US Department Of Defense Case Study

Great Essays
The US Department of Defense (DoD) relies on computer and network systems to create war-fighting advantage. These systems fuse essential combat information enabling the war-fighter to respond with a decisive action. While information systems (IS) create a better-informed warfighter on the battlefield, they can also be critical point of weakness. Adversaries can exploit IS, potentially disrupting a fighting organization’s ability to complete its mission.
IS managers are charged with the security state of the organization. Like the war-fighter, IS managers must rely on computer and network systems to provide real-time data about cyber threats, which affect their organization’s security posture, in order to make decisions regarding managing the security risk. However, IS managers face many challenges in achieving clear awareness of their organization’s security state. They must balance the workforce’s capacity to comply with frequent security advisories and reporting requirements; conduct continuous hardware and software upgrades; and respond to threats. One problem is that organizations treat different aspects of cyber security such as asset management; configuration management; intrusion prevention; vulnerability management; certification and accreditation (C&A); and incident detection and response as isolated processes that are not
…show more content…
The first step is certification, a process in which information security managers provide supporting data and evidence for security assurance. To do so, information security managers must conduct a comprehensive assessment of information systems determining the extent to which security controls are implemented correctly and are operating as intended. Managers will also ensure devices or systems are configured appropriately to enhance the overall security posture. Lastly, they will update or fix any software vulnerabilities before the certification package is forwarded to the next approval

Related Documents

  • Great Essays

    Training Management and Operation Anaconda: What Have We Learned? Operation Anaconda has been studied through various lenses about the inefficiencies and successes within this operation. Unfortunately, this operation is primarily known for the problems it encountered amongst the internal parties and the irreversible damage due to poor planning and coordination. With the advances in military technology and intelligence, it remains vital that training management is a top priority in the design, application, and execution of all military operations to ensure unified and successful mission outcomes while minimizing inefficiencies that were noted in the Operation Anaconda Case Study.…

    • 1422 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Military Task Force This paper illustrates the idea that terrorist are rational thinkers who have agenda setting propaganda in order to achieve their short and long term goals. While others might agree that terrorist used psychological ideas because they don’t know the difference between right and wrong. The way they kidnap hostages they have a clear idea what they want and what will they achieved.…

    • 356 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The Center for Defense Information (CDI) was a nonprofit, nonpartisan organization based in Washington, DC. It specialized in analyzing and advising on military matters.[1] CDI was founded in 1971 by an independent group of retired military officers including Adm. Gene La Rocque and Adm. Eugene Carroll.[2] Center for Defense Information Abbreviation CDI Merged into Project on Government Oversight Formation 1971 Founder Adm. Gene La Rocque, Adm. Eugene Carroll Extinction 2012 Location Washington, D.C. In 2005, CDI expanded by creating the Straus Military Reform Project [3] for the purpose of promoting military reform in the Pentagon and Congress. Winslow T. Wheeler, a former Capitol Hill staffer and General Accounting Office assistant director,…

    • 280 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Introduction: On April 6, 1917, the United States entered the global conflict in Europe, but it’s Regular Army was not trained to conduct synchronized combined arms operations on the level of their Allies. The first display of large-scale, combined arms operations by the United States was the Battle of Cantigny on May 28th, 1918. Cantigny marked an important transition in the strategic organization of the American Military and set the stage for the United States to become active participants in global warfare. This chapter will focus on the U.S. Army’s First Division development, training, and execution of the combined arms operations in Cantigny, France.…

    • 1547 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    “Trying to gain an understanding of the tactical organization of Navy units can be difficult.” – CDR Mark Manus, USN. On a daily basis or throughout routine operational periods, the Joint Force Commander (JFC) would choose to conduct operations through functional component commands rather than those component commands of a service. During execution of functional component commands, the operations tend to run smoother and are successful because of the relationships within the function.…

    • 431 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The United States Air Force is one of the three subordinates of the Department of Defense. It is an executive branch department of the federal government which is headquartered at the Pentagon in Arlington, Virginia. The United States Air Force is the youngest of all five services. The Air Force was initially part of the United States Army; however, it became its own separate service on 18 September 1947, after President Harry S. Truman signed the National Security Act of 1947. Since its more than 65 years of existence, the Air Force has become the world's premier aerospace force.…

    • 99 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    In the defense department there are six branches of the armed forces. The six branches include The US Marine Corps, The US Army, The US Navy, The US Air Force, The US Coast Guard, and The US Special Operations Command. Out of the six branches in the armed forces The US Special Operations Command sticks out the most. The US Special Operations Command, or SOCOM, consists of the elite and finest members of all other five branches of the armed forces. It is the most unrecognized and underrated armed forces branch in America, because of the secrecy of their missions.…

    • 1750 Words
    • 7 Pages
    Improved Essays
  • Decent Essays

    The above amount of that has been requested for repayment was no fault Mr. Talley or my own, consequently it was a direct oversight of the Veterans Administration. Furthermore, I have signed documents from 1/15/2014 that went into effect on 12/1/2013 by myself and a field agent stating that Mr. Talley would receive $1525.55 per month from the VA, in which I were to dispatch to him $129.00 per month, in which I have done. Certainly the some of Mr. Talley’s funds is going toward repaying a car that was repossessed upon Mr. Talley’s incarceration, also along with paying off Mr. Talley’s numerous creditors. However, this was done to ensure when Mr. Talley is released from his secure residence, he will be capable of securing and maintaining a stable environment in which he can reside peacefully.…

    • 173 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    China uses cybersecurity as a one-step process of clearing any doubt concerning the safety and security in management of organizations. China regards the innate definition of cybersecurity as a system of management that offers maximum security within the confines of the internet. The author of the article has used a practical example of the varied developments that have taken the country to greater heights of GDP and economic growth of the individual people. He cites cybersecurity as a force that has brought such changes. The author of the article concludes by stating that cybersecurity is a relevant information system that offers security to every confidential docket within an…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    A good information security policy will take the mission of the company into consideration, the risks that the company faces, the protection of critical assets, and the effect that an attack would have on the organization if one occurred. Developing a security policy does not have to be marred with challenges, it is important that the roles and responsibilities throughout the organization are known, as well as a detailed accounting of what the policy will cover. Hence, an enterprise information security policy should establish and develop critical controls to reduce security risks to the organization, and must be compatible with state and federal regulations. In addition, an enterprise information security policy also integrates and formulates…

    • 631 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Abstract This paper presents information derived from peered reviewed works on the topic of cyber warfare that was gathered using the Virginia Wesleyan College Online Library. Cyber warfare is often categorized with nuclear, chemical and biological weapons as a potential weapon of mass destruction (WMD). Cyber warfare is at its basic level the gathering of electronic information. The term cyber warfare is often exploited to describe a new type of warfare and to create the notion that computers and networks are a new battlefield.…

    • 225 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    “ By the 20th century, military organizations confronted the problem of not only adapting to technological changes in peace time, but also the fact that war itself has inevitably turned up the speed of technological change”. The first Gulf War constitutes a turning point in the history of modern conflicts essentially because of the integration of technology into all levels of military operations. War was always been a declaration of hostility between two opposing groups clashed over a battlefield in a duel with the ultimate aim to impose its will on the other. However, the advent of new technologies has completely changed these legendary and almost static clashes.…

    • 1300 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays