StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

NSA Cyber Security Profile - Research Paper Example

Cite this document
Summary
NSA Cyber Profile Name Institute Instructor Course Date Recent information systems are sophisticated collections of technology, processes and people, working in unison to offer institutions with the potential to procedures, transmit, store data in a timely mode to support numerous missions and commercial functions…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
NSA Cyber Security Profile
Read Text Preview

Extract of sample "NSA Cyber Security Profile"

Download file to see previous pages

The assortment of the proper security controls for an information system is an essential duty that can have major ramifications on the functions and assets of an institution as well as the wellbeing of persons. Security controls are the organization, functional, and technical safeguard or counteractions prearranged for an information system to shield the confidentiality, integrity, and accessibility of the system and its data. Once implemented inside an information organism, security controls are examined to offer the data required to establish their general efficiency; that is, the degree to which the controls are carried out precisely, operating as intended, and creating the desired result with regard to meeting the security needs for the organism.

Knowing the general productivity of the security controls carried out in the information system and its environs of operation is important in establishing the risk to the institution’s functions and assets, to persons, to other institutions, and the to the country resultant from the utilization of the system. The purpose of this paper is to offer guidelines for creating effectual security scrutiny plans and a comprehensive set of proceedings for examining the effectiveness of security controls implemented in the information systems (Gallagher & Locke, 2010) Security assessments can be effectively implemented at some phases in the organism development life cycle to expand the grounds for assurance that the security controls engaged inside or inherited by a data system are effective in their application.

For instance, data system developers frequently carry security assessments and system integrators at the development and implementation stages of life cycle to assist make sure that the needed security controls for the organism, and/or system are appropriately intended and developed (Department of Defense, 2006). Assessment activities in the original system development life phase can be revolved more quickly mode before proceeding to succeeding phases in the life cycle. Examiners receive the needed proof during the scrutiny process to permit the proper institutional officials to make objectivity establishment about the effectiveness

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“NSA Cyber Security Profile Research Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1472537-nsa-cyber-security-profile
(NSA Cyber Security Profile Research Paper Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1472537-nsa-cyber-security-profile.
“NSA Cyber Security Profile Research Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1472537-nsa-cyber-security-profile.
  • Cited: 0 times

CHECK THESE SAMPLES OF NSA Cyber Security Profile

Unified Threat Management: A Defensive Suite for the 21st Century

Unfortunately, at present, UTMs benefits are apocryphal: Though arguably superior to existing offerings, they are far from complete security suites.... The problem that many IT security professionals see with UTM is that focused programs are likely to have functionalities and specializations that a general solution might not (SC Magazine, 2007)....
13 Pages (3250 words) Essay

Managing Intelligence Activities

This paper will be useful to John Kerry; The United States Secretary of State to enhance his supervisory role on the effective performance of security agencies in combating insecurity challenges as it describes the principles of planning budget in this regard.... hellip; security is a very sensitive issue in every country and therefore invites the conservative approach by security agencies on the modalities of countering its imminent challenges....
1 Pages (250 words) Essay

Cyber Security as the Process of Different Security Measures

This essay analyzes that cyber security refers to the process of applying different security measures to foster integrity, confidentiality, and accessibility of data.... cyber security ensures the protection of assets of an organization, including servers, data, buildings, humans, and desktops.... cyber security is a global concern because cyberspace is increasingly becoming a crucial asset to nations.... cyber security is a global concern because cyberspace is increasingly becoming a crucial asset to nations....
6 Pages (1500 words) Essay

Black Ice: The Invisible Threat of Cyber Terrorism

IT security is a national security issue.... lack Ice is packed with fictional scenes, commentaries, and interviews by leading government officials related to national security.... IT security is a national security issue.... This book review "Black Ice: The Invisible Threat of cyber Terrorism" analyzes “Black Ice: The Invisible Threat of cyber Terrorism”.... The book is an investigation of the possibility of cyber terrorism, its global and financial implications, its impact on civil and private infrastructure, and the interest of the international terrorist organizations in the United States....
8 Pages (2000 words) Book Report/Review

Electronic Identity Threats

As the Internet continues to evolve, threats related to hacking and security breaches are protected by cryptographic protocols but electronic identity theft has risen.... This case study "Electronic Identity Threats" discusses the challenge of rising identity thefts in the UK....
6 Pages (1500 words) Case Study

The Issues of Privacy and Surveillance about the Internet

On the Internet, profiling has become comfortable not only because of the technology but also because the required information to profile people is free and readily accessible on online social networking sites.... This paper ''The Issues of Privacy and Surveillance about the Internet'' tells that Privacy is security.... Instead, we wanted to draw a clear line between privacy and security interest, as we see how easily online surveillance can be abused not only for cybercrimes but much more frightening for witch-hunting....
6 Pages (1500 words) Coursework

Impact of the NSA Affair on German-American Partnership

Nonetheless, Germany still wants to maintain its cooperation with the US because of its technological advantage, which is critical to Germany's security goals.... However, the US's relations with global powers have been strained since 2004, when it was revealed that the US National security Agency (NSA) was spying on other nations, allies, and foes included3.... "Impact of the nsa Affair on German-American Partnership" paper explores the extent to which the nsa affair has affected the German-American partnership in international crisis management....
8 Pages (2000 words) Coursework

State Surveillance Practices by Edward Snowden

On the Internet, profiling has become easy not only because of the technology but also because the required information to profile people is free and readily accessible on online social networking sites.... nowden's exposé rekindled issues of privacy which in today's context of global security has become more complex than ever.... Hence, online surveillance is meant to assure us of our security.... Snowden, a former contractor of the nsa (Devlin 12) proved this to be true....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us