Nobody downloaded yet

System Identification and Security Categorization - Essay Example

Comments (0) Cite this document
Summary
The reporter underlines that federal statue and requirement are very important to observe in order to access the security pose of the Department of Veterans Affairs (VA). The ability to establish a successful information security system lines on having a good knowledge of the requirements…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
System Identification and Security Categorization
Read TextPreview

Extract of sample "System Identification and Security Categorization"

Download file to see previous pages The principles of the CIA triad; integrity, availability and confidentiality are highly prioritized in the information system. Necessary control mechanism has been incorporated into the information security system in order to provide protection.
These controls have been categorized to technical, management and operational controls. VA’s contain critical information and therefore effective organization, an accomplishment and supervision controls should be conducted with care. The main obligation of the e VAs is to accomplish the highest level of security while meeting the critical needs of an organization.
The VA has been typically viewed by the majority as a mechanism for protecting information and information systems. This is not the case since its major concern is to protect the availability, confidentiality and integrity of the information and the information system. The control principles form the pillars of the CIA triad.
Actions regarding risk management can be executed when planning, assessment of the significance of the risk and identification are carried out in a proper way. Though risk management will not absolutely eliminate risk, it possibly reduces the risk actualization, provides significant remedy and penitential risks in the future. The main goal of the VA is to protect information and information system through risk management program to achieve strategic and operational goals.
The strategy adopted by the Information Security Management Act is based on risk approach. This is sated in the VA (2007), “the operating unit is responsible for conducting an accurate and thorough risk assessment to identify potential risk, vulnerabilities and threats to the confidentiality, integrity and availability of sensitive information held by VA.” The possibility of incurring a threat is potentially construed by the management controls.  ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“System Identification and Security Categorization Essay”, n.d.)
System Identification and Security Categorization Essay. Retrieved from https://studentshare.org/information-technology/1821417-va-security-profile
(System Identification and Security Categorization Essay)
System Identification and Security Categorization Essay. https://studentshare.org/information-technology/1821417-va-security-profile.
“System Identification and Security Categorization Essay”, n.d. https://studentshare.org/information-technology/1821417-va-security-profile.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF System Identification and Security Categorization

The Social Security System

...? The Social Security System School The Social Security System History of the Social Security System In the year 1934, the Committee on Economic Security (CES) was created by the President Franklin D. Roosevelt. Roosevelt assigned the CES the responsibility of exploring the feasibility of a system of economic security that would provide the disabled and the elderly people with income. The government and the family members were the caretakers of the people who were not unable to work. Roosevelt felt the requirement of a national system. Therefore, the CES submitted their...
6 Pages(1500 words)Research Paper

Navigation System Automatic Identification System (AIS)

...Navigation System - Automatic Identification System (AIS) of the Organization: Purpose of the paper: To know the development of AIS and its usefulness in SOLAS and Non-SOLAS vessels. Theme: Navigation System-Automatic Identification System (AIS) development and its future. SOLAS Vs. Non-SOLAS System. Written By: Mita Devi Date: 04.01.06 Abstract: The purpose of this paper is to know what Automatic Identification system is d what are the technical evaluations in it and the practices it includes. This paper says Automatic Identification introduced for the safety and identification of the ships. This is basically to secure the subjects and their lives in the sea... and to...
8 Pages(2000 words)Essay

Computer system Network Security

...Network Security Network security is essential component as now-a-days information is computers are connected worldwide. Information is wealth for organisations. The computer systems are linked both internally and externally. The computers receive and send unlimited information2. Information lost is regarded as financial loss. As organisations are implementing paperless media and computerizing data the need for securing data at various stages become essential. Data is stored in various modes both online and offline1. The data stored online and offline opens up a threat by falling trap to potential hackers who intrude into our systems or network The issue of computer security first arose in the 1970s as individuals began to break... into...
5 Pages(1250 words)Essay

Information and System Security

...Information and System Security Information security means protecting information and information systems from un ized access, use, disclosure,disruption, modification, or destruction. The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information...
2 Pages(500 words)Essay

Information System Security

...security model and carry out certain analyses and implementation steps. This Question will research how Risk management is defined in the literature and of which components it consists of. In addressing risk management, the role of risk analysis is investigated as an important tool in analysing the shortcomings of an organisation’s security system. It will then identify the different methods available to organisations to implement a sound risk management paradigm. What risks are faced by a modern information system, and which solutions are available to face these threats? For the identification of the risks faced by modern information...
56 Pages(14000 words)Essay

System Security

...___________ Grade _____________ d: 2008-12-21 System Security System security over the last twenty years has gone through a tremendous series of ups and downs where the focus of providing security is to minimize uncertainty by measuring the probability of a threat event. Initially the secure and financial data were not on the internet directly so at that time the most common threat to a computer system or to a land environment was the virus attack. Criminal minded geniuses were designing the virus to destroy a system partially or completely. This provided an edge to the antivirus companies to scan,...
2 Pages(500 words)Essay

Automated Fingerprint Identification System

These automated fingerprint identification systems provide rapid and accurate comparisons with large databases (Tilstone, Savage & Leigh 2006). Most newly built buildings have this system installed in them especially so that only authorized people can enter specific places. In this system, a person is identified exclusively by his or her fingerprints, unlike verification system where ID card or PIN numbers are also required side by side fingerprint identification. Fingerprints are scanned into the automated fingerprint system where ridge details and other identifying characteristics are digitized in such in detail that the system can find a match among the millions of fingerprints that are available in the database (Lane 2002)...
21 Pages(5250 words)Research Paper

Elements of Security System

...Elements of Security System An understanding of each of the seven key elements of a security system is important. This paper explains the reason and how security strategy as a key element might require being updated as a perfect way of addressing security risks associated with various business environment changes. When migrating to an email system that is cloud-based, updating security strategy would be important to avoid possible risks associated with the increase concern on hosted email services due to the associated benefits. This could be done by weighing the email services. Regardless of the...
1 Pages(250 words)Coursework

Information system security

...Information System Security Table of Contents 3 Introduction 4 Discussion 5 Certification Standards of the Information Security System 6 Framework and Assumptions for Creation of Information Security System 6 Necessity of Information Security System 9 Information System Security from a Management Perspective 10 Security Issues Associated with Management of an Information System Security and the Appropriate Risk Management 11 Cryptographic Concepts Associated with the Information System...
12 Pages(3000 words)Research Paper

Home Security alarm system

...Home Security Alarm Design Summary: This report presents a design for a home security alarm system. We are required to design our logic circuit using BOOELEAN algebra, and we use His theory to design 4 alarm systems, such as; burglar, water, fire and system. Student decided to design our finish design is a super simple where we only have to use 2 gates such as OR gates and AND gates to do our circuit. Lastly we use our circuit diagram to demonstrate the operation of our circuit to the supervisor. This design are easier to construct and understandable. Technical Introduction: Our group is presented with a home security alarm...
3 Pages(750 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic System Identification and Security Categorization for FREE!

Contact Us