Verified Document

Intelligence Unit That Is Secure And Maintained Essay

¶ … intelligence unit that is secure and maintained at all times is an absolute necessity for operational reasons. Explain in detail why this is so important. Security is probably the single most important factor that prevents the intelligence unit from applying information technology more effectively. Security is essential for intelligence unit. When it comes to IT, approach is not "risk management," but "risk exclusion."

There are some very specialized electronic security threats that could apply, so it may be that a secure PDA needs to be developed and provided. In intelligence unit the presence of sensitive but unclassified information could cause serious concern over information bypassing safeguards on tiny solid state disk equivalents, which can fit into pens. This problem can be addressed by requiring the devices to store information in encrypted form, and using biometric identification.

An intelligence unit can be secured, but the security both has to be built-in, and maintained. Files need strong encryption. Multiple layers of security risk detection tools are needed such that biometric authentication will identify only legitimate users (McLeod, Raymond, 2004).

Moreover, physical security of the intelligence unit file is imperative to maintain the confidentiality of the information stored in the file and to ensure the protection of the individual's right to privacy. In case files are not properly secured there could be operational problems for the organization as it would be in a state of continuous threat from various sources.

On the other hand maintenance of intelligence unit is important as demands made on the intelligence unit document collection can stem from three types of requests:

Requests for a specific document to which the analyst has a reference or citation;

Requests for a specific bit...

Maintenance of intelligence unit would ensure that preliminary selection of materials is made so that particular need of a particular user is effectively met (Valacich, 2004).
You have learned that the analyst is confronted with many tasks including collecting, entering, analyzing, and visualizing investigative data. Often the analyst is asked to present his or her findings. Discuss in detail the guidelines for preparing an oral briefing and written report and how this benefits the investigative team.

Guidelines for preparing an oral briefing and a written report:

The most important step is to prepare an overall outline that will be the foundation of the oral or written report. The focus should be on the content and structure of the report

Collection processes provide analysts with assorted kinds of information, some important and some irrelevant, some true and some false (with many shades in between), and some requiring further preprocessing before they can be used in analysis. In preparation for the report the analyst should draw a clear line between giving out too little information and too much information.

Tables and graphics can be used but they should be simple and easy to understand. Important word and phrases can be highlighted in the written document.

Grammar and spelling check needs to be done for a written report and consistency in fonts needs to be maintained throughout the report

For an oral report given via…

Sources used in this document:
References:

Heye, Steve, and Lancman, Steve n.d. Vendors As Allies: How to Evaluate Viability, Service, and Commitment. Retrieved Oct 9, 2011 from http://www.idealware.org/articles/vendors-allies-how-evaluate-viability-service-and-commitment .

Kendall, Kenneth, and Julia Kendall (2005). Systems Analysis and Design. 6th ed. Englewood Cliffs, NJ: Prentice-Hall.

McLeod, Raymond, Jr., and George Schell Sumner (2004). Management Information Systems. 9th ed. Englewood Cliffs, NJ: Prentice-Hall.

Valacich, Joseph, Joey George, and Jeffrey Hoffer (2004). Essentials of Systems Analysis and Design. 2nd ed. Englewood Cliffs, NJ: Prentice-Hall.
Cite this Document:
Copy Bibliography Citation

Related Documents

Intelligence Agencies What Exactly Is
Words: 11218 Length: 28 Document Type: Term Paper

Sometimes, it is even necessary to carry out certain clandestine operations like deceptions, clandestine collection of information, covert actions, and also the carrying out of the exercise of distributing disinformation or misleading information, which would mislead the suspected threat. The United States Intelligence Community is, as stated earlier, made up a number of different agencies. The Central Intelligence Agency is one of these. Also known popularly as the CIA, this

Varnava 2012 Commented on the Multifaceted Intelligence
Words: 4590 Length: 15 Document Type: Essay

Varnava (2012) commented on the multifaceted intelligence attributes that went into making the construct of British Intelligence gathering in Cyprus, a successful vocation in World War II. This review aims to explore the implications of the role played by local, civil populace in thwarting attempts by military in allowing intelligence inputs through counter-espionage on British and Middle East territories. The review revisits some work on the First World War British

Data Warehouse a Strategic Weapon of an Organization
Words: 10375 Length: 38 Document Type: Term Paper

Data Warehousing: A Strategic Weapon of an Organization. Within Chapter One, an introduction to the study will be provided. Initially, the overall aims of the research proposal will be discussed. This will be followed by a presentation of the overall objectives of the study will be delineated. After this, the significance of the research will be discussed, including a justification and rationale for the investigation. The aims of the study are to

Hsbc Bank USA: Efforts in
Words: 8176 Length: 30 Document Type: Term Paper

It is highly unlikely that they would become involved with illegal activities knowingly. However, the complicated nature of compliance risk and the high expectations within the banking industry make it possible that some legal manner might be overlooked. Chief Compliance Officers are at particular risk due to the nature of their position and should be increasingly diligent to maintain a proper understanding of the expectations of compliance. Additionally, Chief Compliance

Offshore Financial Centres and Their
Words: 22477 Length: 60 Document Type: Dissertation

Because the home country is not required to reimburse foreign depositors for losses, there is no corresponding financial penalty for lax supervision; there is, though, a benefit to the country with lenient regulatory policies because of increased revenues generated and the employment opportunities these services provide (Edwards 1999). Furthermore, banks seeking to conduct multinational business are attracted to countries where incorporation laws and the regulatory framework offer less regulatory oversight

SMES in Thailand
Words: 3000 Length: 10 Document Type: Term Paper

Thailand Small and Medium Enterprises The Industrial Sector and Its Regulators. The industrial sector has contributed the most to the economic growth of Thailand, with manufacturing as its most important sub-sector, followed by construction, mining and quarrying. Manufacturing, accounting for approximately 25% of each addition to the incremental Gross Domestic Product, has relied heavily on agricultural products, such as rubber, textile, food processing, beverages and tobacco. Employment in the manufacturing sector

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now