Computer Network Defense (CND) and Intelligence Community – A greater security

[ad_1]

There are three industries Federal government are deeply Computer Network Defense and the intelligence community adds additional security because classified nature of community activities.

Therefore, contractors that provide Computer Network Defense (CND) services are held to even higher standards than the usual high requirements of vendors for Cyber ​​Security projects.

The concept of network defense features an extensive menu of services that provide infrastructure against cyber attacks from domestic and foreign sources. . While each agency has specific Cyber ​​Security needs and protection of classified information and information, general roadmap can be developed and used as a template for individual users

general objectives

General contractors that perform computer Defense Services are tasked to meet four objectives.

· Recommend architecture, software and hardware

· Implementation of the government approved solution

· Performing operations and maintenance of the CND program

· insuring the safety requirements for classified material are met (a higher safety requirement)

The contractor is also required to make regular formal reports and / or briefings detailing the position and performance of the various CND functional. area

Specific CND duties include, but are not limited to:

distribution

Deployment requires the contractor to develop all hardware and software required to state of the art Cyber ​​Security Defensive network that will improve defenses, ensure that the systems operate properly and monitor the day-to-day. It is important that all deployment effort coordinates with the agency security office to ensure the protection of classified information is not compromised. Deployment usually includes:

· Deploy, maintain, and monitor and tighten the perimeter defense organization on all classified and unclassified networks

· Deploy, operate, maintain, monitor and harden agency intrusion detection capability on all classified and unclassified networks

· Operating income, maintain, monitor and tighten the Domain Name Servers organization (DNS) on all classified and unclassified networks

Manage and support

Additional support is often needs in the form of identification of new products / technologies that enhance network security. Since Cyber ​​Security is in rapid development phase, new products and technologies are constantly emerging. Some of this technology is good and some not helpful. Eligible decisions need to select the best suitable technology

Examples of further assistance includes :.

· Work closely with engineering and installation activities and configuration management CND devices on the network organization

· Performing software and hardware vulnerability scanning on all classified and unclassified networks and systems

· Managing and monitoring the enterprise anti-virus program

· Provide assistance and guidance in the development of safety systems and network plans

· Managing and monitoring systems and network audit log reviews for all networks and systems

Testing and Reporting

Continuous testing of the system is the best way to identify and prevent future cyber attacks regularly. Based on tests, decisions can be made to improve the performance of the Cyber ​​Security network. Included in this process are the following steps:

· Identifying anomalous activity audit log immediately to the government manager

· Performing network and system security compliance testing

· Reporting noncompliance with system and network security plans immediately to the government manager

· Implementation of software, hardware and settings Vulnerability scanning of all agency systems and networks

· Work closely with the security office of the Agency in the development, implementation and management of security program of the Agency

· Director, and monitor removable media access control program on all agency systems and networks

Compliance and necessary support

The critical nature of Computer Network Defense means that standards and regulations shall meet and satisfy the need to ensure the success of the project. This includes:

· Support for Information Assurance Vulnerability Alert (IAVA) and information Condition applications; develop and maintain information systems security officer professional development organization

· Reviewing updated developments on all the relevant rules to ensure that the network is in line

· Providing as needed incident response support, hacker attacks, cyber-terrorism attacks, viruses, worms, Trojan horse and other incidents of malicious code

· Develop, install, manage and maintain the PKI infrastructure on all agency networks and systems

and technical representation

In order to establish a plan to future users can comply with and benefit from, complete and accurate documentation is required. In addition, according to the Intelligence Community Standard Operating Requirements, particularly as regards the security of classified information is necessary. This process includes:

· Documentation practices, policies, standards, training, procedures and configuration management processes

· Representatives of agency meetings, conferences and seminars as directed by the Government

· Responding to agency, DoD requirements, and Intelligence Community as directed by the Government

· Providing further technical assistance other factors / clients of Mission Assurance as required

Bring viable and compliant Computer Network Defense is a major undertaking and requires skill and effort. This is particularly true when dealing with institutions Intelligence Community and deal with classified information. This requires experience professional engineers with the requisite security clearance in addition to CND required certifications.

[ad_2]