¶ … Security Technologies and Methodology in the United States Air Force
The objective of this study is to evaluate the effectiveness of security technologies and methodology in the U.S. Air Force. This work will first determine uncertainties and calculate the risk for each threat. This work will additionally identify any needed controls including technical, administrative and managerial controls. Finally, this work will describe the network security methodology and technology used in the Air Force and the access control technology utilized by the Air Force.
Cyberspace is reported as "pervasive in military operations across all domains" and reported as well is that it is "vital to how the United States conducts those operations." (Wimmer, 2012) Cyberspace was identified by Secretary of the Air Force, Michael Wynne and Air Force Chief of Staff, general T. Michael Moseley to be "a domain equal with Land, Sea, Air and Space." ( )
The Risk
It is reported that in May 2007, "Secretary Wynne issued another Letter to Airmen in which he stated 'our adversaries are attempting to access American servers that contain sensitive data. In response to these threats, Airmen are actively 'flying and fighting' in cyberspace. Our cyber Airmen's work is a prerequisite to all military operations: ensuring freedom of action across the electromagnetic spectrum, which in turn contributes to freedom from attack and freedom to attack in all other domains: land, sea, air and space As the advantages gained through cyberspace were increasing, so were the threats from adversaries." (Wimmer, 2012) Cyberspace training that is received by all enlisted members includes: (1) Cyberspace and the Air Force training at Basic Military Training (BMT); and (2) Advanced Distributed Learning System (ADLS) annual training. (Wimmer, 2012)
II. The Solution
According to Wimmer's report, "CyTCoE was charted to be "a unifying and synergistic body for promoting cyberspace education, training, research, and technology development. The AF CyTCoE developed material for inclusion in the Airman's study guide, which included a review...
It's not necessary, for the purposes of this paper, to look in detail at these steps for a basic understanding of how a security assessment is conducted. To understand the nuances, there are about a million books one can read, but we will discuss a few general "rules." The first thing to keep in mind with an assessment is that the methodology is flexible. It has to be to adapt to
" (Muntenu, 2004) According to Muntenu (2004) "It is almost impossible for a security analyst with only technical background to quantify security risk for intangible assets. He can perform a quantitative or qualitative evaluation using dedicated software to improve the security of the information systems, but not a complete risk assessment for the whole information system. Qualitative assessment based on questionnaires use in fact statistical quantitative methods to obtain results. Statistical
Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework
Even though there is always some form of a risk involved in the coding technique together with the deployment methods of a website, some technologies such as PHP and MySQL form some of the worst aggravators of online website security. The loopholes that exists in the use of these technologies results in some of the worst hack attacks and security breaches ever experienced in the field of web design. The
They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and
With the threat of terrorism remaining so strong in this country it is vital to find new and better ways to protect people and to keep them safe from harm as much as is humanly and technologically possible. Scope of the Study The scope of this particular study is very broad and far-reaching, because there are so many people who are being affected by it now and will be affected by
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now