Preview

CMGT582 Wk2 IA

Powerful Essays
Open Document
Open Document
1133 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CMGT582 Wk2 IA
Information Security at the United States Department of Defense
Iram Betancourt
CMGT/582
October 29, 2012
Cynthia McGathey

Information Security at the United States Department of Defense

The U.S. Department of Defense (DoD) Information Security policy is managed by the Defense Information Systems Agency. DISA, one of five Combat Support Agencies designated by the Secretary of Defensei, administers “command and control (C2)” functions, information sharing effectiveness, and global operational information infrastructure projects, while providing support to force warfighters, national-level leaders, and coalition friendly forces across a wide range of undertakings. DISA’s perception is to “provide information superiority in defense of the United States.”
A Security Technical Implementation Guide (STIG) is a systematized secured installation and maintenance approach to computer hardware and software. DISA which designs configuration documents in support of DoD, had first coined the phrase under instructions by DoD.
This instruction obligates that “all information assurance (IA) and IA-enabled IT products incorporated into DOD information systems shall be configured in accordance with DOD approved security configuration guidelines”. This mandate provides that recommendations delineated in STIG checklists, will ensure DOD environments address those security requirements.
A desktop computer configuration is an example where STIGs would be beneficial. Most OS (operating systems) are not inherently secure. This leaves them open to criminals (i.e., and computer hackers and personal identity thieves). STIG’s explain how to minimize network-based attacks, and preventing system access when the attacker is present at the device. STIGs also describe maintenance processes (for example: vulnerability patching and software updates).
Developed STIGs might cover the design of a corporate network, covering configurations of routers, firewalls, domain

You May Also Find These Documents Helpful

  • Satisfactory Essays

    ACCT2140 MOD4 CH16 HW LK

    • 586 Words
    • 24 Pages

    After calculating the results per the adjustments and changes of the Cash Flows from Operations Activities, it has been concluded that there is a loss of $773.…

    • 586 Words
    • 24 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3110 P2T1 BIA

    • 653 Words
    • 4 Pages

    DLIS environment consists of more than 5,000 employees and 5,000 contractor. The IT environment contains assets that enable business functions like exchange, active directory, user PCs, Information Databases such as Customer databases, employees/contractors and parent company databases. These assets enable communication between the organization and clients such as the Department of Defense have a high priority as the DLA exists solely for the DoD and its subsidiaries. As the logistics are handled by the DLA, it has a major impact of the ability of the DoD to wage and win wars.…

    • 653 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Secure service: The main objective of this network is to provide secure administrative computing service to DesignIT. It is designed to be functionally and physically isolated from access by people not employed by DesignIT so as to minimize the risk of unauthorized use.…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    g. Security software limits access to programs and data files, and keeps a log of programs and files that have been accessed, which is then reviewed by the security manager daily. Category: 4.3.1, Assertion: Any Assertion…

    • 757 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    SANS - Information Security Resources | Information Security Policy Templates |. (n.d.). Retrieved from http://www.sans.org/security-resources/policies/…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Good Essays

    is4680 lab #2

    • 630 Words
    • 2 Pages

    Security Technical Implementation Guide is a Compendium of DOD Policies, Security Regulations and Best Practices for Securing an IA or IA-Enabled Device (Operating System, Network, Application Software, etc.) A Guide for Information Security. Mandated in DODD 8500.1, DODI 8500.2 and endorsed by CJCSI 6510.01, AR 25-2, and AFI 33-202. The goals of STIG are to provide Intrusion Avoidance, Intrusion Detection, Security Implementation Guidance, Response and Recovery.…

    • 630 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 7 Week 7

    • 594 Words
    • 3 Pages

    This concentration was developed in conjunction with the U.S. National Security Agency (NSA) providing an invaluable tool for any systems security engineering professional. CISSP-ISSEP is the guide for incorporating security into projects, applications, business processes, and all information systems. Security professionals are hungry for workable methodologies and best practices that can be used to integrate security into all facets of business operations(New Horizon,2016)…

    • 594 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.…

    • 299 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    USASOC Pam 25-3, DCSIM User’s Reference Guide. d. USASOC Pam 25-4, Hardware and Software Standards for Desktop and Portable computers. e. USASOC Reg 25-70, ASOCNet Security. f. USASOC Reg 25-71, Redistribution and Reporting Excess Information Mission Area Equipment. g. USASOC Reg 380-3, Malicious Software.…

    • 2469 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Est1 Task 1

    • 623 Words
    • 3 Pages

    The security rule has meaningful standards that are grouped into five categories; administrative safeguard, physical safeguard, technical standards, organizational standards, and policies, procedures, and documentation requirements. Administrative safeguards have several standards that help implement the security rule. The security operation purpose require organizations to evaluate their risks to security and implement policies and procedures that prohibit, detect, and acceptable security violations and to define appropriate approval for security violations. Another, workforce security has three implementation qualifications that are mandatory by the organizations. The organization has to contain policies and procedures to ensure that each members of the particular…

    • 623 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Department of Defense

    • 1357 Words
    • 6 Pages

    The U.S. Department of Defense is the largest employer in the world, employing approximately 3.2 million people on active duty, in the reserves, and in the civilian sector (Alexander, 2012). The Department of Defense is an independent agency operating under the jurisdiction of the Federal Government. More than half of the annual Federal discretionary budget goes to the Department of Defense. There are three departments within the Department of Defense: the Department of the Army, the Department of the Navy and the Department of the Air Force (“Department of defense,”). Additionally, there are innumerable agencies within the Department of Defense, including the Missile Defense Agency, the Defense Advanced Research Projects Agency, and the Defense Intelligence Agency (“Department of defense,”). The purpose of the Department is to provide for homeland security and the protection of American interests abroad through the armed forces, acting on the command of the President, U.S. Congress, and the Secretary of Defense. The Department of Defense is headquartered in Arlington, Virginia, at the Pentagon, and the Department has permanent military bases located throughout the globe.…

    • 1357 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    With newer and better technology, companies continue to update their technological capabilities. With more complex systems the task of managing an IS infrastructure becomes more and more difficult. That being said, each organization will face different and diverse difficulties based on risk plans, standards and procedures, business type, and even globalization. Throughout this review, it is intended to show certain issues that can arise in the areas of configuration management and preventative maintenance, industry standards in configuration management and control, training approaches to allow for adaptive maintenance and confidence, and last but not least the effect of globalization on managing and IS infrastructure. The lack of control to issues arising on each of the previously mentioned areas could result in a disaster to the implementation of a plan and affect the project as a whole as well as the final cost of the project.…

    • 758 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Deploying the right security products – IT security today has a wide range of technologies that are aimed specifically at lowering risks and threats.…

    • 584 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Security Clearance Info

    • 8089 Words
    • 33 Pages

    The Defense Industrial Security Clearance Office (DISCO) is part of the Defense Security Service (DSS), an…

    • 8089 Words
    • 33 Pages
    Powerful Essays
  • Satisfactory Essays

    MGT538 Wk 1

    • 988 Words
    • 3 Pages

    Personal relationships are not as important as a manager. Now we are moving towards leadership vs. management where mentoring and personal relationships can blossom…

    • 988 Words
    • 3 Pages
    Satisfactory Essays