Preview

ISP Survey

Powerful Essays
Open Document
Open Document
1455 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ISP Survey
Department of Justice ISP Survey

Josiah Yarbrough

CSIA 303/ Foundations of Information Systems Security

June 27, 2015

Introduction All Americans will need to have working relationship with the DOJ, that is, the Department of Justice, at some point in their lives. The DOJ is the agency that enforces federal laws. In its mission statement it states that the mission is to “… ensure public safety against threats foreign and domestic; to provide federal leadership in preventing and controlling crime; … and to ensure fair and impartial administration of justice for all Americans.”(Department of Justice, 2015) This document serves as a survey of the DOJ 2640.2F, Information Technology Security Policy and how this Program complements the mission, goals and objectives of the Department of Justice as well uncover weaknesses in the Program and include recommendations to reconcile these weaknesses.
Analysis
There are multiple components responsible to ensure the C.I.A. (confidentiality, integrity and availability) of information systems and information within the DOJ. Each component is required to maintain a security program in itself which complies with the overall IT security program of the Department. . The program includes Management, Operational, Technical, and Issue- Specific Security Policies. The DOJ IT Security Program provides guidelines on determining security control requirements and their implementation as well as defines the roles and responsibilities of upper management and personnel.
Policies
The Management Security Policy stipulates that components must adhere to periodic risk assessments, systems and services acquisition, and planning, as well as accreditation, certification and security assessments. The Operational Security Policy provides detailed guidelines regarding physical and environmental protection, personnel security, contingency planning, maintenance, conflict management, system and information integrity,



References: Cichonski, P., Millar, T., Grance, T., Scarfone, K. (2012). NIST SP 800-61: Computer Security Incident Handling Guide. National Institute of Standards and Technology. Rev. 2. Retrieved from National Institute of Standards and Technology. United States Department of Justice. (2015). About DOJ. Retrieved from http://www.justice.gov/about United States Department of Justice. (2008). DOJ 2640.2F: INFORMATION TECHNOLOGY SECURITY. Retrieved form http://www.justice.gov/sites/default/files/jmd/legacy/2014/07/16/doj2640-2f.pdf United States Department of Justice. (2015). Fiscal Years 2014-2018 Strategic Plan. Retrieved form http://www.justice.gov/sites/default/files/jmd/legacy/2014/02/28/doj-fy-2014-2018-strategic-plan.pdf United States Government Accountability Office. (2014). Information Security: Agencies Need to Improve Cyber Incident Response Practices. Retrieved from http://www.gao.gov/products/GAO-14-354

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    274. UFIT Security Incident Response Procedures, Standards and Guidelines. (n.d.). Retrieved January 2014, from UF Information Technology University of Florida: http://www.it.ufl.edu/policies/security/incident-response/…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    and detailed work strategies, monitoring progress, and determining issues solutions. Finally, organizations should dedicate a team of security analysts directed by the expertise of a Chief information security office (CISO) that reports to the Chief information office (CIO) and provides detailed security information to management for assessment and further expansion opportunities to the security infrastructure. Thus, management and a team of dedicated security experts measure system goals, develop strategies towards a more secure organization environment that prevents risks of any magnitude by safeguarding every corner.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Network Security Policy: Best Practices White Paper - Cisco. (2005, October 4). Retrieved from http://www.cisco.com/c/en/us/support/docs/availability/high-availability/13601-secpol.html…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    As relates to your selected scenario, give a brief 100- to 200-word overview of the company.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Lab2 Snort

    • 1322 Words
    • 4 Pages

    References: CSEC 630 Lab2 -Intrusion Detection System and Protocol Analysis Lab (n.d.). University of Maryland University College. Retrieved from: https://learn.umuc.edu/d2l/common/viewFile.d2lfile/Database/NzkyMzkw/CSEC630_lab2_LEO.pdf?ou=33745…

    • 1322 Words
    • 4 Pages
    Better Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    RAR Template 07112007 3

    • 5647 Words
    • 25 Pages

    The Centers for Disease Control and Prevention (CDC) recognizes the best, most up-to-date health information is without value unless it is pertinent and accessible to the people it is meant to serve. Lockheed Martin Information Technology has been tasked to conduct a risk assessment of the <System Name and Acronym> for the purpose of certification and accreditation (C&A) of <System Name> under DHHS Information Security Program Policy. This Risk Assessment Report, in conjunction with the System Security Plan, assesses the use of resources and controls to eliminate and/or manage vulnerabilities that are exploitable by threats internal and external to CDC. The successful completion of the C&A process results in a formal Authorization to Operate of <System Name>.…

    • 5647 Words
    • 25 Pages
    Powerful Essays
  • Satisfactory Essays

    Note. The Week Two assignment has been identified as a tool to assist in the university’s Programmatic Assessment Project. As such, completed student assignments may be periodically sampled for program analysis purposes. To assist in maintaining the integrity of the data collected, do not change the content of this assignment. Please delete this note before submitting to students.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure …

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays