The potential of providing information or sharing information with agencies or personnel without proper authorization can be detrimental to the mission and the personnel involved. Working in a Joint/Combined nature of the Contemporary Operational Environment (COE) leads to numerous considerations of security when it comes to information sharing and intelligence productions. COE is the combination or current and near term operational environment variables with capabilities. It is based on the composite of potential adversaries in order to create a wide array of conditions necessary for full spectrum training and leader development. Sea, land, air, and space make up the COE in both the physical and technological aspect (Headquarters Department of the Army, 2010).
Data Analytics has significantly grown in less than two years, this quick growth has caused the company to evaluate the IT environment and its ability to support the growth and secure the data of the company. The CEO is expecting the company to grow 60% over the next two years; with the success of the company it has been determined that a change to the current IT environment and infrastructure must occur to better support the employees and the customer base.
Provide briefing for advance threat analysis (i.e., advanced persistent threats, underground hacktivism, and federal agency information). Business minded threat analysis and proactive mitigation is a critical success factor.
We here at Dunder Mifflin Tech have been offering security services for clients of various sizes for the past 13 years. We have been focused on finding opportunities with government agencies and mid-sized organizations to address security-related issues and help them operate in a more secure manner. We started in 2002 with just 4 individuals and have been ever growing for the last 13 years. In the last 13 years we have grown to a team of 22 full time employees. We are currently pulling in 1.6 million (US dollars) annually in gross sales.
Networks of computers are the model for business information infrastructures today. Gone are the days of a single mainframe machine with terminals attached to it. Today, a business' information infrastructure consists of one or more servers that communicate with tens, hundreds, and even thousands of clients, and the explosive growth of networks drives an increasing demand for network administrators. Exceptional growth in IT jobs, including network and system administration, is widely expected to continue for the foreseeable future. Reports from the Commerce Department cite a shortage of high tech workers. The White House has recently created training programs to address the shortage. While some organizations and researchers dispute the extent of a shortage, it is widely agreed even by critics of such studies that new IT jobs are being created very rapidly. As information technology becomes ubiquitous, and even very small companies rely on it for their daily operation, the skills of system and network administration become more in demand, and more vital. More and more IS majors may find their future job responsibilities including some system administration duties, even if they are not hired strictly in that role.
Lockheed Martin is an organization that heavily relies on its defense contracts in order to generate revenue. In 2005, 95% of Lockheed Martin’s revenue came from the US Department of Defense, other US Federal government agencies and foreign military customers (Defense News, 2007). Lockheed Martin earns this revenue by winning government contracts. As previously noted, Lockheed Martin has a large customer base with the US Department of Defense. The company is the largest provider of IT services, systems integration, and training to the government (Lockheed Martin, 2008). Other customers that provide revenue for Lockheed Martin are international governments and some commercial sales of products and services (Lockheed Martin, 2008).
An ISMS is a framework of policies and procedures that includes all legal, physical and technical controls involved in an organization’s information risk management processes (Rouse, 2009). ISO 27001 fits into the DSO, as well as any other organization, because it uses a “top down, risk-based approach” and is technology-neutral. ISO 27001 defines a six-part planning process; defining a security policy, defining the scope of the ISMS, conducting a risk assessment, manage identified risks, select control objectives and controls to be implemented, and prepare a statement of applicability. ISO 27001 especially fits the DSO because they are a denomination of the Department of Defense (DOD) which is the poster child for security. The first part of the six-part planning process is “defining a security policy. “The Department of Defense Architecture Framework (DoDAF), Version 2.0 is the overarching, comprehensive framework and conceptual model enabling the development of architectures to facilitate the ability of Department of Defense (DoD) managers at all levels to make key decisions more effectively through organized information sharing across
White House (2000). Defending america’s cyberspace: National plan for information systems protection: Version 1.0: An invitation to dialogue. The White House, Washington, DC: author. Retrieved from https://www.fas.org/irp/offdocs/pdd/CIP-plan.pdf
During the last ten years information technology has experienced unprecedented levels of change, this technology is not only influencing the way in which we conduct business, it is changing the way in which we conduct our lives. We are a business-centered society.
The goals and architectures developed at the Air Staff tend to include the wide spectrum of IT capabilities from war fighting to home base business operations. The processes in place at MAJCOM and below are typically concerned with business operations with little emphasis on warfighting operations. Funding decisions ultimately drive which projects get pursued. With a clean sheet of paper, how could funding processes be designed to facilitate stronger governing practices?
Two challenges that defense contractors face, in developing and providing innovative new technologies to the military, are long term sustainability in the face of rapid technological development and the U.S. military’s material acquisition process. A defense contractor’s inability to reconcile these two challenges could put the U.S. military at risk of being constantly behind the technological curve, thus weakening its ability to compete with other technologically advanced countries.
The evolution of Information Technology acted like a thrust in boosting the business. Many organizations invested lot of money to build IT infrastructure and analysis also indicates a rise in the percentage of amount that companies are investing in IT. IT acts as a bridge between companies and the customer’s and also brings together all the branches of an organization. The way IT is viewed has change over the time, earlier executives of an organization believed that computers, typewriters etc are meant for the lower level staff; but the trend has changed completely, managers of an organization emphasize about the value of using information technology to gain an edge over their competitors and are supporting the idea of digitizing business models. Many companies started hiring chief information officers and some of them are relying on strategy consulting firms. IT is viewed as a resource which has the potential to influence the economy.
Interagency Operations Security Support Staff (U.S.), & Booz, Allen & Hamilton. (1996). Intelligence threat handbook. Greenbelt, Md.: Interagency OPSEC Support Staff.
There are many types of technological developments in the military happening at all times. They range from new aircraft to sophisticated guidance systems. Teams of specialists work for years to develop some of our simplest equipment. These people’s everyday lives are devoted to the safety and protection of the citizens of the U.S.