Preview

Doa's It System Risk Analysis

Powerful Essays
Open Document
Open Document
1633 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Doa's It System Risk Analysis
RISK ASSESSMENT on the Department of the Army IT Systems
9 December 2012

1. Introduction
1.1 Purpose
This risk assessment was to identify threats and vulnerabilities related to the Department of the Army (DoA) Information Technology (IT) systems. It will be utilized to identify vulnerabilities in the Computer Network Defense (CND) Capabilities and mitigation plans related to DoA’s IT systems. It was realized that this was a potential high-risk system as noted by the Department of Defense (DoD) Chief Information Officer (CIO). (DoD, 2012)
1.2 Scope
This risk assessment applies to all DoA Non-secured Internet Protocol Router Network (NIPRNET) and Secured Internet Protocol Router Network (SIPRNET) for Regular Army and Reserve Components. This is a major system that is used by millions of Soldiers, contractors and DA civilians worldwide. The DoA’s IT system is
…show more content…
The consequence of loss of integrity or availability is unacceptable and could include the immediate and sustained loss of mission effectiveness.
MAC II Is a high integrity, medium availability for DoD ISs handling information that is important to the support of deployed and contingency forces. The consequence of loss of integrity is unacceptable. Loss of availability is difficult to deal with and can only be tolerated for a short time.
MAC III Is a basic integrity, basic availability for DoD ISs handling information that is necessary for the conduct of day-to-day business, but does not materially affect support to deployed or contingency forces in the short- term. The consequences of loss of integrity or availability can be tolerated or overcome without significant impacts on mission effectiveness or operational

You May Also Find These Documents Helpful

  • Powerful Essays

    Mutandum Corporation Case

    • 963 Words
    • 4 Pages

    While Mutandum’s current method of tracking computers (attaching assigned, unique tracking numbers directly to the equipment) is effective, it must be applied to all systems, regardless of the asset’s value at the time of purchase. The system itself is not what these unique tracking numbers are protecting, but rather the sensitive data stored on…

    • 963 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    | * Patch history * VPN * Firewall * Stateful Inspection * Whitelists-Blacklists * Boundary Encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their hardware assets and defining security policy regarding the timeliness of firewall configuration and updates.…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This paperwork of IT 244 Week 3 Checkpoint Toolwire Smart Scenario Business Continuity Disaster Recovery consists of:…

    • 367 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    must be recoverable in the event of system failure or natural disaster. To accomplish this, you…

    • 246 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Aircraft Solution’s Commercial Division, connects to the rest of the world via the Internet causing hardware vulnerabilities due to the absence of security and safety that should be implemented, leaving great concern for major security threats. The Commercial Division is only able to access important…

    • 745 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    There are quite a few vulnerabilities that can affect organizations productivity. These vulnerabilities can be environmental, utilities & service, criminal behavior, equipment failure, and information security issues. To protect the organization against loss of productivity and data loss we have created an assessment of the potential danger each category of threat presents. We created a worksheet (located on the last page of this document) listing each type of vulnerability and ranked the probability and severity of each of the threats. Using a probability and severity legend that had one…

    • 2036 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 7 Week 7

    • 594 Words
    • 3 Pages

    This concentration was developed in conjunction with the U.S. National Security Agency (NSA) providing an invaluable tool for any systems security engineering professional. CISSP-ISSEP is the guide for incorporating security into projects, applications, business processes, and all information systems. Security professionals are hungry for workable methodologies and best practices that can be used to integrate security into all facets of business operations(New Horizon,2016)…

    • 594 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing patients with life-threatening situations. Given the list, select which of the seven domains of a typical IT infrastructure is primarily impacted by the risk, threat, or vulnerability.…

    • 404 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    According to the “2016 EKMS Town Hall brief”, COMSEC Incidents and PDSs have increased 130% over the last three years (2). It is undoubtful that this large influx of incidents and PDSs are contributed by improper account maintenance produced from inadequate training. In my experience a solid training program can prevent many of the issues arising such as late destruction, unauthorized access, and reoccurring maintenance tasks. Moreover, the increase in the amount of incident and PDSs led has led to the potential for our enemies to compromise our communications systems and disrupt future operations. Overall, the increase of COMSEC Incidents and PDSs reflects that the current EKMS training program in…

    • 724 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    ANNEX J – Information Assurance (All Users) J-1 BN COMSEC Procedures 1. References. a. USASOC Pam 25-1, Information Mission Area Procurement. b. USASOC Pam 25-2, Personal Use of Government-Owned IMA Resources Guide. c.…

    • 2469 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Bullshit Army Essay

    • 1249 Words
    • 5 Pages

    Operational security is an extremely important part of our everyday lives while in a deployed enviroment. This fact is amplified that much more when the deployment includes being stationed in a country where the enemy could go undetected, as our foes do not wear a uniform. In a war where there is no front, and as part of our out reach with the citizens of the country that we are occupying, it would be incredibily easy for our enimes to merge themselves into our everyday dealings. With that knowledge, it becomes ever more imnportant to maintain a hold of items that could easily be aquired by our foes. These items include papers, documents, unlocked computers, and identification cards. If left unattended or unacounted for, a potential for a security breach is very likely.…

    • 1249 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Hafford furniture

    • 1943 Words
    • 8 Pages

    Hafford relied on a Business Information System (BIS) to handle all the internal business processes. The BIS was seamlessly connected to a VAN-based EDI system, which served as the customer’s interface for making orders. In 2008, Hafford’s entire IT infrastructure and data storage were destroyed by a massive hurricane. Hafford was able to restore the company data with its disaster recovery plan, but not all its IT function.…

    • 1943 Words
    • 8 Pages
    Better Essays

Related Topics