StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

CyberSecurity Profile on the CIA - Essay Example

Cite this document
Summary
The CIA develops and documents security awareness and training policy and procedures, evident from its intensive focus on security issues tied to emerging IT and communication platforms, including the Internet (Clift, 2007). There is not enough data to assess whether such…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful
CyberSecurity Profile on the CIA
Read Text Preview

Extract of sample "CyberSecurity Profile on the CIA"

CIA Cybersecurity Profile Table of Contents AC SECURITY AWARENESS AND TRAINING POLICY AND PROCEDURES 3 RA-2. SECURITY CATEGORIZATION 3 PM-2. SENIOR INFORMATION SECURITY OFFICER 3PL-2 (2). SYSTEM SECURITY PLAN 4PS-3. PERSONNEL SCREENING 4References 4AC-1. SECURITY AWARENESS AND TRAINING POLICY AND PROCEDURES The CIA develops and documents security awareness and training policy and procedures, evident from its intensive focus on security issues tied to emerging IT and communication platforms, including the Internet (Clift, 2007).

There is not enough data to assess whether such procedures address roles and responsibilities, scope and purpose, but the assumption from the wealth of evidence suggests rigor, and so it may be assumed that such is being addressed. The same goes for the dissemination of documented procedures for those with roles related to them, and the formal development of those procedures (National Institute of Standards and Technology, 2010, pp. G-1 – G-2, F-51; National Archives and Records Administration, 2000; Central Intelligence Agency, 2012).RA-2. SECURITY CATEGORIZATION The available data suggests that the CIA strictly categorizes data and information systems in accordance with the laws, directives and guidelines attendant to the critical nature of the work of the CIA and the confidential nature of such data and systems.

The data suggests formal documentation, as evident from the rigor of the categorization, though formal documentation is not available from the sources. The assumption is that categorization approval is embedded in the CIA policies and procedures, and emanates from the very top of the organization (National Institute of Standards and Technology, 2010, pp. G-1 – G-2. F-226; Clift, 2007; Clift, 2007; Thibodeau, 2009).PM-2. SENIOR INFORMATION SECURITY OFFICER The CIA does appoint a senior information security officer to take charge of information security program coordination, development, implementation and maintenance across the whole organization, in the person of the Chief Information Officer or CIO.

The CIO is empowered with the appropriate mandate, coming from the US President and the organization, as well as with the appropriate resources for the purpose (National Institute of Standards and Technology, 2010, pp. G-1 – G-2 ,F-207, Office of the Director of National Intelligence, 2012). PL-2 (2). SYSTEM SECURITY PLAN From the available literature, and from the example of its evolving cloud architecture, the functional architecture exists with the corresponding external interfaces, the appropriate security clearances and levels, information storage and transmission compliant with the laws, and level of priority for restoration of the information and related services (National Institute of Standards and Technology, 2010, pp.

G-1 – G-2, F-201; Clift, 2007; Central Intelligence Agency, 2012; Thibodeau, 2009).PS-3. PERSONNEL SCREENING There are appropriate screening procedures prior to access to information systems, as is evident in the current literature on the CIA initiatives on the Internet, including the cloud. The existing literature though, does not have data on re-screening, and it is not easy to extrapolate such details from the available data (National Institute of Standards and Technology, 2010, pp. G-1 – G-2, F-219; Clift, 2007; Central Intelligence Agency, 2012; Thibodeau, 2009).

ReferencesCentral Intelligence Agency (2012). Counterintelligence. CIA.gov. Retrieved 27 September 2012 from https://www.cia.gov/library/reports/archived-reports-1/ann_rpt_1999/dci_annual_report_99_16.html Clift, A. (2007). Intelligence in the Internet Era: From Semaphore to Predator. CIA.gov. Retrieved 27 September 2012 from https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol47no3/article06.html National Archives and Records Administration (2000).

Records Management in the Central Intelligence Agency. FAS.org. Retrieved 27 September 2012 from http://www.fas.org/sgp/othergov/naracia.html National Institute of Standards and Technology (2010). NIST Special Publication 800-53A Revision 1: Guide for Assessing the Security Controls in Federal Information Systems and Organizations- Building Effective Security Assessment Plans. US Department of Commerce. Retrieved 27 September 2012 from http://csrc.nist.gov/publications/nistpubs/800-53A-rev1/sp800-53A-rev1-final.

pdf Office of the Director of National Intelligence (2012). Chief Information Officer. DNI.gov. Retrieved from http://www.dni.gov/index.php/about/leadership/chief-information-officer Thibodeau, P. (2009). CIA building secure cloud-based system. Computerworld. Retrieved 27 September 2012 from http://www.computerworld.com/s/article/344455/CIA_Building_Secure_Cloud_based_System

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CyberSecurity Profile on the CIA Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
CyberSecurity Profile on the CIA Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1604116-cybersecurity-profile-on-the-cia
(CyberSecurity Profile on the CIA Essay Example | Topics and Well Written Essays - 500 Words)
CyberSecurity Profile on the CIA Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1604116-cybersecurity-profile-on-the-cia.
“CyberSecurity Profile on the CIA Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1604116-cybersecurity-profile-on-the-cia.
  • Cited: 0 times

CHECK THESE SAMPLES OF CyberSecurity Profile on the CIA

National Initiative for Cybersecurity Careers and Studies

cybersecurity remains one of the top national security challenges, taking charge of protecting computer networks and critical infrastructure from attacks by hackers, criminal groups, foreign nations and even terrorist organizations.... The National Initiative for cybersecurity Education, is a national effort comprising of more than twenty Federal agencies and departments, industry and academia seeking to raise cybersecurity awareness in America....
3 Pages (750 words) Essay

The vulnerabilities of industrial control systems and possible solutions

For example, Tom Donahue from the cia stated that "attacks on critical infrastructure lack the necessary dramatic display that seems to be preferred by this constituency" (Marsh, 2006, p.... t the conclusion of this 2004 forum, NIST produced the System Protection profile-Industrial Control Systems (SPP-ICS) to use as guidelines and strategies to find the vulnerabilities in each facility and possible solutions....
3 Pages (750 words) Essay

Phishing as a Cybercrime

These URLs would instead lead them to a site where they would key in their details which would be tapped for cyber cybersecurity Q.... cybersecurity Myths on Power Control Systems: 21 Misconceptions and False Beliefs.... As a recently terminated employee, I would use this trust by employees of my former employer, Finance Bank to commit a cyber crime....
1 Pages (250 words) Coursework

Cybersecurity as a Metaphoric Abstraction

Cybercrime and cybersecurity.... McMorrow (2010) considers cyberspace as a metaphoric abstraction that has been used in both computing and philosophy to represent the world both in computer systems and on their networks.... But Ivanova (2006) further broadens the definition to encompass the electromagnetic… Thus, cyberspace would be said to be an abstraction in which the electromagnetic spectrum and various electronics would be used in the storage, modification and exchange of information Cyber Security Topic McMorrow considers cyberspace as a metaphoric ion that has been used in both computing and philosophy to represent the world both in computer systems and on their networks....
1 Pages (250 words) Coursework

Health and Criminal Justice Professionals

opic 4 – While psychological profiling of criminals is not a new field, should we attempt to profile cyber criminals?... Cybercrime is no longer new, but authorities still have not created a single, specific profile that will easily determine a person to be a hacker or an identity thief over the internet.... The study by Nykodym, Taylor and Viela (2005) discussed different approaches to profiling of cyber-criminals and from a common person's perspective, attempting to profile these types of criminals seems to be a waste of time....
3 Pages (750 words) Coursework

Anonymity of Individuals on the Internet

It also creates misrepresentation about the user's profile on internet.... cybersecurity Question Determine the extent that anonymity has helped better society, industry, and individuals.... It is in this context that anonymity on internet can have diverse consequences for the users owing to its diverse features to render uncomplicated… Many of the users or rather web hackers today, implement software applications such as Tor which allocates active communication facilities around a network as a result of which the sender or the information cannot be tracked....
2 Pages (500 words) Coursework

CyberSecuirty Threats

cybersecurity: What Everyone Needs to Know.... Among them is piggy backing.... In the physical environment, piggybacking is achieved when an intruder gains access by using the access of authorized personnel (Peter & Allan, 180).... When an individual arrives and opens an… In the computer world, this applies to terminals....
2 Pages (500 words) Essay

Environmental Scanning Strategy of AlienVault

The author of the paper "Environmental Scanning Strategy of AlienVault" will begin with the statement that when it comes to network and internet security, AlienVault has made a name for being one of the most trusted names in security industry.... hellip; This paper tells that started by founders who loved hacking and finding solutions around computer problems, AlienVault has emerged as one of the leading computer security firms that specialize in creating vital security solutions that are not only affordable but also effective in combating present and future threats....
16 Pages (4000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us