StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

NSA Information Security Standards - Research Paper Example

Cite this document
Summary
National Security Agency Institution Name Instructor Course Date The National Security Agency (NSA) is United States’ cryptologic institution. NSA synchronizes, performs exceedingly focused activities to protect Unites Stares information security systems, directs and creates foreign intelligence data…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
NSA Information Security Standards
Read Text Preview

Extract of sample "NSA Information Security Standards"

National Security Agency The National Security Agency (NSA) is United s’ cryptologic NSA synchronizes, performs exceedingly focused activities to protect Unites Stares information security systems, directs and creates foreign intelligence data. A cutting-edge institution, National Security Agency, is on the limits of communications and information processing. It is one of the most crucial organs of foreign language assessment and research inside the government. Federal Information Federal Information Processing Standard (FIPS) No.

197, was unveiled in 2001 and thus far supported the Advanced Encryption Standard (AES) as the official algorithm for shielding insightful and unclassified electronic information. For a long time, questions have surfaced whether Advanced Encryption Standard (AES) can or should be utilized to shield classified data and at what extent. Reactive to those questions, NSA has carried an analysis and appraisal of EAS and its applicability to the shielding of national security programmes and/or data (Singh, 2011) In the perspective of current sophisticated world and all the more sophisticated communicating atmospheres, the necessity for protecting data takes up extra importance.

The fortification of data is not exclusively reliant on the arithmetic strength of an algorithm that may be a constituent of communications security tool or a communications mechanism, nor is the selection of the algorithm focused just upon the classification of the data to be safeguarded. Random numbers are fundamental for cryptography. For instance, arbitrary authentication hurdles, encryption keys, nonces and initialization vectors. These realities determine the adoption of an elastic and adaptable plan that inspires the utilization of a mix of properly conducted National Security Agency.

Conventional on-hypothesis information centers clarifications do not adhere to virtualized atmosphere due to the sophisticated and ever-active feature of cloud computing. Nevertheless, the virtualization in itself does not influence the security if it is utilized on-theory in practical, rational and ecological deserted secured atmosphere. IPS and IDS classifications can protect the internal essential and physical technology from the external environment. For example, in cloud computing, particularly in Paas and Iaas, the assets are mutual and borrowed to the distinct clients.

In essence, the equivalent technology can be divided to many distinct clients. The present virtualization is fragile and be effortlessly attacked. As a result, the security classification for some errors is established; however, new security terrorization and susceptibilities surface every day. Consequently, the communicating sequential processes (CSP) security threshold is disintegrated from within, therefore making IPS and IDS desolate. Thus, CSPs should usher productive separation amid the calculus of communicating systems (CCs), though permitting technical asset sharing.

It has been proposed that standards for efficiency cryptography (SEC2) classification which makes it possible for users to modify their security standard settings the same manner they regulate their on-premise system. Assessing ISO 27002:2005 needs and their regulations, it is worth to note that control that covers the virtualization is non-existent. Certainly, access control, many standard controls, presumes that controlling systems are on a different real technology. The aspects of importance do not alter on standard the control objectives.

Therefore, moving into cloud CCs shifts the significance of the security on just two of them. Thus far the ISO/IEC 270002 are classified in control systems, for on-theory and cloud (CNNSS Policy, 2003). Conclusion The E-Government Act, which was enacted by the 107 Congress and signed into decree by the President in 2002, acknowledges the significance of data security to the economic and national security of the United States. Federal Information Security Management Act (FISMA),which is a title of E-Government Act, stresses the requirement for each central bureau to produce, document, and carry out a project-extensive system to offer information security for the data and data programs that embrace the functionalities and assets of the bureau involving those offered or controlled by another bureau, and/or source.

FISMA was responsible for directing the dissemination of federal standards for the nominal security needs for data and data systems in each such classification. FISMA also directed the transmission of federal standards for security classification of federal data and information programs aimed at the objective of offering proper levels of data security with regard to a range of risk intensities. This standard articulates the measurement of nominal security needs for federal data and data classifications.

ISO/IEC 27000:2500 series of standards are nonspecific and they cover not just scientific clarifications to scientifically established threats and susceptibilities; they also consider the outfitted, institutional and administration vulnerability, too. Because of its generality, and the many open cloud security problems, ISO/IEC 27001:2005 is not completely conformal with cloud data classification. Hence, it is proposed that a new control goal in ISO/IEC 27000:2005 needs, virtualization organization, including two extra controls covering virtualization and practical technology control (Department of Commerce, 2006).

References G. Singh. A., Sharman., Lehal.M.S.( 2011). ‘Security Apprehensions in Different Regions of Cloud Captious Grounds.” International Journal of Network and Security and Its Applications. 3:48-57. CNNSS Policy, 2003. National Policy on the Use of the Advanced Encryption Standard to Protect National Security Systems and National Security Information. Retrieved from http://csrc.nist.gov/groups/STM/cmvp/documents/CNSS15FS.pdf Department of Commerce, 2006. “Minimum Security Requirement for Federal Information and Information Systems.

” Retrieved from http://csrc.nist.gov/publications/fips/fips200/FIPS-200-final-march.pdf

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“NSA Information Security Standards Research Paper”, n.d.)
NSA Information Security Standards Research Paper. Retrieved from https://studentshare.org/information-technology/1471249-nsa-information-security-standards
(NSA Information Security Standards Research Paper)
NSA Information Security Standards Research Paper. https://studentshare.org/information-technology/1471249-nsa-information-security-standards.
“NSA Information Security Standards Research Paper”, n.d. https://studentshare.org/information-technology/1471249-nsa-information-security-standards.
  • Cited: 0 times

CHECK THESE SAMPLES OF NSA Information Security Standards

American and British System For Regulating Occupational Health and Safety

INTRODUCTION.... In the current global situation where competition grows so immensely and many industries needed a pool of workers and laborers there is a need to legislate an act that shall protect every workers rights and privileges especially when being employed into the government, private firm, company or industries....
11 Pages (2750 words) Essay

National Security Agency

The USA Patriot Act's section 215 gives permission to the government to access specific business records for use in national security investigations.... Also, the Foreign Intelligence… rveillance Act under section 402 allows the government to install and make use of a trap or pen register and trace device for investigations on national security.... It is worth noting that although a huge amount of the information is collected, a vast majority of it does not usually get reviewed....
9 Pages (2250 words) Research Paper

Edward Snowdens NSA Leaks

A paper "Edward Snowden's NSA Leaks" claims that the manner in which these agencies work to undermine security standards that commerce, banking, and internet rely upon were revealed.... The manner in which these agencies work to undermine security standards that commerce, banking and internet rely upon were revealed.... At the time, there were a lot of opportunities for contractors as the United States security outsourced intelligence tasks to outside private companies....
2 Pages (500 words) Assignment

Cryptology Advancing National Security

hellip; This essay demonstrates that there are constant threats to national security with government servers constantly coming under attack, as people have now developed technology that is able to break advanced encryption protocols and in that way gain access to sensitive password-protected information.... In a day and age where people are very keen on computer programs and able to hack into national security databases, it is now more important.... In the same way that no one wants a thief having their bank details, we also do not want terrorists having sensitive national security information....
7 Pages (1750 words) Essay

Information System Security Plans

In that direction, the Information Technology Laboratory (ITL) at the National Institute of standards and Technology (NIST) has developed guidelines on the ways to formulate and adopt a security plan.... A nation can protect itself from threats and reach the top echelons only if its security system is made optimal and effective without any chance of loopholes.... This is where the role of a security plan assumes significance.... A foolproof security plan for the nation's federal… cies and other governmental organizations can enable it to function securely and efficiently thereby giving the nation an ‘edge' over other nations....
5 Pages (1250 words) Research Paper

Microsoft ISA Server

hellip; Microsoft is one of the biggest manufacturers of operating systems but this company is trying to present itself as one of the leading provider of complete IT solutions concerning business besides providing operating systems so, they came up with Internet security and Acceleration Server (ISA Server).... Moreover, it can support any version of Windows Server from Windows 2000 and they are used to offer certain security functions either at the individual level or group level....
10 Pages (2500 words) Case Study

The NSA, Government Spying, and Privacy

In 2013, the company cracked one of the most popular encryption standards, A5 and intercepted contents of the cell... Bush executed the National security Agency's domestic spying program after the September 2001 attack.... From the revelations of Edward Snowden and other independent reporters, we have learned about a numbers of ways the National security Agency is spying on… Given authority by the Patriot Act, the NSA gets the business records related to the terrorist investigations....
4 Pages (1000 words) Essay

Homeland Security of the US

The paper "Homeland security of the US" describes that the DHS works with the U.... The DHS also works with the country's economic and industrial sectors to develop a range of vulnerability assessment tools to meet their unique security challenges.... In response to the attacks of September 11, 2001, President Bush authorized the National security Agency (NSA) to conduct warrantless surveillance on international communications into or out of the U....
11 Pages (2750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us