Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

System Identification and Security Categorization - Essay Example

Comments (0) Cite this document
The reporter underlines that federal statue and requirement are very important to observe in order to access the security pose of the Department of Veterans Affairs (VA). The ability to establish a successful information security system lines on having a good knowledge of the requirements…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
System Identification and Security Categorization
Read TextPreview

Extract of sample "System Identification and Security Categorization"

Download file to see previous pages The principles of the CIA triad; integrity, availability and confidentiality are highly prioritized in the information system. Necessary control mechanism has been incorporated into the information security system in order to provide protection.
These controls have been categorized to technical, management and operational controls. VA’s contain critical information and therefore effective organization, an accomplishment and supervision controls should be conducted with care. The main obligation of the e VAs is to accomplish the highest level of security while meeting the critical needs of an organization.
The VA has been typically viewed by the majority as a mechanism for protecting information and information systems. This is not the case since its major concern is to protect the availability, confidentiality and integrity of the information and the information system. The control principles form the pillars of the CIA triad.
Actions regarding risk management can be executed when planning, assessment of the significance of the risk and identification are carried out in a proper way. Though risk management will not absolutely eliminate risk, it possibly reduces the risk actualization, provides significant remedy and penitential risks in the future. The main goal of the VA is to protect information and information system through risk management program to achieve strategic and operational goals.
The strategy adopted by the Information Security Management Act is based on risk approach. This is sated in the VA (2007), “the operating unit is responsible for conducting an accurate and thorough risk assessment to identify potential risk, vulnerabilities and threats to the confidentiality, integrity and availability of sensitive information held by VA.” The possibility of incurring a threat is potentially construed by the management controls.  ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“System Identification and Security Categorization Essay”, n.d.)
System Identification and Security Categorization Essay. Retrieved from
(System Identification and Security Categorization Essay)
System Identification and Security Categorization Essay.
“System Identification and Security Categorization Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF System Identification and Security Categorization

The Social Security System

...? The Social Security System School The Social Security System History of the Social Security System In the year 1934, the Committee on Economic Security (CES) was created by the President Franklin D. Roosevelt. Roosevelt assigned the CES the responsibility of exploring the feasibility of a system of economic security that would provide the disabled and the elderly people with income. The government and the family members were the caretakers of the people who were not unable to work. Roosevelt felt the requirement of a national system. Therefore, the CES submitted their findings to Roosevelt in January 1935in which the plan of the economic security’s national program was outlined that was later recognized as the Social Security Act (SSA...
6 Pages(1500 words)Research Paper

Navigation System Automatic Identification System (AIS)

...Navigation System - Automatic Identification System (AIS) of the Organization: Purpose of the paper: To know the development of AIS and its usefulness in SOLAS and Non-SOLAS vessels. Theme: Navigation System-Automatic Identification System (AIS) development and its future. SOLAS Vs. Non-SOLAS System. Written By: Mita Devi Date: 04.01.06 Abstract: The purpose of this paper is to know what Automatic Identification system is d what are the technical evaluations in it and the practices it includes. This paper says Automatic Identification introduced for the safety and identification of the ships. This is basically to secure the subjects and their lives in the sea...
8 Pages(2000 words)Essay

Computer system Network Security

...Network Security Network security is essential component as now-a-days information is computers are connected worldwide. Information is wealth for organisations. The computer systems are linked both internally and externally. The computers receive and send unlimited information2. Information lost is regarded as financial loss. As organisations are implementing paperless media and computerizing data the need for securing data at various stages become essential. Data is stored in various modes both online and offline1. The data stored online and offline opens up a threat by falling trap to potential hackers who intrude into our systems or network The issue of computer security first arose in the 1970s as individuals began to break...
5 Pages(1250 words)Essay

Information and System Security

...Information and System Security Information security means protecting information and information systems from un ized access, use, disclosure,disruption, modification, or destruction. The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take...
2 Pages(500 words)Essay

Information System Security

... security model and carry out certain analyses and implementation steps. This Question will research how Risk management is defined in the literature and of which components it consists of. In addressing risk management, the role of risk analysis is investigated as an important tool in analysing the shortcomings of an organisation’s security system. It will then identify the different methods available to organisations to implement a sound risk management paradigm. What risks are faced by a modern information system, and which solutions are available to face these threats? For the identification of the risks faced by modern information systems, the researcher identified and presented the most common risks and threats a modern information...
56 Pages(14000 words)Essay

System Security

... ___________ Grade _____________ d: 2008-12-21 System Security System security over the last twenty years has gone through a tremendous series of ups and downs where the focus of providing security is to minimize uncertainty by measuring the probability of a threat event. Initially the secure and financial data were not on the internet directly so at that time the most common threat to a computer system or to a land environment was the virus attack. Criminal minded geniuses were designing the virus to destroy a system partially or completely. This provided an edge to the antivirus companies to scan, remove, and protect from virus attacks. The virus attack can only be possible to a system via removable storage devices (zip drive, jazz...
2 Pages(500 words)Essay

Practical Windows Security - The Identification of Vulnerabilities

... this vulnerability be exploited and how an exploit might work. In this scenario this report will also analyze remedial action necessary to mitigate this CVE/MS (Mitre, 2010). 2- CVE (Common Vulnerabilities and Exposures) Vulnerability or Information security vulnerability is a flaw or error in software that is competent to be openly utilized by a hacker to get admittance to a system or a network. Exposure of information or information security exposure is incorrectness in software that generally permits admittance to the information or potentials that is capable to be employed by a hacker or intruder like a method of taking out somewhat into a network or system (Mitre, 2010; Shelly et al., 2005; Norton, 2001). As I have already stated...
11 Pages(2750 words)Case Study

Automated Fingerprint Identification System

...AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM The process where fingerprints are automatically matched to a database with prints of unknown or known people is called automated fingerprint identification system. The automated fingerprint identification system can be used for various purposes. The most important use of this system is in the law enforcement departments which use this system to identify criminals or people who are related to or linked to any kind of crime. This automated fingerprint identification system is also very useful in access control systems as well like for example nowadays this system is very common in new technology laptops so that only the owner of the laptop can access it. These automated fingerprint identification...
21 Pages(5250 words)Research Paper

Information system security

...Information System Security Table of Contents 3 Introduction 4 Discussion 5 Certification Standards of the Information Security System 6 Framework and Assumptions for Creation of Information Security System 6 Necessity of Information Security System 9 Information System Security from a Management Perspective 10 Security Issues Associated with Management of an Information System Security and the Appropriate Risk Management 11 Cryptographic Concepts Associated with the Information System Security 13 Information System Security Breach 15 Conclusion 19 References 20 Abstract Advancement in the information technology (IT) has undoubtedly yielded significant benefits to individuals, business and government. However, dazzling growth in IT has...
12 Pages(3000 words)Research Paper

Security-Enhanced Linux System

In the modern information age, one is aware of the ongoing battle between proprietary software providers and open source initiatives with each trying to vie over the other in an effort to gain control of the software market. While the traditional profit-seeking proprietary vendors have been building their presence over the years through sound branding and marketing, the people involved in open source initiatives have succeeded in gathering a relatively commendable group of dedicated enthusiasts who are passionate about software and who believe that it must be available to everyone for free. Over the years, despite the availability of hundreds of amazing open source tools, one name has captured both the imagination and awe of every...
11 Pages(2750 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic System Identification and Security Categorization for FREE!

Contact Us