unit 2 homework
docx
keyboard_arrow_up
School
Columbia Southern University *
*We aren’t endorsed by this school
Course
SEC 4302
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by briandjones127
Running head: UNIT II HOMEWORK
1
Unit II Homework Assignment
Brian Jones
Columbia Southern University
UNIT II HOMEWORK
2
Unit II Homework Assignment
Lab 2.1a
Three sites listed on the Department of Defense list of registered websites that feature
policies, guidelines, and documents pertaining to information assurance are listed below.
1.
Defense Counterintelligence and Security Agency. The PDF retrieved from
https://www.dcsa.mil/Portals/91/Documents/CTP/NAO/CNSSI_7003_PDS_September_2
015.pdf outlines the standards and guides for the design and installation of
Protected Distribution Systems (PDS) for information with a specific focus on risk
management.
2.
Defense Standardization Program. This site features a PDF that outlines the governance
of IT standards and has a section that goes in-depth about working with external
organizations to develop and implement IT standards. Retrieved from
https://www.dsp.dla.mil/Portals/26/Documents/Publications/Journal/070101-DSPJ.pdf
3.
National Reconnaissance Office. The NRO site has a large catalog of documents
specifically pertaining to policies and directives on the topic of information assurance.
One such document can be found here;
https://www.nro.gov/Portals/65/documents/foia/declass/ForAll/033017/F-2016-
00116a.pdf
Lab 2.1b
While all the services listed on the Defense Information Systems Agency (DISA) would
greatly add to the effectiveness of secure government operations, three areas stood out the most.
UNIT II HOMEWORK
3
1.
Computing services offered by DISA provide standardized operational processes and
centralized management. The computing services also encompass cloud computing and
storage support as well as mainframe and server hosting.
2.
Analytics and testing cover a wide array of computational analysis of data to offer
support to computer security or administrators. Additionally, the testing aspect of this
service offers multiple assessments regarding cybersecurity, compliance, and network
capabilities.
3.
Finally, the cybersecurity services are designed to protect all aspects and components of a
network, from individual workstations to global content delivery. This service also offers
configuration guidance and incident management services to minimize risk (DISA, n.d.).
Lab 2.2
Two of the more common frameworks used by the Department of Defense (DoD)
pertaining to the auditing and security of information systems are the Federal Information
Security Management Act (FISMA) and the framework created by the National Institute of
Standards and Technology (NIST) known as NIST 800-171. Both frameworks allow for ease of
audits by assigning varying levels of responsibility when it comes to security of information.
Therefor, during an audit, it would be easy to see exactly when and where a breakdown occurred.
FISMA ensures coordination of security between all connected communities from
civilian to national security. Ongoing monitoring of minimum controls to protect data also carries
a high emphasis with FISMA. FISMA also realizes the fact that the best solution for information
security may be found in the commercial marketplace and makes provisions by way of hardening
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
UNIT II HOMEWORK
4
rules and checklists to ensure that commercial applications meet minimum requirements (Weiss
& Solomon, 2016).
Similar to FISMA, the NIST 800-171 offers a framework that deals with the risk
management aspect of informational security. It does this by outlining the strict compliance
guidelines required for, not only the DoD, but also for any contractor or agency who connects to
a network that may have potentially sensitive information. The 800-171 also features provisions
regarding best practices toward making any system as resilient as possible to defend against
attacks (Breaking Defense, 2020).
UNIT II HOMEWORK
5
References
Breaking Defense (2020, February 24). CMMC 1.0 vs. NIST 800-171 -- Eight essential
differences. Retrieved from https://go-gale-
com.libraryresources.columbiasouthern.edu/ps/i.do?p=ITOF&u=oran95108&id=GALE|
A615002252&v=2.1&it=r&sid=ebsco
DISA (n.d.). Services and capabilities. Retrieved from
https://storefront.disa.mil/kinetic/disa/service-catalog#/category/services-and-capabilities
Weiss, M. M., & Solomon, M. G. (2016).
Auditing IT infrastructures for compliance
(2nd ed.).
Burlington, MA: Jones & Bartlett Learning