Introduction or Overview for OPEN Data
Provided an excellent overview of OPEN Data which provided definitions and addressed the laws, regulations, and policies which require federal agencies to identify and publish datasets and information collections. Discussed the role of the executive branchs Open Data / Open Government policies in making data available via Data.Gov. The overview appropriately used information from 3 or more authoritative sources.
Benefits & Value of Open Data for Businesses and the General Public
Provided an excellent discussion of the value (benefits) of Open Data. Provided five or more specific examples of how government provided Open Data is being used by businesses or the general public. Appropriately used information from 3 or more authoritative sources.
Security Issues for Open Data
Provided an excellent discussion which addressed security issues (e.g. confidentiality, integrity, availability, authenticity, and non-repudiation ) which could impact the usefulness of Open Data. Provided 5 or more specific examples of how these issues are currently addressed by federal policies and plans for Open Data. Mentioned the role that NIST plays in providing guidance for security for Open Data portals and information. Appropriately used information from 3 or more authoritative sources.
Best Practice Recommendations for Open Data Security
Provided an excellent discussion of best practice recommendations for ensuring the confidentiality, integrity, availability, authenticity, and non-repudiation of Open Data. Included 5 or more specific recommendations. Appropriately used information from 3 or more authoritative sources including NIST’s Cybersecurity Framework and NIST SP 800-53.
Summary of Research and Recommendations
Provided an excellent summary of the research and recommendations for this deliverable. Summary was clear, concise, and accurate. Appropriately used information from authoritative sources.
Addressed security issues using standard cybersecurity terminology
Demonstrated excellence in the use of standard cybersecurity terminology to support discussion of security issues. Appropriately used 5 or more standard terms.
Professionalism Part 1: Consistent Use and Formatting for Citations and Reference List
Work contains a reference list containing entries for all cited resources. Sufficient information is provided to allow a reader to find and retrieve the cited sources. Reference list entries and in-text citations are consistently and correctly formatted using an appropriate citation style (APA, MLA, etc.).
Professionalism Part 2: Organization & Appearance
Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.
Professionalism Part 3: Execution
No formatting, grammar, spelling, or punctuation errors.