Security Technologies And Methodology In The United Essay

¶ … Security Technologies and Methodology in the United States Air Force The objective of this study is to evaluate the effectiveness of security technologies and methodology in the U.S. Air Force. This work will first determine uncertainties and calculate the risk for each threat. This work will additionally identify any needed controls including technical, administrative and managerial controls. Finally, this work will describe the network security methodology and technology used in the Air Force and the access control technology utilized by the Air Force.

Cyberspace is reported as "pervasive in military operations across all domains" and reported as well is that it is "vital to how the United States conducts those operations." (Wimmer, 2012) Cyberspace was identified by Secretary of the Air Force, Michael Wynne and Air Force Chief of Staff, general T. Michael Moseley to be "a domain equal with Land, Sea, Air and Space." ( )

The Risk

It is reported that in May 2007, "Secretary Wynne issued another Letter to Airmen in which he stated 'our adversaries are attempting to access American servers that contain sensitive data. In response to these threats, Airmen are actively 'flying and fighting' in cyberspace. Our cyber Airmen's work is a prerequisite to all military operations: ensuring freedom of action across the electromagnetic spectrum, which in turn contributes to freedom from attack and freedom to attack in all other domains: land, sea, air and space As the advantages gained through cyberspace were increasing, so were the threats from adversaries." (Wimmer, 2012) Cyberspace training that is received by all enlisted members includes: (1) Cyberspace and the Air Force training at Basic Military Training (BMT); and (2) Advanced Distributed Learning System (ADLS) annual training. (Wimmer, 2012)

II. The Solution

According to Wimmer's report, "CyTCoE was charted to be "a unifying and synergistic body for promoting cyberspace education, training, research, and technology development. The AF CyTCoE developed material for inclusion in the Airman's study guide, which included a review...

...

Once the BMT is completed, the trainee's must complete annual ancillary training, which is "universal training, guidance or instruction regardless of Air Force Specialty Code (AFSC) that contributes to mission accomplishment." (Wimmer, 2012) All members of the Air Force military, civilian employee's even nonappropriated fund, and contractor personnel must complete Information Assurance Awareness modules of training. This training is described as 'general awareness-level training'." (Wimmer, 2012)
Information Protection training is reported as such that is designed with the purpose of ensuring security and protection of DoD information and Information Assurance Awareness is such that makes sure that personnel are up-to-date on the latest computer security threat risks and the protective measures against those threats." (Wimmer, 2012) This training is received by Airmen who complete two modules of training using the Advanced Distributed Learning (ADL) methods. The ADLS provides ADL content and tracks the progress of students.

IV. Core Curriculum

The core curriculum is reported as a "mandatory set of courses all cadets must complete regardless of their academic major. Additionally, cyberspace training is included in various military training events such as the Basic Cadet Training. Finally, USAFA offers upper-class cadets the opportunity to spend one of their summer sessions in Cyber 256, Basic Cyber Operations. The course is intended to spark cadets' interest…

Sources Used in Documents:

Bibliography

Wimmer, April L. (2012) Evaluating the Effectiveness of Air Force Foundational Cyberspace Training. Graduate Research Project. Retrieved from: http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA562742

Department of the Air Force. Air Force Training Program. AFI 36-2201. 15 September 2010. http://www.e-publishing.af.mil/shared/media/epubs/AFI36-2201.pdf

Department of the Air Force. Information For Designers of Instructional Systems -- ISD Executive Summary For Commanders and Managers. AFH 36-2235 Volume 1. Washington: HQ USAF, 2 September 2002. http://www.epublishing.af.mil/shared/media/epubs/AFH36-2235V1.pdf .


Cite this Document:

"Security Technologies And Methodology In The United" (2012, November 04) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/security-technologies-and-methodology-in-82874

"Security Technologies And Methodology In The United" 04 November 2012. Web.24 April. 2024. <
https://www.paperdue.com/essay/security-technologies-and-methodology-in-82874>

"Security Technologies And Methodology In The United", 04 November 2012, Accessed.24 April. 2024,
https://www.paperdue.com/essay/security-technologies-and-methodology-in-82874

Related Documents

With the threat of terrorism remaining so strong in this country it is vital to find new and better ways to protect people and to keep them safe from harm as much as is humanly and technologically possible. Scope of the Study The scope of this particular study is very broad and far-reaching, because there are so many people who are being affected by it now and will be affected by

It's not necessary, for the purposes of this paper, to look in detail at these steps for a basic understanding of how a security assessment is conducted. To understand the nuances, there are about a million books one can read, but we will discuss a few general "rules." The first thing to keep in mind with an assessment is that the methodology is flexible. It has to be to adapt to

The same does apply to security metrics such that these metrics establish the performance within the organization and the effectiveness of the organization's security. The purpose of Risk Analysis is to spot and find security risks in the current framework and to resolve the risk exposure identified by the risk analysis. The type of security risk assessment for an organization is a function of a number of available assessments. However,

Security Audit for FX Hospital EHR/EMR Systems The study carries out the security audits for the FX Hospital EHR/EMR information systems to identify the vulnerabilities in the systems. The study uses the BackTrack as an auditing tool to penetrate the website, and outcomes of the auditing reveal that the website is not secure and can be subject to different vulnerabilities. After carrying out the auditing, the study is able to collect

" (Muntenu, 2004) According to Muntenu (2004) "It is almost impossible for a security analyst with only technical background to quantify security risk for intangible assets. He can perform a quantitative or qualitative evaluation using dedicated software to improve the security of the information systems, but not a complete risk assessment for the whole information system. Qualitative assessment based on questionnaires use in fact statistical quantitative methods to obtain results. Statistical

Airport Security System The secure operation of the aviation system across the globe is one of the most significant factors in the security and economic development of the United States. The use of the world's airspace should also be secured because aviation has become a major target for criminals. Actually, criminals, terrorists, and hostile nations increasingly consider aviation as a major target for exploitation and attack. An example of the