklist.
- SSL and IPSEC protocols
- VPNs
As a team, complete the two- to three-page Network Security Checklist. Then, have a designated member of your team submit the checklist for feedback.


0 comments