The DIRD division is to collaborate with the other members of the CDC programs in order to come up with various innovative technologies to be utilized in positively impacting the various health practices in both short-term and long-term basis (CDC, 2010).
Public Health Informatics and Technology Program relies on various technologies in achieving its objectives. The underlying characteristic of these technologies is that they are client/server in their architecture are meant to aid in the handling of various forms of information in the CDC corporation and well as externally between CDC and its other partners.
System users
The major users of the Public Health Informatics and Technology Program's IT system are the various CDC personnel scattered across its global offices. However other stakeholders also have access to the system. The table below provides details of system users as well as their details and responsibilities
Table 1 Public Health Informatics and Technology Program's IT system Users
User Category
Access Level Read / Write/Full
Number (Aproximate)
Organization
Geographic Location
Developers
Read/Write
20
CDC (DIRD)
Atlanta
CDC personnel
Varied access
CDC
CDC offices
Stakeholders
Read
12
ACF, DOE etc.
Nationwide
System Dependencies
The system has various dependencies. The dependencies are telecommunication/Information Technology (IT) resources upon which the operations of the system under review are dependent in order to process, transport and to store information. The intricate relationship that exists between the various system components is crucial in order to ensure a seamless achievement of the basic Information Assurance tenets. Below is a list of the various CDC IT resources.
Policies governing CDC Enterprises
CDC's Enterprise Mid-Tier Data Center
CDC Network Infrastructures comprising of:
Information Technology Services Office's (ITSO) Local Area Networks (LANs)
Atlanta Metropolitan Area Network (AMAN)
CDC's Wide Area Network
Internet Connectivity
Technical Vulnerability Scanning Service
DMZ Connectivity
CDC Enterprise Windows Domain and the Active Directory Environment
CDC Enterprise Security Services which includes;
CDC's Border Firewall
RSA SecurID Authentication System
CDC's Border Router Access Control Lists
E-Mail Gateway Virus Scanning and Attachment Removal
Network-Based Intrusion Detection Systems
CDC Enterprise Mainframe
Protection Requirements
Both information and information systems have distinct life cycles. It is important that the degree of sensitivity of information be assessed by considering the requirements for the C/I/A of the information: the need for system data to be kept confidential; the need for the data processed by the system to be accurate, and the need for the system to be available. Confidentiality focuses on the impact of disclosure of system data to unauthorized personnel. Integrity addresses the impact that could be expected should system data be modified or destroyed. Availability relates to the impact to the organization should use of the system be denied.
The protection environment results
Confidentiality: The Public Health Informatics and Technology Program's Information Technology (IT) infrastructure contains information that is very sensitive since it holds identity information for various people who participate in CDC's surveys. There is therefore a need for the data to be protected against unauthorized disclosure. In case this data leaks to the general public, there would be a drastic loss in the...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now