Dod Security Policy Summary

Improved Essays
Security Works, Inc. has just been awarded a high priority, high visibility contract/project that will require us to develop and maintain a proper DoD security policy that is required to meet DoD standards for delivery of the technology services. Upon winning this high demand contract with the DoD, Security Works, Inc. is now obligated to meet all government standards that the U.S. Air Force Cyber Security Center or AFCSC enforces. Other guidelines within this contract that have to be followed in order for Security Works, Inc. to stay compliant to all laws and security measures falls under the Federal Information Security Management Act (FISMA). FISMA is United States legislation that defines a comprehensive framework to protect government …show more content…
An application domain is a mechanism (similar to a process in an operating system) used within the Common Language Infrastructure (CLI) to isolate executed software applications from one another so that they do not affect each other. This have established physical domain must control such aspects as doors, locks, security cameras, and fire suppressants. (Wikipedia, 2014) Security Works, Inc. will ensure that at least one firewall is implemented in every necessary security zone set by AFCSC and the DoD to limit unwanted network traffic. The use of NAC devices to restrict which computers and devices can connect to the domain will also ensure DoD …show more content…
and any DoD employee with the need to know in an IT position, part time by a DoD employee in a designated IA role, or by a support contractor. All personnel performing IA functions must satisfy both preparatory and sustaining DoD standard training and certification requirements as a condition of privileged access to any DoD information system. DoD Component-level IA programs shall include a standard convention for naming and describing IA functions; tracking their association with positions, roles, and contracts; and tracking the training and certification of personnel assigned to the positions, roles or contracts. Security Works, Inc. will implement and monitor the approved training programs that all employees and contractors will test through the certification process that is administered through the products offered by AFCSC, and comply with the training standards established by the Committee on National Security Systems (CNSS). 13 Required versus actual IA workforce training and certification shall be a management review item. Required versus actual compliance with qualifying criteria for designated IT position categories and security clearances shall be a management review item. (DoD,

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Project Part 1 Task 1: Outline Security Policy First World Bank Savings and Loan; a financial institution that offers banking services (loans and deposits). The bank would like to provide online banking services to the customers, which includes online credit card use for loan applications. Recommendations are based on such factors as: ownership total cost, scalability, and reliability. Decisions and recommendations made need to be appropriate from the CIA triad perspective.…

    • 1249 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Joint Force 2020

    • 1383 Words
    • 6 Pages

    Issues that pose risk to missions are: “providing sufficient enabling capabilities, building partnership capacity, and securing DoD systems in cyberspace.” In example, an ally or partner’s lack of ability or willingness to support common goals may present an operational risk. When it comes to cyberspace, a failure to secure systems would pose a major risk to operations, personnel, and mission accomplishment. In such cases operational risk may be mitigated through the development of bilateral and multilateral capacity to improve interoperability to protect common interests through security cooperation, agreements, and…

    • 1383 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    A1: Business Objective: Healthy Body Wellness Center (HBWC) Office of Grants Giveaway (OGG) business objective is to offer a proficient methodology that promotes improvement in the quality and usefulness of medical grants. HBWC disburses several medical grants through federally supported health research, and implemented the Small Hospital Grant Tracking System (SHGTS) to automate assignment and tracking of the grant disbursement, streamline review of completed evaluation submitted by grant seekers and promote sharing of health information among healthcare professionals. A2: Security Principle The guiding security principle that HBWC should use to meet Federal Information Processing Standards (FIPS) is an ISO 27002 security framework, accompanied…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    GreatThinker GFC, one of the numerous federal agencies in Washington DC that has to adopt those minimum set of security controls developed by National Institute of Standards and Technology (NIST) to protect their information and information systems. The NIST developed the Federal Information Processing Standard (FIPS) 200, containing minimum security requirements for Federal Information and Information Systems, specifies the minimum security requirements for federal information and information systems in seventeen security-related areas. Federal agencies must meet the minimum security requirements defined in FIPS 200 through the use of the security controls in NIST Special Publication 800-53, Recommended Security Controls for Federal Information…

    • 120 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Fisa Pros And Cons

    • 531 Words
    • 3 Pages

    Several benefits of FISA have over years been witnessed. Since its enactment, FISA has been an important tool in the fight against intelligence collection by foreign powers or its agents with an aim of exploiting the underlying US government policies or even to establish its future strategies illegally. The USA Patriot Act has seen FISA expand its strategies in exposition of foreign terrorist groups and combating them in good time. This has seen the US government win the war against terrorism and extremism. The Act has also see reduction of purported threats and acts of terrorism to national security.…

    • 531 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    First, it is important to understand that through the application of some of the NIST security control mechanisms, the threat in the case can be substantially minimized. Some of the main approaches and methods that may be used towards minimizing the threat described include enhanced security awareness and training of the users of the system, access control into the system under consideration, frequent system maintenance and upgrades, occasional audits into the system, protection of the system from non-secured program codes, application of intrusion detection systems to detect any form of intrusions into the system and the protection of the system from spywares and spam. 14.5 The first and perhaps the most important value of the threat is that…

    • 252 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The Department of Defense has been bringing awareness to military personnel, civilians and contractors. All are required to complete a general military training course on trafficking in person yearly. This course explains what is trafficking of a person, who may be involved and how to recognize it. It also teaches the members how the participation in sexual acts with the victims makes it harder for them to escape and keeps the recruitment of others at a high demand. Participation from DOD employees brings negative results to the U.S. and at the same time demeans the mission of the military force.…

    • 370 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Contractor personnel are required to comply with Government security requirements to preclude potential security incidents or violations, including potential unauthorized disclosure or compromise of classified and/or controlled unclassified information. If a change in the security classification of the contract/order from an unclassified to a classified status becomes necessary after contract/order award, the Contractor shall make a reasonable effort to continue performance of work under the contract/order in compliance with the change in security classification in accordance with FAR 52.204-2, Security…

    • 1341 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Team 3: Vadde Aditya, Bishal Bk, Fang Fang, Suraj Karki, Varshini Paladugu, Raghuveerreddy Suram Week 7 Group Assignment • Discuss what can happen if the framework you choose as a foundation does not fit your organization’s business objectives. If the framework the organization choose as a foundation does not fit the business objectives, it may face several problems as following. 1.…

    • 723 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    has been slow in preparing and therefore remained vulnerable to cyberattacks for many reasons. Trying to find ways to control cyber-attacks against the military networks, the U.S. government faces dilemmas of balancing issues of security and militarization of the cyberspace, citizens’ privacy and surveillance. Also, lack of clear rules and guidelines as to addressing cyber warfare, classified character of the activity of the agencies involved in creating new regulations to address cyber warfare contributed to the delay in the streamline of the military’s ability to attack and defend the cyberspace. 3. How has the Internet influenced the distribution of power in the 21st century?…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Brilliant Essays

    Intelligence In The Intelligence Community

    • 2133 Words
    • 9 Pages
    • 4 Works Cited

    policymakers; Defense Intelligence Agency (DIA) a principal member of the IC who’s, mission is to provide timely, objective all-source military intelligence to policymakers to U.S. Armed Forces around the world; Federal Bureau of Investigation (FBI) a threat-based, intelligence driven national security organization that protects the U.S. from critical threats while safeguarding civil liberties. As both a component of the Department of Justice and a full member of the U.S. IC, the FBI serves as a vital link between intelligence and law enforcement communities; National Geospatial-Intelligence Agency (NGA) is a Department of Defense combat support agency and a member of the national IC, NGA develops imagery and map-based intelligence solutions for U.S. national defense, homeland security and safety of navigation; National Reconnaissance Office (NRO) is considered the nations eyes and ears in space, the NRO is a joint organization with a workforce that includes personnel assigned primarily from the Air Force, CIA, and the Navy. However, the other uniformed services and other elements of the DoD and the IC are also represented to engage in research and development; National Security Agency (NSA) who’s area of expertise include cryptanalysis, cryptography, mathematics, computer science, and foreign…

    • 2133 Words
    • 9 Pages
    • 4 Works Cited
    Brilliant Essays