Tuesday, May 14, 2019
CyberSecurity Profile on the CIA Essay Example | Topics and Well Written Essays - 500 words
CyberSecurity Profile on the CIA - Essay ExampleG-1 G-2, F-51 field of study Archives and Records Administration, 2000 Central Intelligence Agency, 2012).The available data suggests that the CIA strictly categorizes data and information systems in symmetry with the laws, directives and guidelines attendant to the critical nature of the work of the CIA and the confidential nature of such data and systems. The data suggests stately documentation, as evident from the rigor of the categorization, though formal documentation is not available from the sources. The assumption is that categorization approval is embedded in the CIA policies and procedures, and emanates from the very top of the organization (National Institute of Standards and Technology, 2010, pp. G-1 G-2. F-226 Clift, 2007 Clift, 2007 Thibodeau, 2009).The CIA does appoint a ranking(prenominal) information security officer to take charge of information security program coordination, development, implementation and nut rition across the whole organization, in the person of the Chief Information subprogramr or CIO. The CIO is empowered with the captivate mandate, coming from the US President and the organization, as well as with the suspend resources for the purpose (National Institute of Standards and Technology, 2010, pp. G-1 G-2 ,F-207, Office of the Director of National Intelligence, 2012).From the available literature, and from the example of its evolving cloud architecture, the functional architecture exists with the corresponding external interfaces, the appropriate security clearances and levels, information storage and transmission compliant with the laws, and level of priority for restoration of the information and think services (National Institute of Standards and Technology, 2010, pp. G-1 G-2, F-201 Clift, 2007 Central Intelligence Agency, 2012 Thibodeau, 2009).There are appropriate screening procedures prior to attack
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.