Preview

Ibmg Electronic Key Management System Essay

Good Essays
Open Document
Open Document
724 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ibmg Electronic Key Management System Essay
Obsolete USCG Electronic Key Management System (EKMS) Training
U.S Coast Guard (USCG) Commanding Officers are getting relieved of command. A contributing factor is that USCG enlisted Electronic Key Management System (EKMS) managers are receiving inadequate training prior to their assumption of account manager duties. Non-resident training teaches out of date policy. In addition, the lack of a required Job Qualification requirement (JQR) and/or on the job (OTJ) training prior to appointment has further hindered managers from being ready to assume duties. Moreover, insufficient training has caused increased Communication Security (COMSEC) incidents and Practices Dangerous to Security (PDSs) leading to possible compromise. The first part of the problem is non-resident training.
USCG enlisted EKMS Managers do not obtain the baseline knowledge required to assume duties as an account manager through non-resident training. Current non-resident training teaches from the EKMS 1A; a publication that has been superseded since 2010. Since the EKMS1A has been superseded there have been nine amendments to current policy; changing policy every six months. Additionally, curriculum focuses on
…show more content…
According to the “2016 EKMS Town Hall brief”, COMSEC Incidents and PDSs have increased 130% over the last three years (2). It is undoubtful that this large influx of incidents and PDSs are contributed by improper account maintenance produced from inadequate training. In my experience a solid training program can prevent many of the issues arising such as late destruction, unauthorized access, and reoccurring maintenance tasks. Moreover, the increase in the amount of incident and PDSs led has led to the potential for our enemies to compromise our communications systems and disrupt future operations. Overall, the increase of COMSEC Incidents and PDSs reflects that the current EKMS training program in

You May Also Find These Documents Helpful

  • Good Essays

    Assisted the USS MCCAIN on EKMS matters onboard during a port visit, MCCAIN vault door X09 lock ceased and ship’s company altered the operability of the locking mechanisms, requiring an additional 24-hour watch to cover the EKMS vault until re-certified. Providing direction to the MCCAIN crew members, they were able to repair vault door modifications, re-install new X09 lock and pass vault door security inspection. This enabled Combat Systems and Radio to stand-down additional 24-hour watches affecting manning 24/7. Worked through a 100 percent manning loss of Civil Service EKMS Manager, trained one Chief Petty Officer as EKMS Manager during a nine month gapped billet position and provided EKMS support to four Local Elements (LE), maintained a high state of readiness supporting four Echelon III commands. With the loss of Far East EKMS Manager Yokosuka, became the “go-to” EKMS expert for manager duties and issues across eight commands within Far East. Assisted Diego Garcia in vault issues and provided sound guidance that resulted in the accountability for a deployable LE. Provided Far East-wide tasks for all managers and incorporated tracking tools which enabled each account better management tools for proper account administration, which provided Far East Commanding Officer and OICs better situational awareness of each…

    • 882 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    -PLANNER ORIENTATED. As EKMS Manager, he conducted 20 Spot Checks, two self-assessments, three base-wide inventories managing four local elements, 450 pieces of cryptographic material, ensuring 100% accountability and compliance. His organization and planning were critical in the preparation for the 2016 EKMS Immediate Supervisor In Command (ISIC) inspection.…

    • 165 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    271. Kral, P. (2011, December 5). Incident handlers Handbook. Retrieved January 2014, from Sans.org: http://www.sans.org/security-training/The incident Handlers Handbook…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Kudler Fine Foods

    • 459 Words
    • 2 Pages

    I was not very impressed with this memo. I did not quite understand what the author was trying to get across as far as training. All I know is that there is a new POS system and training in the system will eventually be offered or will have to be learned on their own. I have dealt with many memo’s over the years and this one is probably one of the worse ones I have seen.…

    • 459 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It’s my pleasure to provide this recommendation for SSG Soto, Christiana as he pursues a security clearance in order to growth and server The United States Army Honorably. As his supervisor on the Cadet Leader Development (CLD) Program for internationals and nationals Cadets for the past two years; I’ve worked closely with SSG Soto on a day-to-day basis. I'm confident that SSG Soto will sustain the standard, policies and laws that are subject required to embrace a security clearance. Please allow me to give three examples of SSG Soto qualifications for his clearance.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SUBJECT: Procedures for the FY13 Qualitative Management Program (QMP) For Senior NCO’s 1. Purpose: To provide guidance and procedures in support of the Qualitative Management Program (QMP) for the ranks of SFC to CSM. 2. Facts: a. The Army through Assistant Secretary of the Army (Manpower and Reserve Affairs) SAMR-PO are reinstating and doing a revision of QMP, dated 23 July 2009. Soldiers that fall in certain criteria’s will be boarded and subject to denial of continued service in FY 2013. This does not apply to soldiers who are in the rank of SSG and below, or have an approved retirement, are in a promotable status, and are a MSG previously selected to attend Sergeants Major Course for the purpose of SGM promotion. b. Soldiers in this criteria…

    • 279 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The United States Army must develop and train its officers into leaders capable of winning our nation’s wars without losing the trust and confidence of the soldiers that they lead. There is an immediate need for the establishment of dedicated Aviation Branch Officer Career Management Teams (OCMT) at the Brigade and Battalion level within the Army’s Combat Aviation Brigades (CABs) to ensure the Army’s officers are being developed to the fullest extent possible. To date, the Army has failed in that endeavor.…

    • 2013 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Powerful Essays

    Uss Carney

    • 1928 Words
    • 8 Pages

    From June 2005 to September 2009, I served on the Guided Missile Destroyer (DDG) 64, USS Carney. The USS Carney has approximately 300 sailors and officers. Out of the 300 about twenty-five are officers and another thirty or so are senior enlisted. Officer’s tours are eighteen to twenty-four months long and the enlisted sailors can remain on board for up to five years. While serving aboard the Carney, I witnessed the key crewmembers turnover at least three times. After each key crewmember, enlisted sailor or officer, transferred someone needed to rise to step into a new role and a new team needed to be formed. While I did not realize it at the time, we constantly performed Human Process Interventions to ensure we were ready to answer our nations call at a moments notice. The upper echelons of the U.S. Navy go to great lengths to ensure that teams are created through a structured multi-level training process, surveys, and other Organization Development techniques.…

    • 1928 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Focus specifically on guard services and high-level consulting audits, while outsourcing or referring to vendors for security equipment and system needs (ADT)…

    • 2342 Words
    • 18 Pages
    Powerful Essays
  • Best Essays

    Forest-Fires and Oil spills are two different disaster events that have different trajectories, and require the deployment and utilization of specialized tools and equipment. Mostly, the tools utilized in attending to Forest-fires by personnel would be different from the tools that would be deployed in Oil spills, and new tools when provided to the same personnel without adequate training, in utility do create additional challenges. Where and when this process is negated, matching skill-sets are done inefficiently. Some of these includes: Deploying disaster trained personnel such as the US Coast Guard in supporting administrative positions, and in resource or planning sections. A reference case in point includes during the DWHO where the U.S Coast Guards members were inefficient due to lacking appropriate training regarding Oil-spill response and activities. Rather, U.S Coast Guards member’s services had been traditionally utilized in attending to mass rescue operations, natural disasters and national security…

    • 2640 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    UNIT 3 Access Controll

    • 280 Words
    • 2 Pages

    Confidential services is a military support branch consisting of 14.000.000 computers with internet access and 250000 servers. All employees must must have a security clearance, and they communicate mainly using blackberry devices and email Hardware Control…

    • 280 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 4104 Words
    • 17 Pages

    However, there is growing interest in protocols and other mechanisms for use with novel telecommunications services. Next-generation value-added services are bound to introduce new vulnerabilities. The interaction between all these communications and security protocols, and the mechanisms used for distributed systems security, is fertile ground for both interesting research. Ways to enhance these protection tools to make sure our technology is safe from IT attacks are evolving all the time. The systems or measures used to protect a company system at present might not be of any use in the future as technology is always enhancing to higher levels. Telecommunication businesses tend to be comparatively adept at managing information security risks. And many are taking action to achieve an enhanced level of ongoing insight and intelligence into ecosystem vulnerabilities and dynamic threats. Companies like Celcom must be ready to invest in this expensive research so as to be able to aggressively compete in the intense telecommunication market and to be able to sustain itself in this industry. Today, information security is a discipline that demands advanced technologies and processes, a skill set based on counterintelligence techniques, and the unwavering support of top executives. As telecom operators become more similar to technology companies, they will face a raft of new challenges. Core practices like employee awareness and training, policies and tools to reduce insider risks, and protection of data, including intellectual property, will need to be updated. The confluence of mobility, cloud, and social networking have multiplied risks, yet few operators have addressed these threats or deployed technologies that monitor user and network activity to provide insight into ecosystem vulnerabilities and threats. These…

    • 4104 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    The U.S. Army Soldier requires years of training to become an expert in his/her individual military occupational skill (MOS). While still a fighting force, the U.S. Army has invested heavily in educating and molding its NCO ranks to attain a higher level of competence. Among these many professions is the Human Resources Sergeant. The role of the Human Resources Sergeant as a profession in the U.S. Army continues to evolve and proven to become an invaluable contribution to military professionalism. The Army White Paper, A Profession of Arms (2010) discusses military professionalism and explains what a profession of arms entails.…

    • 583 Words
    • 3 Pages
    Good Essays
  • Better Essays

    AbstractThe Army uses all four functions of management through a Chain of Command. All leaders throughout the military use at least one function, but multiple leaders working together covers all functions. Always someone is planning, organizing, leading, or controlling. The reason the United States Military is so effective is because leadership and management always try to stay a step ahead. The rank structure provides a guideline to how much a soldier manages. More rank brings more responsibility, more respect, and more use of each function. Though not all functions are needed to be a manager, a good manager does need all four. The Chain of Command is the best example to show leadership, management, and the four functions - plan, organize,…

    • 1094 Words
    • 5 Pages
    Better Essays