Introduction or overview for State Government IT Security Policies
The information in the state government is secured by implementing the IT policies that are structured by branches of the state government. Each state develops policies for managing information in the local area. For example in the federal state such as the United States, different policies have been implemented in each state to secure information. The security policies, therefore, regulate the access to the system in the state and the kind of information available. Good policies are best in protecting the citizens of that state but not the information system only. Generally, the policies are used to protect the citizens of the state and securing the information system. Security-related crimes such as the Cyber-crime are protected using the policies that define the standards and the vulnerability of the factors affecting the security. The state should, therefore, implement the IT security policies to protect the citizens and regulate the information system. The protection of information system has become a big issue of concern due to more cases of insecurity to information systems that are reported. Moreover, the security IT policies help to strengthen the existing policies on security hence compacting the related crimes within the state.
Common principles, policies, guidance between the two IT Security Policies
The two states selected are Arizona and Colorado.
Both states have incorporated a good governance to manage the IT security system in the Security policy. The governance consists of various other departments and functions. The governance helps in coordinating the security of information across the state.
Both states have the cybersecurity department in controlling the information. The department in Arizona is called the enterprise security controls while in Colorado it is called the Cybersecurity. The two departments are mandated with the task of ensuring the information is protected by initiating different programs such as the security management, compliance and a security program which is best in creating codes to protect the systems in Colorado. On the other hand, the information protection in Arizona is enhanced by creating security information and event management. The policy protects the data from getting a loss, authentication of information; sever hardening among other measures to strengthen the security of the information.
In both, there is a policy that requires each state to have a program of implementing the security systems to information in the states. For instance, in Arizona, there is the Arizona Network that is being implemented to add more force to the existing security apparatus. The other program is Business Re-Engineering (BREAZ) which is an initiative of replacing the older method with the new one. In Colorado, there are policy programs such as the cybersecurity program that takes charge of the information management in the state. The program is through the security management initiative which manages the security policies and standards across all the departments. Others include the compliance program and the security program. The compliance program encourages the citizens to comply with the laws and regulate the Information Security in the state.
Unique Aspects of State IT policies
There are several unique aspects.
In Colorado, most of the programs have been fully implemented to strengthen the security policies in the state while in Arizona most of the programs are yet to be implemented. The programs form the general guidelines to the security policies in the state.
In Arizona, the services to the security of information mainly concentrate on enterprise security controls while in Colorado it is fully controlled in the cybersecurity program that is fully implemented. However, in Colorado, there is a specific department while in Arizona the department is not specific to managing security policies.
In Arizona, there is the establishment of information security and private office while in Colorado the information security is controlled by the information security officer. The office in Arizona facilitates strategic planning and coordination for information technology security. The state officer manages the security in the state. The officer coordinates the risks and monitors compliance with the laws and principles of the state. In Colorado, the security officer updates the information securities and policies. The officer is in charge of ensuring that the citizens and other parties comply with the security of the information system.
In dealing with cybersecurity, Colorado has programs for managing cybersecurity while in Arizona there are no well outlined in their policies.
In general, Colorado has the best approach to managing cybersecurity than Arizona due to the strong systems that are in place
In Arizona, the policies and standards are based on Enterprise Architecture (EA) which provides the best practices and technical standards in Arizona. Some of the policies include the data interoperability policy which defines the manner in which data is exchanged and shared while in Colorado there is a special policy that concentrates on cybersecurity.
Summary of Research and Recommendations
The state government should address the authentication problem
Authentication is important in cyber-security management. The policies should be reorganised to support the authentication mechanism. When there is authentication in many processes, the security of the information system will advance to the next level. The information technologist officers should incorporate authentication in the state policy

Focusing on more secure alternative methods in managing the IT system security
New technologies should be used to manage the cyber security. Cyber security is dynamics and the criminals use new methods to gain access into the system. The state should include a policy of encouraging the new adoption of technologies.

Published by
Essays
View all posts