Preview

Common Access Card Research Paper

Good Essays
Open Document
Open Document
10021 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Common Access Card Research Paper
The Importance of Keeping and Maintaining My Military (common access card) Card

A United States Army common access card card is a Soldiers best friend, it keeps the Soldier and his Government secure, identified, protected from enemy threats. The common access card card is my only way past the gates each morning. The common access card card allows a Soldier access to several thousand pieces of classified information and training. The card also allows me to access innumerable benefits inside the Army, and limitless discounts inside and outside the Army. Also safe and effective navigation through army life with my special Department of Defense issued identification card. A common access card card has seemingly limited uses but its
…show more content…

The card not only allows me access through the gates, allows the gate guards to identify me as a Soldier, what kind of Soldier and not a civilian or terrorist or criminal; the card allows me to go through the express lane which saves me time and gas, which is also good for my work ethic and bank account. I don’t wanna be waiting in line burning time and money aka fuel when I could be getting things done faster with my common access card card in the express lane. If a Soldier or Terrorist in ACU’s ever tries to get past or breech the gates without a common access card card the citizenry on Ft Hood can be assured that the person(s) will have their car messed up by the huge steel bars that block the driving entry paths, the person(s) or Terrorists will be shot at, chased down by Ft Hood Military Police, jailed, interrogated, and then further action will be taken from there. The FBI, CIA, anything and everything to ruin that person{s} life. Those people, that Soldier, or Terrorists risk Leavensworth, or Guantanamo if anyone ever tried to seriously breech the gates; even if was just an innocent, mentally ill Private who lost his common access card card and wanted to get to work ontime trying to get in unseen. The common access card card system at the gates coupled with car inspections: when they search for bombs and guns by making you open all compartments inside your car and they use a flashlight and look inside, sometimes using a mirror to check under random or suspicious looking vehicles done by Gate Guard Personel; or when especially lucky random or suspicious cars get seleted to get every single item and article gone through and thrown out looking for Terrorist stuff. These things have had a really really really high

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It’s my pleasure to provide this recommendation for SSG Soto, Christiana as he pursues a security clearance in order to growth and server The United States Army Honorably. As his supervisor on the Cadet Leader Development (CLD) Program for internationals and nationals Cadets for the past two years; I’ve worked closely with SSG Soto on a day-to-day basis. I'm confident that SSG Soto will sustain the standard, policies and laws that are subject required to embrace a security clearance. Please allow me to give three examples of SSG Soto qualifications for his clearance.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Fast Streaming A collection of techniques that enables Windows Media Player to begin displaying streamed multimedia content more quickly.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Good Essays

    When you create a table in Datasheet view, you can use the options in the Database group on the Fields tab to add fields to your table.…

    • 585 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Military identification cards and dog tags are generally required components of military uniforms. Military ID cards are required to travel on and off military installations, access commissaries and Post Exchanges and serve as an indication of a service member's rank, branch of service and the Geneva Convention Category he or she falls under. Dog tags (also called identification tags) serve to show a service member's name, Social Security number, blood type and religious preference in case the service member becomes a casualty. Army regulation 670-1 requires that soldiers carry a military-issued identification card at all times, whether in or out of uniform. It also mandates that soldiers traveling or living overseas wear dog tags at all times (even in civilian clothing), and states that every soldier in uniform must include them as part of their duty uniforms. Soldiers conducting routine daily activities may be at risk of becoming a casualty; if a soldier loses consciousness or is unable to communicate, dog tags are read to gain important information. Dog tags contain information that can notify responders whether the service member has allergies, indicates his blood type and displays his name and Social Security number so the service member can be properly identified.…

    • 559 Words
    • 3 Pages
    Good Essays
  • Good Essays

    As a network engineer it is very important to keep the network available for users at all times. “A highly available network means that the network and the applications that are used on it are both operational and accessible at all times” (CiscoPress 2008 p. 124). Working as a network engineer I am always on call because there is someone always using the network. “An always on facility is needed to maintain the business-critical apps” (Volonino 2011). The network is monitored 24 hours 7 days a week even if no one is scheduled to be in the office we still have to monitor the network to make sure there are not outages are hiccups along the way. If there is a network outage are any bandwidth issues that come up, I need to be able to run diagnostics and be able to manage the switches and routers as needed 24 hours 7 days a week just in case, and if something does happen I need to be able to find out what is causing this issue before it becomes a major problem. We also have to monitor all of our network equipment to make sure there is no unusual behavior like a Denial Of Service (DoS) or security breaches. Each engineer on our team has a laptop that we take home with us so when we are on call it is easy to vpn into our corporate network to run diagnostics on the network equipment to make sure everything is functioning properly. The majority of devices we us on our network are Cisco devices. Cisco systems offer a software application called LMS (Cisco Works LAN Management Solution). LMS is a centralized system for sharing device information across all LAN management applications (Cisco 2012). We use the LMS software to monitor equipment, traffic, and users. I use this software to do the majority of my daily work. Recently cisco developed a mobile app for this software application for iPhone and Droid OS. This gives me a huge advantage because when I am on call I don’t have to lug my laptop around with me all the time and I can still monitor the equipment and run…

    • 763 Words
    • 4 Pages
    Good Essays
  • Good Essays

    In today’s world, most businesses rely heavily on the use of information technology ad information systems. Corporate communication is usually dependent upon wired as well as wired networks within the company. With these networks being set up in businesses, there has been a major shift in data storage to using computers to store and transfer data instead of the traditional ways of using paperwork and hard copies. Companies can securely share information with other companies through the use of virtual private networks, called VPNs. My current occupation is very technologically driven.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In society today it has become increasingly necessary to effectively use technologically advanced Information systems and software applications to run an organization. In our technologically advanced and dynamic society, organizations are being pushed to use and operate updated and advanced information systems and software applications to store information, process data and effectively manage day to day operations. In this paper the subject discussed will be how a CIS (computer information systems) can help an organization, what they are, and an example of a CIS and its uses in a retail environment.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Access Control Simulation

    • 698 Words
    • 3 Pages

    Upon entry the door was locked and a key card was required for this single point of entry. There were security cameras outside of the building. There was a dumpster outside that was not secured, which could allow anyone access to sensitive information. Locking the dumpster or placing it in a secured location would mitigate this risk. The receptionist did not ask me to verify my identity. The receptionist should be required to verify the identity of everyone entering building to prevent a person from entering the building that isn’t authorized. There was a security room with security personnel viewing the monitors. Office 1-1 had a post it note taped to computer monitor with names that could be passwords. Increased password security should be implemented to reduce the risk of someone hacking into a system. Both office 1-1 and 1-2 had fingerprint scanners, which increases access control. In office 1-2 there was an unattended paper shredder, which should be secured due to sensitive information. In the hallway there was a security camera and a utility box but the wire cabinet was not locked. As such, anyone can access the hardware inside. A lock should be installed to prevent unauthorized access to the hardware. Also in the hallway there was an Ethernet jack which allowed access to the internet. Controls should be put in place to require security access to logon to the network.…

    • 698 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In the Army, there are a variety items that fall under the “sensitive items” category. In today’s modern politics, they have chosen to cut the budget down to a very small size for the military. Therefore, securing valuables such as issued items which include: helmets. IBA, IOTV, and anything else issued to you by the United States Army, is extremely important. This not only saves the Department of the Army money, but securing anything you may have also protects you, and in the long run, saves you money as well. If you leave anything unsecured or out in the open, that alone leaves it at a high risk of being stolen or damaged. Say one day you leave your helmet, body armor, or any other type of TA-50 (issued items) in your car. You decide that…

    • 586 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ever since the credit card was invented, the transactions were much easier compared to the pass as a swipe of the card would settle up the large payment instead of bringing large amount of cash which would have risk of getting rob. A credit card is a small plastic card which will be issued to the users as a system of payment in transactions. In 1950, the concept of using the same card for various payments was found out by Ralph Schneider and Frank X. McNamara, founders of Diners Club. How does it actually work? The issuer of the card will offers a line of credit to the consumer and allowing them to borrow money to pay up a merchant or known as a cash advance to the user.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Accountablitly and how it has a roll in the Army. One type of accountability is personal item accountability for instance your wallet and ID. As a PFC and in the Army for almost 2 years i know how important accountablitly of personal items are and expecally possible security risk items.According to AR735-5 Army property is considered as follows; Army property is all property under the control of the Department of the Army (DA) except property accounted for as owned by a nonappropriated fund (NAF) activity. It must be accounted for on a property account unless specificallyexempted by an AR. Property leased by an Army activity is considered Army property for accounting purposes.Property loaned to a non-Army activity remains Army property. Real property accounts for all assets on the installation regardless of who funded the construction or pay for sustainment (except privately owned) will be reflected in the installation real property inventory.Property built by NAF, Air Force, and Navy are considered tenants on the installation and will be reflected as such in the inventory (see Security risk items can be any of the following: CAC card ID, SIPR tokens, DAGRs, used Hard Copy paper,ect. Loss ofany of these items can hurt the battery on many levels.The CAC Card is a multy use identifcation card. it allows you access to military instalations, use of government computers, verifaction of id for uraniry analasis, social security number(if you have an older CAC card)and access to other personal data that can lead to stolen identaties. Any out side source trying to negetivly affect our armed services and or counrty could use our CAC cards to figure out how they work and gain access to our secure bases and or computers. An enemy of the United States on our installations cause a sever security risk because gathering information on our troops movements, and locations of important buildings such as the Base Defense Operations Center or even our dinning facilitys. These…

    • 778 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Officials said roughly 15 lost or stolen cac cards are replaced each day and one-third of them are for repeat offenders. While the statistic may not trigger alarms, it is a cause for concern among base officials. After all, only 5 percent of lost cards are found and turned in.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Because of all of this personal identification about you is stored on this card it is essential that you always keep this card on you. If you were to lose this card many things could happen; for example since it states that you are part of that government facility or base and you don’t have it you can be rejected from going to where you need to be. If you don’t have it on you when you are about to try to gain access to a government network you will not be able to log on. Someone could find out your personal identification number that you use to log on to the network and gain confidential information or access sites that you are not allowed to, therefore resulting in a punishment for something you did not do. The other reason to constantly keep your CAC card on you could be…

    • 517 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The Opium Debate

    • 234 Words
    • 1 Page

    Diana Ahmad in The Opium Debate and Chinese Exclusion Laws in the Nineteenth-Century American West (University of Nevada Press, 2007) argues that in addition to the traditional explanations for the Chinese Exclusion Act, (economic, political and more recently, prostitution) smoking opium was part of the reason many Anglo-Americans pushed for Chinese exclusion. Ahmad also distinguishes smoking-opium and medicinal-opium as two separate entities, claiming that it was the smoking variety that offended the moral character of Anglo-Americans.…

    • 234 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Children are our society’s most valuable and fragile resources. It is our responsibility as parents, adults, and caregivers to provide our children with as many safeguards to protect them from physical and virtual dangers. Children are spending more and more time on the internet and without the proper protection and supervision they can be exposed to indecent or harmful material or predators that seek to harm them. “What children are encountering on the Internet, particularly in terms of indecent or otherwise unsuitable material or contacts with strangers who intend to do them harm, is an issue of major concern.” (Smith, 2001). The Children’s Internet Protection Act (CIPA) of 2000 and the Children’s Online Privacy Protection Act (COPPA) of 1998 were put in place as an attempt to protect our children from the harm that could befall them on the internet from harmful materials and predators that target children.…

    • 794 Words
    • 4 Pages
    Good Essays