360 likes | 536 Views
Information Assurance. Awareness, Training and Education. Presented to University of Phoenix By: Francine C. Hammond 9/19/2014. Agenda and Background. IA Background Why IA? IA Mission and Strategied IA Capabilities IA Strategies Summary Summary. Background.
E N D
Information Assurance Awareness, Training and Education
Presented to University of Phoenix By: Francine C. Hammond 9/19/2014
Agenda and Background
IA Background • Why IA? • IA Mission and Strategied • IA Capabilities • IA Strategies • Summary • Summary
Background • In response to the terrorist attack against the Pentagon on September 11, 2001, the Department of Defense established the Pentagon Force Protection Agency (PFPA). • The new agency absorbed the Pentagon’s police force, formerly known as the Defense Protective Service (DPS) and its role of providing basic law enforcement and security for the Pentagon and DOD interests in the National Capitol Region (NCR). • PFPA expanded that mission to provide force protection against the full spectrum of potential threats through robust prevention, preparedness, detection, and response measures.
Why Information Assurance? • Publicity of attacks on information systems is increasing and Identity Thieves Prosper in Information Age. • Identity thieves assume the identities of other individuals and use these identities to obtain credit cards, loans and other things of value. • The old methods used to obtain information still apply: stealing credit card statements, bank checks, and other personal information from mailboxes. • However, the openness of the Internet has given identity thieves access to a wealth of personal information stored in the databases of online data brokers, who collect and sell personal information. • A secure information system provides three properties
Availability Confidentiality Integrity Information Assurance Awareness, Training , and Education
CIA • Confidentiality ensures that people who don't have the appropriate clearance, access level and "need to know" do not access the information. • Integrity ensures that information cannot be modified or destroyed. • Availability means that information services are there when you need them.
IA Mission and Strategies
Strengthen risk mitigation policies by successfully implementing sound Information Assurance and Information Technology practices to… • Protect the integrity, confidentiality, and availability of IT systems, ensuring that all personnel who use the IT systems are trained to understand their responsibilities, both individual position requirements and those concerning the security of systems. Mission
Risk Management Strategies
Risk Management Strategies • Manage and mitigate the risks of threats and vulnerabilities by implementing the following controls: • Policies and Regulations; • Certification and Accreditation (C&A); • Computer Incident Response Team (CIRT); and • IA Awareness Program.
Policies and Regulations
Implement policies, standards and procedures which are consistent with statutory, Federal, and DOD policies and procedures for securing information systems and networks that include the following controls: • Assign responsibility for security; • Maintain a security plan for all systems and major applications; • Provide for the review of security controls; and • Require authorization before processing.
Certification and Accreditation
Implement the DOD established standard process to identify, implement, and validate IA controls for: • Authorizing the operation of DOD information systems and; • Managing IA posture across DOD information systems consistent with the Federal Information Security Management Act (FISMA).
Computer Incident Response Team
CIRT security analysts provide support in: • Day-to-day intrusion detection operations • Remote vulnerability detection • On-line system survey • Information protection support • Tool design and integration • Technical support
IA Awareness Program
National Information Assurance Training and Education Center • “Literacy, Awareness, Training and EducationBecause there is no patch for ignorance”
Implement the IA Awareness Program by focusing on the following learning components: • Awareness • Focus attention on security • Training • Produce relevant and needed security skills and competency • Education • Integrate all (security skills and competencies) into a common body of knowledge, adding a multidisciplinary study of concepts, issues, and principles • Professional Development • Imply a guarantee as meeting a standard by applying evaluation or measurement criteria
IA Awareness Program Objectives • Enhance understanding of IA issues among all system users; • Encourage meaningful behavioral change; • Provide coherent accessible technical training; • Deliver flexible content for different audience groups; and… • Keep training current and relative.
IA Awareness Program Deliverables • Training Programs • General Awareness Training • Briefings, Distributed Security Tips, Newsletters • Technical Training • System Administrators, Help Desk personnel, Directors • Training Materials • Handbooks, Reference Guides, Presentations • IA Intraweb/Intranet • ‘One-stop shop’ portal for awareness training
IA Mission • Strengthen the risk mitigation policies and the PFPA defense-in-depth by successfully implementing sound Information Assurance (IA) and Information Technology (IT) practices. • Risk Management Strategies • Policies and Regulations • Certification and Accreditation • CIRT • IA Awareness Program
THANK YOU! Obrigado Gracias Danke Merci Domo Arrigato Kat Ouen Diloch Salamat Takk Cheers Nani Toda Mahalo Do Jeh M’goy Thoinks Moite