Risk Assessment Abstract and Annotated Bibliography

Only available on StudyMode
  • Download(s) : 107
  • Published : April 17, 2012
Open Document
Text Preview
Risk Assessment Abstract and Annotated Bibliography

The Department of Veterans Affairs is one of the largest departments in the United States government. They employ over 300,000 civilian workers providing various services to over 28 million of our nations Veterans to include: education assistance, life insurance, burial benefits, medical benefits, pension and retirement information and finally disability compensation. The function of this department is to continue necessary support of Veterans after they have left the armed services and are attempting to make the transition back into civilian life. The IT Systems and applications that the VA uses currently to support all of these former soldiers and their families have been around for quite some time and while they are functioning there are considered to be antiquated by current technology standards. Cloud computing has recently become very popular within the private sector as well as some government agencies as a way to cut down on cost and decrease the need for physical space for large servers and data centers. OMB has mandated that all of the agencies move towards adopting cloud computing in an effort to stay with the current technology as well as save the government money all the while still trying to maintain the security of the systems. The VA is aggressively moving towards having the majority of all of their applications run within a cloud of some sort. Currently there are internal clouds, with systems being run within the hospitals and data centers around the U.S. They are also now in the process of utilizing third party data centers to support other applications, these applications are considered to be the “external cloud”. The purpose of this risk assessment is to assess the risks that are associated with moving VA applications to the cloud and to discuss plausible tactics to prevent breaches in security while undertaking this major task. The methods that will be used to...
tracking img