preview

Analysis Of Dod Contracts

Decent Essays

United Technologies Corporation recently won a large DoD contract, which will add
30% to the revenue of your organization. The computing environment has 12 servers running Microsoft Server 2012 R2, 2 Linux servers running Apache Server to host your Web site and 390 PCs/laptops running Microsoft Windows 7 or Windows
8, Microsoft Office 2013, Microsoft Visio, Microsoft Project, and Adobe Reader.
Department of Defense (DoD) is a federal agency which deals with the national security and military. The security policies that are set up should be followed by not only DoD but also the organization who work with and contractual services provided to them. The information shared is naturally highly sensitive, so we should implement proper …show more content…

By having the right filters and anti-spoofing (It stops the packets coming from non-IP broadcasts) will prevent these attacks. Controlling and monitoring the filter configurations, updating the filters and configuring the anti-virus software’s will help.
v)Improve business processes by identifying and eliminating low-value- or no-value-added processes and by technology insertion and Critical information relating to the security of military operations, such as information that would assist adversaries in learning about the military’s intentions, activities and capabilities (for example, information about equipment transport by private carriers) should be handled with utmost importance and detailed security. vi)Access to the users (e.g employees in the DoD) should be provided based on their roles and all anti-malware software’s and patches should be up to date and should available to the staff immediately. vii) Any other information, marked or otherwise identified in a contract as subject to safeguarding or dissemination limitation required by law, regulation, or government policy, including proprietary business information and technical information such as specifications should be protected as per compliance with Federal Information Security Modernization Act(FISMA) and National Institute of Standards and Technology(NIST) standards. viii) All the data centers should be modernized

Get Access