Preview

CMGT582 Wk2 IA

Powerful Essays
Open Document
Open Document
1133 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CMGT582 Wk2 IA
Information Security at the United States Department of Defense
Iram Betancourt
CMGT/582
October 29, 2012
Cynthia McGathey

Information Security at the United States Department of Defense

The U.S. Department of Defense (DoD) Information Security policy is managed by the Defense Information Systems Agency. DISA, one of five Combat Support Agencies designated by the Secretary of Defensei, administers “command and control (C2)” functions, information sharing effectiveness, and global operational information infrastructure projects, while providing support to force warfighters, national-level leaders, and coalition friendly forces across a wide range of undertakings. DISA’s perception is to “provide information superiority in defense of the United States.”
A Security Technical Implementation Guide (STIG) is a systematized secured installation and maintenance approach to computer hardware and software. DISA which designs configuration documents in support of DoD, had first coined the phrase under instructions by DoD.
This instruction obligates that “all information assurance (IA) and IA-enabled IT products incorporated into DOD information systems shall be configured in accordance with DOD approved security configuration guidelines”. This mandate provides that recommendations delineated in STIG checklists, will ensure DOD environments address those security requirements.
A desktop computer configuration is an example where STIGs would be beneficial. Most OS (operating systems) are not inherently secure. This leaves them open to criminals (i.e., and computer hackers and personal identity thieves). STIG’s explain how to minimize network-based attacks, and preventing system access when the attacker is present at the device. STIGs also describe maintenance processes (for example: vulnerability patching and software updates).
Developed STIGs might cover the design of a corporate network, covering configurations of routers, firewalls, domain

You May Also Find These Documents Helpful

  • Powerful Essays

    The proposed network is designed to serve DesignIT which consist 56’x36’ office space, 4 cubicles, 1 office, 1 server room, 1 receptionist desk and 1 conference room.…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Project Part 1 Task 1

    • 1367 Words
    • 6 Pages

    The Senior Management of the Defense Logistics Information Services (DLIS) has decided to update the previous risk management plan with a developing, new risk management plan. This new risk management plan will not only minimize the amount of risk for future endeavors, but will also be in compliance with regulations such as the Federal Information Security Management Act (FISMA), Department of Defense (DOD), Department of Homeland Security (DHS), National Institute of Standards and Technology (NIST), Control Objects for Information and Technology (COBIT), and Information Assurance Certification and Accreditation Process (DAICAP).…

    • 1367 Words
    • 6 Pages
    Better Essays
  • Good Essays

    is4680 lab #2

    • 630 Words
    • 2 Pages

    Security Technical Implementation Guide is a Compendium of DOD Policies, Security Regulations and Best Practices for Securing an IA or IA-Enabled Device (Operating System, Network, Application Software, etc.) A Guide for Information Security. Mandated in DODD 8500.1, DODI 8500.2 and endorsed by CJCSI 6510.01, AR 25-2, and AFI 33-202. The goals of STIG are to provide Intrusion Avoidance, Intrusion Detection, Security Implementation Guidance, Response and Recovery.…

    • 630 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Security Awareness Policy

    • 1733 Words
    • 3 Pages

    Security guidance must exist in the form of formal written policies and procedures that define…

    • 1733 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    These system security policies, standards, and procedures that have been established for the Corporation Tech System, are intended to comply with the regulations and policies set down by the State of Florida, Corporation Tech, and the Federal Information Security Management Act (FISMA).…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Good Essays

    Est1 Task 1

    • 623 Words
    • 3 Pages

    The security rule has meaningful standards that are grouped into five categories; administrative safeguard, physical safeguard, technical standards, organizational standards, and policies, procedures, and documentation requirements. Administrative safeguards have several standards that help implement the security rule. The security operation purpose require organizations to evaluate their risks to security and implement policies and procedures that prohibit, detect, and acceptable security violations and to define appropriate approval for security violations. Another, workforce security has three implementation qualifications that are mandatory by the organizations. The organization has to contain policies and procedures to ensure that each members of the particular…

    • 623 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    g. Security software limits access to programs and data files, and keeps a log of programs and files that have been accessed, which is then reviewed by the security manager daily. Category: 4.3.1, Assertion: Any Assertion…

    • 757 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Department of Defense

    • 1357 Words
    • 6 Pages

    The U.S. Department of Defense is the largest employer in the world, employing approximately 3.2 million people on active duty, in the reserves, and in the civilian sector (Alexander, 2012). The Department of Defense is an independent agency operating under the jurisdiction of the Federal Government. More than half of the annual Federal discretionary budget goes to the Department of Defense. There are three departments within the Department of Defense: the Department of the Army, the Department of the Navy and the Department of the Air Force (“Department of defense,”). Additionally, there are innumerable agencies within the Department of Defense, including the Missile Defense Agency, the Defense Advanced Research Projects Agency, and the Defense Intelligence Agency (“Department of defense,”). The purpose of the Department is to provide for homeland security and the protection of American interests abroad through the armed forces, acting on the command of the President, U.S. Congress, and the Secretary of Defense. The Department of Defense is headquartered in Arlington, Virginia, at the Pentagon, and the Department has permanent military bases located throughout the globe.…

    • 1357 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Hcs 483 Wk1Dq1 2

    • 457 Words
    • 2 Pages

    Prior to the enactment of the Health Insurance Portability and Accountability Act (HIPPA) health information was able to be shared without the knowledge or permission of the patient. This information was available to just about anyone including insurance agencies, places of employment and even loan lenders. People would potentially use individuals’ health information to deny them work or a loan for their home and even impacting higher insurance rates or denial of coverage. According to U.S. Department of Health and Human Services (n.d.), “The Privacy Rule establishes a Federal floor of safeguards to protect the confidentiality of medical information. State laws which provide stronger privacy protections will continue to apply over and above the new Federal privacy standards.” (para. 1). Also, as medical records continue to move entirely to the new standard of electronic records it is important to have one standard across the country to protect everyone’s information. Electronic health records (EHR) make it easier than ever to accidentally share medical information, to include having it stolen. Medical providers are just as likely to face consequence if their facility is broken in to and the hard drive with patients information is stolen as they would be if they gave the information away themselves. In general HIPPA protects patients’ information as well as their right to be treated equally.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3110 P2T1 BIA

    • 653 Words
    • 4 Pages

    DLIS environment consists of more than 5,000 employees and 5,000 contractor. The IT environment contains assets that enable business functions like exchange, active directory, user PCs, Information Databases such as Customer databases, employees/contractors and parent company databases. These assets enable communication between the organization and clients such as the Department of Defense have a high priority as the DLA exists solely for the DoD and its subsidiaries. As the logistics are handled by the DLA, it has a major impact of the ability of the DoD to wage and win wars.…

    • 653 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Integrated Distributors Incorporated (IDI) will establish specific requirements for protecting information and information systems against unauthorised access. IDI will effectively communicate the need for information and information system access control.…

    • 1356 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The Federal Acquisition Regulation (FAR), issued by the Department of Defense, guides the content of military contracts. Federal government organizations other than the military and intelligence agencies must follow the Federal Information Security Management Act of 2002. Federal Information Processing Standards (FIPS) 200, "Minimum Security Requirements for Federal Information and Information Systems," defines the minimum security requirements that information systems must meet. While the military does not have to follow FISMA, they do enact the security policies contained in the act. The military also implements the security controls found in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37, Guide for Applying the Risk Management Framework to Federal Information Systems; and NIST SP 800-53, Recommended Security Controls for Federal Information Systems and Organizations. NIST SP 800-53, Appendix F, contains the Security Control Catalog. There is currently no specific law directing the information security policy content for defense contractors. However, Congress is proposing to make the policies in FISMA and the security controls in NIST SP 800-53 applicable to contractors that are awarded military contracts. Information Assurance Implementation, DoD Instruction 8500.2, states the computer network security controls required to be implemented in military computer networks (Enclosure 4, Attachments 1 thru 5). The other references noted in this paper give broad…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Cmi 5002

    • 3289 Words
    • 14 Pages

    The following report is going to explain about decision making in my workplace, it is going to be split into 3 major bodies. Identifying information, analyse the information and communicate the results.…

    • 3289 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Security Clearance Info

    • 8089 Words
    • 33 Pages

    The Defense Industrial Security Clearance Office (DISCO) is part of the Defense Security Service (DSS), an…

    • 8089 Words
    • 33 Pages
    Powerful Essays
  • Powerful Essays

    VA Office of Inspector General. (2012). Department of Veterans Affairs Federal Information Security Management Act Assessment for FY 2011 (11-00320-138). Washington, D.C.: US Government Printing Office. Retrieved February 20, 2013,from http://www.va.gov/oig/pubs/VAOIG-11-00320-138.pdf…

    • 1273 Words
    • 6 Pages
    Powerful Essays