Friday, June 21, 2019

CyberSecurity Profile on the CIA Essay Example | Topics and Well Written Essays - 500 words

CyberSecurity Profile on the CIA - Essay ExampleG-1 G-2, F-51 National Archives and Records Administration, 2000 profound apprehension Agency, 2012).The available selective information suggests that the CIA strictly categorizes data and information systems in accordance with the laws, directives and guidelines attendant to the critical nature of the work of the CIA and the confidential nature of such data and systems. The data suggests formal documentation, as evident from the rigor of the categorization, though formal documentation is not available from the sources. The assumption is that categorization approval is embedded in the CIA policies and procedures, and emanates from the very top of the organization (National Institute of Standards and Technology, 2010, pp. G-1 G-2. F-226 Clift, 2007 Clift, 2007 Thibodeau, 2009).The CIA does appoint a senior information security officer to take charge of information security class coordination, development, implementation and maintena nce across the whole organization, in the person of the Chief Information Officer or CIO. The CIO is empowered with the appropriate mandate, coming from the US electric chair and the organization, as well as with the appropriate resources for the purpose (National Institute of Standards and Technology, 2010, pp. G-1 G-2 ,F-207, Office of the Director of National Intelligence, 2012).From the available literature, and from the example of its evolving cloud architecture, the functional architecture exists with the corresponding external interfaces, the appropriate security clearances and levels, information storage and transmission compliant with the laws, and level of priority for restoration of the information and related services (National Institute of Standards and Technology, 2010, pp. G-1 G-2, F-201 Clift, 2007 Central Intelligence Agency, 2012 Thibodeau, 2009).There are appropriate screening procedures prior to access

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.