Preview

Army Knowledge Management Research Paper

Good Essays
Open Document
Open Document
827 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Army Knowledge Management Research Paper
Army Knowledge Management Principles
As the world continues to evolve and change at a rapid pace, it is critical to utilize a secure forum that will allow information sharing. Unfortunately, creating a digital forum for information sharing leads to the possibility of information falling into the hands of adversaries. Adhering to the principles of the Army Knowledge Management will transcend the way business is conducted soon.
Principle Six: Protecting and securing information and knowledge assets bring a challenge for all parties involved. Transitioning to a digital infra-structure causes a greater need to protect and secure information even though it gives US forces an advantage to communicate over a large geographical area. David F. Drab
…show more content…
Adhering to regulations and policies provide the best solutions to enforce security. Adversaries continue to deploy new software to breach systems infra-structures. Users must utilize the same vengeance in seeking additional training to aid in protecting communities with relevant information. The best security approach is proactive not reactive.
Most companies thrive on its utilization of knowledge assets. Human involvement in this process creates a vulnerability. Therefore, these knowledge assets need protection from those that do not need to know.
Principle Seven: Embed knowledge assets in standard business processes is critical to promote understanding. Embedded knowledge such as videos and simulations help readers avoid misinterpretations. Having access to the best practices and after action reviews eliminates the need for others to recreate the wheel if they are going through similar scenarios. Those that need to know are provided unlimited resources through links to podcasts to enhance operations and routines.
Digital media within a search reduces the time it takes to perform multiple searches. Thus, the researcher can focus on the task at hand because a search within a search is available. Embedded assets allow for a single central point to access research
…show more content…
Authentication tokens do not require information to be stored on the server thus increasing speed of the session. The configuration of the single sign-on portal is critical to the success of maintaining the high level of security.
From an audit trail stand point, single sign-on users leave a distinct blueprint of how credentials are used. In the event of a user account being compromised, audit tools can easily identify where the breach took place, what happened during the breach and which accounts were breached. Therefore, single sign-on is like a digital fingerprint of the user. Using a standard process attracts users because of its simplicity. Less complexity and familiarity with an application like the Army Knowledge Online enhances the user-friendly approach to share best practices, embed links, and collaborate ideas to preserve knowledge for generations to come.
In conclusion, the Army Knowledge Management principles will transform the landscape of knowledge sharing. Losing best practices and new ideas will become a thing of the past. A single sign-on will allow groups in a different geographical location to collaborate on policies and procedures to improve the efficiency and the productivity in the way the Army conducts

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    34. Kerberos is an example of a single sign-on system providing enterprises with scalability and flexibility.…

    • 352 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    CMGT582 Wk2 IA

    • 1133 Words
    • 4 Pages

    The U.S. Department of Defense (DoD) Information Security policy is managed by the Defense Information Systems Agency. DISA, one of five Combat Support Agencies designated by the Secretary of Defensei, administers “command and control (C2)” functions, information sharing effectiveness, and global operational information infrastructure projects, while providing support to force warfighters, national-level leaders, and coalition friendly forces across a wide range of undertakings. DISA’s perception is to “provide information superiority in defense of the United States.”…

    • 1133 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Corporation Tech will face many security risks with their current network. The user domain is the single most vulnerable part of any network and as such poses the most obvious security risk. To mitigate risks involving the users is to implement policies and training to educate the user on proper use and security best practices. By educating the user on security practices such as secure passwords, safe web surfing, and securing their workstations, many potential attacks can be avoided. Policies and training are also necessary because they can be used as evidence when taking administrative action against a user or intruder in the event the system or data information is compromised.…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

     User names and passwords  Patents and copyrights  Source code  Diplomatic information  Financial data NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Good Essays

    Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.…

    • 299 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Better Essays

    TM 9 1015 252 10 M119A2

    • 61728 Words
    • 488 Pages

    the Army of the United States, that it will be used for military purposes only, that individual or corporate rights originating in the information,…

    • 61728 Words
    • 488 Pages
    Better Essays
  • Good Essays

    independent

    • 759 Words
    • 4 Pages

    4 Thesis Statement: Today I’d like to explain three steps that experts recommend for online security…

    • 759 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Itm 309 Exam Two Note

    • 6414 Words
    • 26 Pages

    Ethics – the principles and standards that guide our behavior toward other people  Issues affected by technology advances: 1) Intellectual property- Intangible creative work that is embodied in physical form 2) Copyright- The legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents 3) Fair use doctrine- In certain situations, it is legal to use copyrighted material 4) Pirated software- The unauthorized use, duplication, distribution, or sale of copyrighted software 5) Counterfeit software- Software that is manufactured to look like the real thing and sold as such  Privacy is a major ethical issue 1) Privacy – the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent 2) Confidentiality – the assurance that messages and information are available only to those who are authorized to view them…

    • 6414 Words
    • 26 Pages
    Powerful Essays
  • Powerful Essays

    The Security of Cloud Computing System enabled by Trusted Computing Technology Zhidong Shen International School of Software, Wuhan University, Wuhan, China, 430079 zhidongshen@163.com Qiang Tong School of Software, Northeastern University, Shenyang, China, 110004 qiang.tong@163.com Abstract—Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. Since cloud computing share distributed resources via the network in the open environment, thus it makes security problems important for us to develop the cloud computing application. In this paper, we pay attention to the security requirements in cloud computing environment.…

    • 3993 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Information Superiority

    • 1032 Words
    • 5 Pages

    • FM 3-0, June 2001, Operations • FM 100-6, August 1996, Information Operations • Joint Publication (JP) 3-13, 13 February 2006, Information Operations • National Security Strategy, September 2002 • Joint Vision 2020 • Exploring Information Superiority, 2004 • Defense Information Superiority, GAO, August 1998 • Quadrennial Defense Review Report, Feb 2, 2006…

    • 1032 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    1. Knowledge Management lets you lead change so that change does not lead you. (Points : 10)…

    • 332 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    • As well as how to deploy an appropriate set of flexible countermeasures. Three Assumptions • Three major assumptions underlie this course: • Assumption One – Effective Information security requires an integrated set of business and technological processes.…

    • 6871 Words
    • 51 Pages
    Powerful Essays