Triton Multi-INT

Improved Essays
I am a little concern about the bidding or proposal against RMF effort. There is tremendous work need to be done for the RMF compliance that leading to an ATO. Without the ATO, even your system is built with the state-of-the-art technology, you are not allow to operate in the field. I do not see that importance reflect on the proposal. I am not sure whether Triton Multi-INT (or the Triton baseline) is a program of record that needs an ATO or it only needs to be RMF compliance. Either ways, there are enough work for probably a handful of full time cybersecurity engineers once we are going to the production mode, especially for implementation and testing phases.

Nevertheless, cybersecurity is gaining a lot of attention and becoming much more important than before. Not only there is increase funding for cybersecurity research from the government agencies, there is also significant funding in cybersecurity from government programs. The program that I was working on before (BACN and contract with the air force) has enough budget to hire at least 10 to 15 cybersecurity
…show more content…
This framework is a paradigm shift from the old C&A process and it calls for a holistic approach on security. It includes the governance aspect (policy and procedure) of risk management, as well as risk management throughout the life cycle of the information system such as acquisition, supply chains, and maintenance, etc. It is not the old way of checklist mentality, only fulfilling requirements. It is much more complex. For example, we are supposed to have a continuous monitoring plan and continuous monitoring the effectiveness of the security measures/controls applied on the information system (every year or six months) even beyond the ATO. RMF also has its own schedule and I have seen it spans about 270 days. It has its own scheduling and staffing

Related Documents

  • Decent Essays

    is a software-based protocol that provides a way to locate files, devices or even individual in a network. LDAP uses port 389 and is uses by Microsoft as the main protocol that opens up this type of access. LDAP is lightweight which indicates a smaller version with a smaller code and it is part of X.500. The latter acts as a standard for network directory services. /***************************…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    EXECUTIVE ORDER 13735 Executive Order 13735, “Providing an Order of Succession Within the Department of the Treasury,” was issued on August 12, 2016 by President Barrack Obama. This executive order lays out the order of succession should the Secretary of the Treasury be unable to perform his or her duties due to death, resignation, or is unable to fulfill their duties of the office. The Executive Order also describes the exceptions to the order.…

    • 445 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    DHS National Security

    • 747 Words
    • 3 Pages

    Many of the agency programs to prevent chemical, biological, radiological and nuclear attacks have been futile with little value, notwithstanding noteworthy outflows. For instance, the National Academies of Sciences acknowledged complications with two of the systems purchased by the DHS for purposes of detecting biological and radiological attacks, recounting that DHS eventually terminated the disposition of new expertise after spending over billion on respective projects (Kahan, 2014). The Department has also thrashed about to implement its responsibilities to offer and recover the homeland's physical security, plus commence its work with the private sector to support acute infrastructure security (Inspectors General of the Intelligence Community,…

    • 747 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Essay On Homeland Security

    • 1030 Words
    • 5 Pages

    Homeland Security means only one thing, protect your country and the secret service is the first line of protection. “The Department of Homeland Security has a vital mission: to secure the nation from the many threats we face. Our duties are wide-ranging, but our goal is clear - keeping America safe.” The Department of Homeland Security is charged with the primary responsibilities of protecting the United States divided into 22 divisions that respond to terrorist attacks, man-made accidents, and natural disasters. Perhaps the most significant of these divisions is the The United States Secret Service (USSS) who primarily focus on financial crimes and protection.…

    • 1030 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    ENGINEERING TECHNICAL DEFINITION PAPER Name Institution Date Annotated bibliography Harknett, R. J. and Stever, J. A. (2011), The New Policy World of Cybersecurity. Public Administration Review, 71: 455–460. doi: 10.1111/j.1540-6210.2011.02366.x…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Homeland Security

    • 1157 Words
    • 5 Pages

    The ability of the homeland security system to assess and respond to future threats can at times be uncertain. This is due to the ever evolving nature of the threats posed to the country. As new threats are addressed more is learned about resources are needed for each type of manmade or natural event. Since, September 11, 2001 many steps have been taken to address this country’s vulnerability to terrorist attacks and Hurricane Katrina demonstrated the need for improvements in the country’s ability to respond to natural or mass casualty disasters. The Department of Homeland Security was created to assess these threats and establish procedures to improve the resiliency of the country.…

    • 1157 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Outlook: American intelligence has grown significantly in the last 20 years. As technology keeps evolving, so will the Intelligence community (IC). With this technology advancement will come vulnerabilities, these vulnerabilities will be exposed and the IC will become stronger and wiser from experience. Computers is a significant vulnerability to the country want will be the place where the next significate war will be fought, because computer are such a vital part of daily life. Computers are woven into every aspect of life form government operations to controlling traffic lights in a city.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    My Future Career The future career that I choose is a Cyber security expert. The interest that I developed in this career was due to a lot of what I’ve saw in the news over the years and from what I’ve personally experienced over the years. A large majority of companies and government agencies hire these experts to help strengthen networks, safeguard information, or prevent cyber-attacks. That’s the part that really interested me.…

    • 754 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Introduction The cyber domain is perhaps the most complex domain to define in modern warfare. Academic literature has secured cyber as both a domain and part of the global common. National laws, policies, and understanding of the cyber domain are just being to mature; thus, the strategy to guide and form the required organizations to support cyber is just being to develop. This paper will consider whether the current national cyber construct is sufficient to address the cyber domains unique geography.…

    • 1692 Words
    • 7 Pages
    Great Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    The most suitable strategic controls for the case study would be the implementation control and strategic surveillance. The implementation control takes place in steps, activities, investments, and acts that occur over a period of time (DuBois, 2016). The two basic types of implementation controls are monitoring strategic…

    • 788 Words
    • 4 Pages
    Improved Essays