DoD-approved policies and standards for your IT infrastructure - 1200 words

Anonymous
timer Asked: Oct 20th, 2018
account_balance_wallet $9.99

Question Description

develop the proper DoD security policies required to meet DoD standards for delivery of technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency.

  • Select a team leader for your project group.
  • Create policies that are DoD compliant for the organization’s IT infrastructure.
  • Develop a list of compliance laws required for DoD contracts.

Tutor Answer

Matubi
School: Cornell University

Hey buddy! Here is the final copy for reviews😊
Attached.

Running Head: DoD-approved policies and standards for IT infrastructure

DoD-approved policies and standards for IT infrastructure

Name
Institution
Instructor
Date of Submission

1

Running Head: DoD-approved policies and standards for IT infrastructure

2

The Department of Defense of the United States has come together with the Joint
Information Environment in order to provide unprecedented need that would enable them to
share information and standardization. With all this services, the Air Force sector of the United
States have realized the importance of Information Technology. It purpose is to consolidate all
data centers by adopting technologies that would enable them to improve efficiency as well as to
lower down the cost of operation. Moreover, the adoption of the Information Technology will
help the Department of Defense standardize their systems.
There are various Department of Defense security policies that are required in order to
meet the standards for the delivery of technology services (John. D, 2014). First, there are
cyberspace and some knowledge operations that aid enhancing the security of the Information
Sector. This works by providing controls and commands awareness on security matters. This will
enable detection of issues that need to the sorted out by the security department hence providing
a safe environment to work on. The cyberspace operations also offer support by bringing
together data that is structured and unstructured from various IT sensors around the state. This
will enhance such kind of data to be stored and analyzed hence ensured if they are safe and
promote smooth working of the security department.
Another security policy required was to avail a description that entailed the logical access
and practices that were to be used by the covered agency so as to enable them to recover the
system of the department. This policy also included that the standards were supposed to be
looked at in details in order to ensure that they are appropriate and were followed accordingly
(John. D, 2014).
Furthermore, the report that has the security policy had to include a description and a list
of all the logical access controls. The description however, had to add the multifactor

Running Head: DoD-approved policies and standards for IT infrastructure

3

authentication that would be used by the agency foe recovering data and also access various
systems for those users that are privileged to use the system (Odell. L, 2015). Nevertheless, there
is another policy that describe that if the logical access control is not used by the covered agency,
a detail description of the reasons that may have led to not using the access controls had to be put
down so as to enable the department to counter check various areas that need to be improved in
their department.
There are various information practices that regards to the security management that are
put in place by the covered agency that ensures the security and proper running of various
activities. This practices are meant particularly for the covered systems to ensure proper
coordination of activities. This include the policies and procedures to be followed so as to ensure
that all services work smoothly and in accordance to the law.
Department of Defense has moreover put in place capabilities that would be used to
monitor and detect threats. The main aim of this policy was to monitor any unauthorized transfer
entailing data from a computer. The department had to use firewalls to act as a...

flag Report DMCA
Review

Anonymous
Tutor went the extra mile to help me with this essay. Citations were a bit shaky but I appreciated how well he handled APA styles and how ok he was to change them even though I didnt specify. Got a B+ which is believable and acceptable.

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors