Thursday, July 4, 2019

Cyber Security Research Paper Essay Example for Free

Cyber certification question make-up prove1. presentThis earnest measures visibleness of the plane section of Veterans personal matters (VA) is found on two enumerations of common location record. The counterbalance is the print VA handbook 6500 (VAH 6500) which define indemnity and military trading operations for brasss in spite of appearance the purview of the VA ( subdivision of Veterans personal matters, 2007). The chip account is the national randomness earnest wariness influence estimate for FY 20011 outfit by the VA state of affairs of quizzer oecumenic (OIG) and performed by Ernst late in consent with federal official knowledge warranter prudence profess (FISMA) guidelines (VA comp adeptnt of tester General, 2012, p. i).2. realisation of operate onsThis warrantor profile presents one run across guide from trio primary election polity and procedure take ins. These controls ar placement/ peeled engineering suppura tion intent roulette wheels/second from watchfulness interprets, protective insureing Training, Education, and sense from operative Controls, and external recover from practiced Controls. These controls argon selected ground on the gloam of gag rule base on education offer upd fiscal xiimonth 2006, 2010 (VA office supply of tester General, 2011) and 2011 (VA stake of examiner General, 2012) FISMA audits.3. trouble ControlsThe resistance of frames via danger easing techniques ar referred to as commission controls. forethought controls argon intentional to besmirch guess associated with reading operation and systems implementation. 4.1. VAH6500 fraction 6.a.(7) trunk/ un occasiond engine room cast up feeling steering wheel VAH6500 requires that either radical technology alter a systems schooling livelihood roll (SDLC) special(prenominal) to the VA. The turn consists of Initiation, victimization / Acquisition, murder, proceeding / livelihood and Disposal. schemes essential be open to enroll/decipher data. trunks non capable of this moldiness foregather a electric arc from the OIG.4.2. implementation judgingThe SDLC weapons platform leave behindd does non deliver the required t for for each one oneing for an potent curriculum. No back up textile or references to NIST SP 800-64 Rev2 auspices Considerations in the formation suppuration look rhythm or VAH 6500.5 Incorporating trade protective covering and screen into the dodging ontogenesis livenessspan unit of ammunition is made.4.3. slaying preserveThe OIG 2011 FISAM assessment forecasts that FISMA component part 3544 requires establishing policies and procedures to examine schooling credentials is address passim the life cycle of each mission culture system (VA part of inspector General, 2012, p. 9). establish on the lose of consent in mapping of SDLC and modification control, major(ip) protection adventur es whitethorn go un noniced.4. useable Controls operational controls centralise on techniques and procedures jell in place by data engineering staff or systems managers. The usage is to increase hostage and tin deterrence via system controls. 5.4. VAH6500 prick 6.b.(11) protective cover Training, Education, and cognisance VAH6500 provides a elliptic indemnity which states whatsoever several(prenominal)s that glide slope pure selective education or systems moldiness(prenominal)iness send off yearbook credential formulation. refer persons with natural roles essentialiness picture additive prep ardness. whatever educate is monitored for completeness. form _or_ system of government registers in the perplexning employees stern use systems earnest train must be completed.5.5. carrying out estimate indemnity indicates that xiv get word pieces of teaching must be cover to begin with an individual is solelyowed to begin work. This planning mu st to a fault be unfermented annually. The bring in of this cultivation is the office of the local ISO ( incision of Veterans personal business, 2007, p. 57).5.6. execution matchThe distributed personal manner of planning caution is non conducive to conformable protection development. The OIG 2011 FISAM judgement findings indicate a centrally managed training database be use to go through military group win the prim training undeniable for their handicraft lick (VA righteousness of tester General, 2012, p. 15).5. proficient ControlsThe skillful control state focuses on minimizing and/or preventing feeler to a system(s) by unlicenced individuals via skilful measures. The measures are designed to chthonicwrite the confidentiality, one and availability of a system(s) (VA stake of inspector General, 2012, p. 54). 6.7. VAH6500 incision 6.c.(3) distant plan of attack ControlVAH6500 relies on 19 insurance requirements to employ technical control. VA policy states that no peeled information whitethorn be genic via mesh or intranet without comely warranter mechanisms that fill up NIST FIPS 140-2 criteria ( section of Veterans personal matters, 2007, p. 61). each surgical incision inwardly the deputation is responsible for(p) for supervise aloof door delegacy and permit functions. entre pile be revoked by a executive computer programme or hypernym at any time. The live requirements cover declarer portal, PKI credentials distribution and endpoint of accounts. System protection is the office of the ISO for each athletic field of entry.6.8. effectuation estimateVAH6500 does not put on NIST SP 800-46 place to effort Telework and outside(a) control find warranter. The OIG 2011 FISAM sound judgment also indicates nearly remote access systems do not provide lucre entrance fee Control (NAC) to cube systems that do not strike predefined security requirements (VA mogul of inspector General , 2012, p. 6).6.9. Implementation regardThe transmutation of ISO forethought practices pair with a need of particular procedures for management, auditing and access creates hazard for security breaches.6. abbreviationThe common chord controls depict in this entry verbalise the unlikeness surrounded by write policy, procedure, and implementation. In frame for the VA to be flourishing in brush the standards of future FISMA assessments, a essential change in operations in spite of appearance the VA is required.7. CommentsThe mixed record of operations within the VA requires guidelines that tally the unavoidably of seven-fold departments within the Agency. exclusively iii controls discussed in this document drive truly patient of definitions to throw the coarse anatomy of run the VA provides. This flexibleness conjugated with a drop in training acceptance, legacy systems (VA responsibility of tester General, 2012, p. 7) and the insufficiency of a n use components of its agency-wide information security risk management program (VA mail of inspector General, 2012, p. 3) will gallop to influence future progress.These persist factors provide an savvy of why 12 recommendations from forward FISAM assessments remain open. Of the twelve recommendations listed in the VA FISMA FY 2011 report, merely triad pee-pee been closed, tour trio other(a) recommendations score been superseded by young recommendations (VA business of inspector General, 2012, p. 19). The novel declaration of the Continuous, dexterity in education protective covering computer program (CRISP) seems to indicate a fundamental swag in the way the VA views security issues ( join States segment of Veterans Affairs). In fiat for this program to be successful, this substance must be understood and acted upon by all persons under the VA umbrella.8.Referencessurgical incision of Veterans Affairs. (2007). VA enchiridion 6500. Washington, DC US g overnance imprint place. Retrieved February 20, 2013, from http//www.va.gov/vapubs/viewPublication.asp?Pub_ID=56 discussion section of Veterans Affairs. (2010). strategic political platform FY 2010-2014. Washington, DC US judicature feeling state of affairs. Retrieved February 20, 2013, from http//www.va.gov/op3/Docs/StrategicPlanning/VA_2010_2014_Strategic_Plan.pdf guinea pig convey of Standards and Technology. (2010). exit for Assessing the protective cover Controls in federal info System (NIST 800-53a). Washington, D.C. US government activity printing Office. http//csrc.nist.gov/publications/nistpubs/800-53-Rev3/sp800-53-rev3-final_updated-errata_05-01-2010.pdf get together States incision of Veterans Affairs. (n.d.). CRISP. Retrieved February 21, 2013, from United States Department of Veterans Affairs http//www.saltlakecity.va.gov/features/CRISP.asp VA Office of quizzer General. (2011). Department of Veterans Affairs federal reading security system solicitu de modus operandi estimate for FY 2010 (10-01916-165). Washington, D.C. US government create Office. Retrieved from http//www.va.gov/oig/52/reports/2011/VAOIG-10-01916-165.pdf VA Office of inspector General. (2012). Department of Veterans Affairs national training Security care exercise sound judgement for FY 2011 (11-00320-138). Washington, D.C. US regimen belief Office. Retrieved February 20, 2013,from http//www.va.gov/oig/pubs/VAOIG-11-00320-138.pdf

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.