This website uses cookies to ensure you have the best experience. Learn more

Department Of Defense (Dod) Ready Essay

2319 words - 10 pages

Department of Defense (DoD) Ready
The task is establish security policies for my firm of approximately 390 employees and make them Department of Defense (DoD) compliant. To achieve this goal, a list of compliance laws must be compiled to make sure we me the standard. I will outline the controls placed on the computing devices that are being utilized by company employees. I will develop a plan for implementation of the new security policy.
The task of creating a security policy to make my firm DoD complaint starts with knowing what laws to become complaint with. There an array of laws to adhere to, but I have listed the majors laws that the firm must comply with. The following is a ...view middle of the document...

Enhanced safeguards apply to unclassified DOD information that meets one or more of the following criteria:

• Critical Program Information (as defined in DOD Instruction 5200.39);
• data subject to export controls under International Trafficking in Arms Regulations and Export Administration Regulations;
• data designated for withholding under the FOIA program (as described in DOD Directive 5400.07)
• data bearing current or prior controlled access/dissemination designations (e.g., For Official Use Only, Limited Distribution, and Proprietary);
• technical data, software, or other information subject to DOD Directive 5230.24; and
• personally identifiable information, including (but not limited to) data protected by the Privacy Act and HIPAA.
In addition to the basic safeguards listed above, contractors would be obligated to implement the following measures for data subject to enhanced safeguard requirements:
• reporting any “cyber intrusion incident” to DOD, which includes any event involving unauthorized access to DOD information or an “advanced persistent threat” (meaning a “proficient, patient, determined, and capable adversary”);
• cooperate with and provide support for DOD investigations of reported cyber intrusion incidents;
• encryption when transmitting DOD information across wireless networks (by either encrypting the wireless connection itself or the individual files transmitted across such connections);
• monitoring and control of network traffic through mechanisms such as firewalls and or intrusion detection/prevention systems; and
• implementation of an information security program consistent with NIST Special Publication 800-53.
The new firm wide security policy below outlines the controls placed on the computing devices that are being utilized by company employees.

Acceptable Use of Information Technology Assets Policy
PURPOSE
The purpose of this policy is to inform users of the Firm’s Information Technology Assets of what
Information Technology uses are permissible and what uses are prohibited. Compliance
with this policy drives the Firm’s ability to protect its services, employees, and clients.
POLICY
1. Access and Use
1.1. User Access
All User access to Information Technology Assets:
• shall be approved by the Department Head,
• shall be limited to the Information Technology Assets necessary and appropriate for the User to perform the job duties and functions assigned to him or her.
2. Sensitive Information
2.1. User Responsibility
Users shall be required to know the Classification of the Information of which they have
access, and with which they are permitted to work. Users shall understand the appropriate
Security Controls that should be applied to that Information.
2.2. Dissemination and Confidentiality
Sending, transmitting or otherwise disseminating Sensitive Information shall be strictly
prohibited unless...

Other Essays Like Department of Defense (Dod) Ready

Military Police Essay

1327 words - 6 pages and before that, the Air Police, is the United States Air Force. Each service also maintains uniformed civilian police departments. They are referred to as Department of Defense Police (DOD Police). These police fall under each directorate they work for within the United States Department of Defense, for example: DOD Army or DOD Navy Police. There is in fact one United States Department of Defense police agency, the United States Pentagon Police

Em695 Research Paper

2325 words - 10 pages entire budget through the year. One could make an assumption by reviewing the data that this is prevalent through MCSC and potentially further expanding itself through the entire Department of Defense. The DoD is currently operating in an austere environment as it did in the late 70’s and early 80’s. At that time, the services were dealing with the fiscal realities of a post-Vietnam era where the war was over and spending was reduced. This is

Cyber Vulnerabilities

1387 words - 6 pages than the lower priority risk (http://www.sans.org). Consequences due to unpatched client workstations can lead to cyber hijacking resulting in downtime, security breaches, costly expenses, and confidential information exposed, all factors impact the organization functionality. In 2008, the impact of corrupt flash drive compromised the US Defense Department classified computer networks causing the most significant security breach to affect the

Sexual Assault Against Female in the Military

1073 words - 5 pages used to a downwards form (Younts & Mueller, 2001). The theory also emphasizes the necessity of some level of coercion, which is legitimized, legalized and viewed as force or influence. In the case of the military situation, the DOD reported that more than 25,000 crimes of a sexual nature were committed by the members of the U.S army (Department of Defense, 2012). Despite the fact that military structures are known to boast of integrity and

IS4680 Lab 2 Questions

662 words - 3 pages Agency (DISA). 4. What is the Defense Industrial Base Sector? Defense Industrial Base Sector- It is a industrial place that can grant development and research. It also can grant design, delivery, productivity, and the usages of the army’s weapon systems. This is a standard for U.S. military requirements. 5. Who develops the configuration and validation requirements for IT products and services within DoD? FISMA would be in control

Army Health, Can I Dip in a Building

2030 words - 9 pages required for all soldiers enrolled in the weight control program. Even if minimum Army physical fitness test standards are achieved, leaders need to provide exercise programs to exceed standards. The Department of Defense goal for body fat percentages is eighteen percent for males and twenty six percent for females. Although the maximum allowable percent body fat standards are not as strict, personnel are encouraged to achieve the Department of

Capstone Project

2593 words - 11 pages dictates the rules and refers the document to official military regulations approved by the Department of Defense (DoD). The government has a very formal process when looking at how they select employees and search for new talent. I primarily work with the Army and the Army for both soldiers and civilians has a very formal process for training and professional development. The Army has a variety of training methods. Online training through

Top Secret America

1974 words - 8 pages , located in Columbus, Ohio, processes requests for industrial personnel security investigations and provides eligibility or clearance determinations for cleared industry personnel under the NISP. DSS training academy referred to as SETA is located in Linthicum, Md., and oversees the missions of the DSS Academy (DSSA) and SETA Services. The DSS Academy provides security education and training to Department of Defense (DoD) and other U.S. Government

Information

981 words - 4 pages establishment is concerned with a new form of conflict; informational warfare.” (Devost, 1) The Department of Defense definition of terrorism is "the calculated use of violence or the threat of violence to inculcate fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological." (Research, 1) While in physical terrorism, the perpetrator must come in contact with the

Basic Rights of the Military Chaplain

912 words - 4 pages military necessity,” however, the resolution is careful to note “with any such limitation being imposed in the least restrictive manner possible (HR 5122, 2006, section 590).” The Department of Defense maintains that in considering the inherent rights of the chaplain, the central framework of all policies is that of the free exercise of religion and that the DOD places a “high value on the rights of members of the Military Services to

Foreign Policy Notes

4823 words - 20 pages seen as a way into politics 1947 National Security Act -War and navy department were replaced by Department of Defense -Army -Navy (marines) -Air Force -Joint Chiefs of Staff (JCS) would coordinate the services - Office of Secretary of Defense (OSD) created to coordinate between military and president Structure of the DoD -Secretary of Defense (Robert Gates) -Deputy Secretary of Defense (William J Lynn

Related Papers

Within The Network Of The Department Of Defense (Dod),

633 words - 3 pages Within the network of the Department of Defense (DoD), AAA is the sole supplier of military products for the U.S. Government. My organization has three different levels of management and of those levels, two different unions exist. 7000 workers encompass AAA over 35 locations in the United States; of these 7000 workers, they include contractors and non-supervisor union workers. The purpose of this academic paper is to show the policy monitoring

Cyber Security Essay

521 words - 3 pages economically devastating as severe hurricanes or other natural disasters.” Key stakeholders & Combatant Commanders from Department of Defense (DoD) must come to the table with planning efforts and the way ahead for DoD Cyber Institutional Unity of Effort that will cut down on duplication of efforts by each branch of service. The new Cyber CoE can take the lessons learned from the U.S. Air Force as it incorporate its new Cyber School ensuring that

Promote The Best Qualified, Or Consider Diversity?

2626 words - 11 pages Promote the Best Qualified, or Consider Diversity? Eric B. Olsen Excelsior College LA498M: LA Capstone-(Military Focus) Mr. Larry Fegans 4 June 2015 Abstract The Army, as part of the Department of Defense (DOD), is the premier military organization in the world. Part of what makes the Army an outstanding organization is the diverse backgrounds that their soldiers are come from. There are African-Americans, Hispanics, Asian-Americans

The Civil Reserve Air Fleet Essay

2393 words - 10 pages all committed in various amounts to the Department of Defense (DoD) to provide airlift resources when the capability of U.S. military aircraft is exceeded. This system is designed so that these carriers can provide military cargo movement and troop transportation to anywhere in the world on short notice in the event of a military conflict. In order for airlines to join the CRAF, they must commit at least 30 percent of their long-range passenger