Balancing IT Security

Total Page:16

File Type:pdf, Size:1020Kb

Balancing IT Security National Aeronautics and Space Administration IT Talk July - September 2012 Volume 2 • Issue 3 SAFEGUARD YOUR DATA Balancing IT Security www.nasa.gov IT Talk July - September 2012 Volume 2 • Issue 3 IT Talk In this Issue Jul - Sep 2012 Volume 2 • Issue 3 Balancing IT Security Office of the CIO NASA Headquarters 300 E Street, SW 3 www.nasa.gov Message from Washington, D.C. 20546 the CIO Chief Information Officer Linda Y. Cureton OCIO Chief of Staff John Hopkins Editor and Publication Manager 4 ICAM Modernization Eldora Valentine Project Slated for Graphic and Web Design Michael Porterfield FY2013 IT Talk is an official publication of the Office of the Chief Information Officer of the National Aeronautics and Protecting and Space Administration, Headquarters, Safeguarding NASA Washington, D.C. It is published by the OCIO office for all NASA Information and employees and external audiences. 6 Information Systems For distribution questions or to suggest a story idea, email: [email protected] To read IT Talk online visit: Safeguarding Data nasa.gov/offices/ocio/ittalk 7 at NASA Centers For more info on the OCIO: v www.nasa.gov/ocio v insidenasa.nasa.gov/ocio (Internal NASA network only) v www.nasa.gov/open/ 12 I3P facebook.com/NASAcio twitter.com/NASAcio Updates Decommissioning Spacebook By Sarah Rigdon, OCIO-NASA Headquarters Think back three years. In mid-2009, Message from enterprise-scale social media services were not what they are today, yet the CIO many large organizations were already aware of social media’s low cost ability By Linda Cureton to address collaboration needs. Goddard Space Flight Center (GSFC) saw the potential for social media but did not see many third-party applications that met them. Social media could improve business processes, encourage collaboration and information sharing, and The Agency is responsible for maintaining the security of build their community of stakeholders and all of its systems and data to prevent malicious activity and partners. Projects most often fail because thwart any sabotage of important assets. Recently I had to of barriers to communication. Social testify on Capitol Hill regarding theft of an unencrypted NASA media provides a space to communicate notebook computer that resulted in the loss of sensitive in ways that teams otherwise would not data. An impact assessment determined that the loss of that be able to do. Also, NASA’s innovation data did not create an increased risk or vulnerability. It was stands to benefit from platforms that also concluded that the loss of the data contained on the facilitate the intersection of disciplines. laptop did not impact any NASA mission operations. Emma Antunes, Web Manager at GSFC, Each employee must do their part to protect data. If you were created the homegrown Spacebook social to lose your Government smartphone, iPad, or laptop, what network. It featured user profiles, group would go through your mind first? Someone now has access workspaces (wikis, file sharing, discussion to all my important data, my photos? My boss is going to be forums, groups), and social bookmarks. It really mad, and it’s going to cost a lot to replace? How about was especially useful for small teams that the realization that someone now has access to all your work needed to collaborate without emailing files and can do real damage that could harm NASA? larger groups. And it was all developed using existing contracts, IT resources, and staff. NASA takes the issue of IT security very seriously, and we have made significant progress to better protect the In the past three years, the pace at which NASA users have adopted Spacebook is Agency’s IT systems. In this issue we’ll explore how our inverse to the pace at which third-party NASA Centers are going the extra mile to safeguard data. companies have launched enterprise social —Linda networking products. Spacebook has provided valuable lessons in user adoption. The OCIO decommissioned Spacebook on June 1, 2012, and is archiving all user accounts and content. John Hopkins, OCIO Chief of Staff, sees the positive side. “Something that we often fail to do in government is…to not close [applications] when they cease to be viable,” he said. Emma Antunes agrees: “We need to be agile and not be wedded to any one thing.” In shutting down Spacebook, NASA uses the lessons learned to build better tools and make better use of existing resources. v NASA OCIO IT Talk July-September 2012 3 ICAM Modernization Project Slated for FY2013 By Kim Edmondson, MSFC NASA’s Oracle Sun Product Suite 5-year plan in order to reach will begin fiscal year 2013 with a consists of the Identity Manager, this requirement. The Sun targeted completion prior to the end Access Manager, and Sun One Product Suite replacement is of that fiscal year. Implementation will Directory. The suite currently one aspect of NASA’s plan. include installation and configuration provides all of NASA with Identity of the replacement architecture, Innovative technologies that Management and Account ҆ migration of system integrations, Exchange (IdMAX) workflows for reduce the total cost of ownership, and migration of business process Identity, Credential, and Access specifically operational costs. workflow and data. Ing said, “Center Management (ICAM), eAuthentication ҆ Cutting-edge technology for representatives will be required to for access of applications and the long-term infrastructure. participate in the project via design Launchpad for user profiles, and the reviews and user acceptance tests.” NASA Enterprise Directory (NED). ҆ Improved user experience. NASA’s future ICAM capabilities, End-User Experience be it operations and maintenance ICAM Modernization Project End users will have an improved or required enhancements, are The NASA Enterprise Application experience using a Web 2.0 user dependent on continued product Competency Center (NEACC) interface that allows pop-up screens support. NASA’s current premier provides the internal operational and for ease of use. “The look and feel support contract with Oracle for the enhancement services of the Sun will be different than today, and it will Sun Product Suite will end in 2014. Product Suite for NASA. The NEACC be more of a mobile solution with The ICAM Working Group, led jointly has been tasked by the ICAM Working an anytime, anywhere capability for by NASA’s Office of Protective Group to begin preparation activities some services. To get prepared for Services and Office of the Chief for the ICAM Modernization Project, this future change, end users need to Information Officer, has determined which is a high priority for the Agency. be attentive to communications that that it is time for the Sun Product Suite The NEACC’s Sharon Ing, ICAM the project should begin distributing to be replaced. The replacement suite Modernization Project Manager says early Spring 2013,” said Ing. will provide NASA with the following: “the project’s main objectives during Look for NEACC’s “About Us” on ҆ Alignment with the Federal ICAM the formulation phase will be to define https://bReady.nasa.gov in the Roadmap (M-04-04, M-05-24, NASA’s requirements and select months to come for more details on M-11-11). This alignment has a the Sun Product Suite replacement this new NASA project. For more 5-year window for compliance; product by the end of fiscal year information about ICAM services, NASA has developed an ICAM 2012.” The implementation phase check out https://icam.nasa.gov. v Examples of Sun Product Suite capabilities currently utilized at NASA. 4 www.nasa.gov Enabling NASA’s Mobile Workforce By Securing Application Data By Jane Maples and Kellie White, MSFC-CIMA Do you currently use a mobile ҆ Allows mobile devices device to access applications or outside of NASA locations Web sites? Have you ever stopped to access protected NASA to consider whether the information services and data. you are sending and accessing is ҆ Offers full whitelist and secure? What if you misplaced your blacklist filtering by user, phone for a period of time, or worse, device, application, application what if you lost it? Will unauthorized version, and Center. individuals be able to access those applications installed on your mobile ҆ Provides secure Web proxy device and initiate transactions on services for the CIMA mobile application *Web wrapper, your behalf? NASA’s Center for allowing wrapped Web sites to Internal Mobile Applications (CIMA) be accessed by mobile devices has worked to ensure the security outside of NASA locations. of data exchanged via any CIMA- provided mobile application. CIMA The Secure Mobile Access Point implemented by CIMA is effective relies upon Mobile Application responses. CIMA’s MAM solution is in securing the mobile application, Management (MAM), as opposed to looked upon as a viable approach but CIMA’s efforts don’t stop there. Mobile Device Management (MDM), for those agencies not requiring Currently, CIMA is working with to secure the mobile application. the mobile device to be locked Furthermore, an in-house-developed the ICAM team to further enhance the security of the installed mobile down for security concerns, such Secure Mobile Access Point (SMAP) as law enforcement agencies. and secure Identity, Credential, applications by implementing and Access Management (ICAM) an ICAM certificate–based In addition to CIMA’s proven services are leveraged for authentication for mobile devices. security approach, CIMA also authenticating and accessing all This additional security measure offers a vast array of mobile is expected to be deployed at CIMA mobile applications. This app consulting, development the end of the calendar year. multilayered security approach relies and hosting, and distribution upon Launchpad for authentication While other Federal agencies are services. CIMA’s catalog of mobile and an application-level personal struggling with the idea of Bring application services and products identification number (PIN) for Your Own Device (BYOD) and enable an organization to extend accessing CIMA-hosted mobile how to manage those devices, key enterprise information and applications.
Recommended publications
  • Selection of the Insight Landing Site M. Golombek1, D. Kipp1, N
    Manuscript Click here to download Manuscript InSight Landing Site Paper v9 Rev.docx Click here to view linked References Selection of the InSight Landing Site M. Golombek1, D. Kipp1, N. Warner1,2, I. J. Daubar1, R. Fergason3, R. Kirk3, R. Beyer4, A. Huertas1, S. Piqueux1, N. E. Putzig5, B. A. Campbell6, G. A. Morgan6, C. Charalambous7, W. T. Pike7, K. Gwinner8, F. Calef1, D. Kass1, M. Mischna1, J. Ashley1, C. Bloom1,9, N. Wigton1,10, T. Hare3, C. Schwartz1, H. Gengl1, L. Redmond1,11, M. Trautman1,12, J. Sweeney2, C. Grima11, I. B. Smith5, E. Sklyanskiy1, M. Lisano1, J. Benardino1, S. Smrekar1, P. Lognonné13, W. B. Banerdt1 1Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA 91109 2State University of New York at Geneseo, Department of Geological Sciences, 1 College Circle, Geneseo, NY 14454 3Astrogeology Science Center, U.S. Geological Survey, 2255 N. Gemini Dr., Flagstaff, AZ 86001 4Sagan Center at the SETI Institute and NASA Ames Research Center, Moffett Field, CA 94035 5Southwest Research Institute, Boulder, CO 80302; Now at Planetary Science Institute, Lakewood, CO 80401 6Smithsonian Institution, NASM CEPS, 6th at Independence SW, Washington, DC, 20560 7Department of Electrical and Electronic Engineering, Imperial College, South Kensington Campus, London 8German Aerospace Center (DLR), Institute of Planetary Research, 12489 Berlin, Germany 9Occidental College, Los Angeles, CA; Now at Central Washington University, Ellensburg, WA 98926 10Department of Earth and Planetary Sciences, University of Tennessee, Knoxville, TN 37996 11Institute for Geophysics, University of Texas, Austin, TX 78712 12MS GIS Program, University of Redlands, 1200 E. Colton Ave., Redlands, CA 92373-0999 13Institut Physique du Globe de Paris, Paris Cité, Université Paris Sorbonne, France Diderot Submitted to Space Science Reviews, Special InSight Issue v.
    [Show full text]
  • Nasa Advisory Council Human Exploration and Operations
    NASA ADVISORY COUNCIL HUMAN EXPLORATION AND OPERATIONS COMMITTEE NASA Headquarters Washington, DC January 13-14, 2021 MEETING REPORT _____________________________________________________________ N. Wayne Hale, Chair ____________________________________________________________ Bette Siegel, Executive Secretary Table of Contents Call to Order 3 Commercial Crew Program 5 Public Comments 8 Artemis Program 9 SMD Artemis CLPS Activities 11 Moon to Mars Update 12 Solar System and Beyond 12 HERMES Instrument Update Artemis III SDT Update Advancing Biological and Physical Sciences Through Lunar Exploration 14 SMD Mars Science Update 14 Artemis Accords 15 Planetary Protection Activities 15 Discussion/Findings and Recommendations 16 Appendix A- Attendees Appendix B- HEOC Membership Appendix C- Presentations Appendix D- Agenda Appendix E- Chat Transcript Prepared by Joan M. Zimmermann Zantech IT, Inc. 2 January 13, 2021 Call to order and welcome Dr. Bette Siegel, Executive Secretary of the Human Exploration and Operations Committee (HEOC), called the meeting to order, and provided details of the Federal Advisory Committee Act (FACA), which provides governance rules for the meeting. She introduced Mr. N. Wayne Hale, Chair of the HEOC. Mr. Hale noted to the public that this particular HEO meeting counts as the last meeting of 2020, and the next scheduled meeting in March/April will be the first meeting of 2021. Mr. Hale welcomed three new members, Ms. Lynn Cline, Mr. David Thompson, and Mr. Kwatsi Alibaruho. The present meeting is focused on an update on the HEO areas, and a joint meeting with the NASA Advisory Council (NAC) Science Committee. Mr. Hale asked if NAC Chair, General Lester Lyles, who was attending the meeting virtually, had any remarks to proffer.
    [Show full text]
  • NASA's Ames Research Center
    NASA’s Ames Research Center NASA’s center in Silicon Valley Ames Research Center, one of 10 NASA fi eld Ames provides NASA with advancements in: centers, is located in California’s Silicon Valley. For more than 70 years, Ames has been a leader in Entry systems: Safely delivering spacecraft to conducting world-class research and development. Earth and other celestial bodies. Location: California’s Silicon Valley, 40 miles Supercomputing: Enabling NASA’s advanced south of San Francisco; 12 miles north of San modeling and simulation. Jose, between Mountain View and Sunnyvale Next generation air transportation: Transforming Jobs: Approximately 2,500 on-site employees and the way we fl y. contractors Airborne science: Examining our own world and Economic impact: $1.3B annually for the U.S.; beyond from the sky. $932M for California and $877M for Bay Area, creating more than 8,400 jobs in the U.S. with Low-cost missions: Enabling high value science 5,900 in California (2010 Economic Benefi ts to low Earth orbit and the moon. Study). Biology and astrobiology: Understanding life on Established: Dec. 20, 1939 as part of the National Earth -- and in space. Advisory Committee for Aeronautics (NACA); became part of the National Aeronautics and Exoplanets: Finding worlds beyond our own. Space Administration (NASA) in 1958. Autonomy and robotics: Complementing Missions: Ames-related missions scheduled for humans in space. launch in 2013 include LADEE, PhoneSat, EDSN, EcAMSat, SporeSat and IRIS. Ames will launch Lunar science: Rediscovering our moon. several space biosciences payloads this year. The center is lead for the Mars Curiosity rover’s Human factors: Advancing human-technology Chemistry and Mineralogy (CheMin) instrument interaction for NASA missions.
    [Show full text]
  • Lori Garver, NASA Deputy Administrator SOFIA Joining Forces Event Joint Base Andrews September 22, 2011
    Lori Garver, NASA Deputy Administrator SOFIA Joining Forces Event Joint Base Andrews September 22, 2011 Good afternoon. My name is Lori Garver, Deputy Administrator at NASA. I want to thank our German Aerospace Center partners and Joint Base Andrews for organizing this event and especially for making it possible for students and the children of military families to see this unique flying observatory up close. And let me just take a moment to commend First Lady Michelle Obama and Jill Biden for devoting their time and energy in encouraging all Americans to do more in support of the wives, husbands, sons, daughters and other family members of our men and women in uniform who are defending our freedom around the world. 1 I want to also welcome any and all Members of Congress who are here today. And a special hello to Mary Blessing, an astronomy teacher at Herndon High School -- one of only six American teachers selected to work with scientists aboard SOFIA and to share that experience with their students. I know you are all eager to tour this magnificent aircraft, so I am only going to speak briefly then turn it over to my colleagues, Paul Hertz, NASA’s Chief Scientist in our Science Mission Directorate; and Leland Melvin, our Associate Administrator for Education and a former astronaut. Paul and Leland will speak more about the amazing scientific and educational value of SOFIA, but let me just tell you that this project is a key component of NASA’s science objectives. 2 It will help us zoom in close on some of the most fundamental questions of the universe: Where did we come from? How was our solar system formed? And what else is out there? It is fitting that SOFIA means “wisdom” in Greek.
    [Show full text]
  • PSAD-81-2 Support Service Contracting at Johnson Space
    BY THEU.S. GENERAL ACCOUNTli’JG OFFICE Report To The Administrator, National Aeronautics And Space Administration S@pportService Contracting At Johnson Space Center Needs Strengthening T National Aeronautics and S ace Administration Sl about $175 million annual Py on support service Cl at Johnson Space Center. GAO tested the way si of these contracts are administered and found --a contractor was working without approved llllllllllllllll113606 work orders, --Government-furnished equipment was unac- counted for, --questionable reimbursements occurred for con- tractor costs, I --contract funds increased before the need was justified, I --contracting officers were unaware of their re- sponsibilitres and unfamiliar with contract terms, and I --some contracting officers had a general attitude that small dollar value contracts are not worthy of adequate attention. I ‘/A0 believes overreliance on cost-type contracts which quire greater administration efforts than fixed-price )ntracts contributes to these contracting weaknesses recommends that the National Aeronautics and ace Administration take corrective actions. mp81s2 OCTOBER 21,1900 + Request for copies of GAO reports should be sent to: U.S. General Accounting Office Document Handling and Information Services Facility P.O. Box 6015 Gaithersburg, Md. 20760 Telephone (202) 275-6241 The first five copies of individual reports are free of charge. Additional copies of bound audit reports are $3.25 each. Additional copies of unbound report (i.e., letter reports) and most other publications are $1.00 each. There will be a 25% discount on all orders for 100 or more copies mailed to a single address. Sales orders must be prepaid on a cash, check, or money order basis.
    [Show full text]
  • Information Assurance Challenges­ a Summary of Audit Results Reported December 1, 1998, Through March 31, 2000
    ' FOR O:PPICtA-L USE ONLY ort INFORMATION ASSURANCE CHALLENGES­ A SUMMARY OF AUDIT RESULTS REPORTED DECEMBER 1, 1998, THROUGH MARCH 31, 2000 Report No. D-2000-124 May 15, 2000 Office of the Inspector General Department of Defense P0R: 0!FFICW..1:JSE 0Nb¥ I I . \ I \ I I I I I I I I I INSPECTOR GENERAL DEPARTMENT OF DEFENSE 400 ARMY NAVY OFllVE AFIUNGTON, VIRGINIA 22202-2884 May 15, 2000 MEMORANDUM FOR ASSISTANT SECRETARY OF DEFENSE (COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE) SUBJECT: Audit Report on Information Assurance Challenges-A Summary of Audit Results Reported December 1, 1998, through March 31, 2000 (Report No. D-2000-124) This summary report is provided for your information and use. This report contains no recommendations, no written comments were required, and none were received. (b) (6) (b) (6) (b) (6) (b) (6) (b) (6) (b) (6) (b) (6) (b) (6) 14k!J~ Robert J. Lieberman Assistant Inspector General for Auditing Office of the Inspector GeneraJ, DoD Report No. D-2000-124 May 15, 2000 {Project No. OAs-6104.01) Information Assurance Challenges-A Summary of Audit Results Reported December 1, 1998, through March 31, 2000 Executive Summary Introduction. Information assurance is emerging as a critical component of DoD operational readiness. When effective, information assurance enables the systems and networks composing the Defense information infrastructure to provide protected, continuous, and dependable service in support of both warfighting and business missions. On December 30, 1999, the Deputy Secretary of Defense issued a memorandum, "Department of Defense Information Assurance Vulnerability Alert,~ which stated that information assurance is an essential element of operational readiness and can no longer be relegated to a secondary concern.
    [Show full text]
  • 2019 Cybersecurity Resource And
    The purpose of this document is to provide an overview of useful, readily available references to support Security Cooperation across the U.S. government, commercial sector, and U.S. allies and partners. Within this document, readers will find information regarding cybersecurity norms, best practices, policies, and standards written and adopted by the U.S. federal government, the U.S. Department of Defense, and recognized institutional standards. Table of Contents Purpose ..................................................................................................................................... 3 Disclaimers ................................................................................................................................ 3 Introduction .............................................................................................................................. 4 Quick Guide ............................................................................................................................... 4 Developing a Cybersecurity Strategy and Supporting Policies ..................................................... 5 United States Resources ............................................................................................................................ 6 International Resources .............................................................................................................................. 9 Other Sources ..........................................................................................................................................
    [Show full text]
  • Examples of Information Assurance and Security
    Examples Of Information Assurance And Security Needed and plush Dunstan yodels her stowaways curveting vapidly or propagandised here, is Connolly delirious? Is Jean-Marc always inheringpeart and connectively sainted when and kowtow underlined some her Budapest dischargers. very quincuncially and atoningly? Solly often interchange livelily when octave Nev This book will design packages must start with collection of information assurance and security Information security assurance for executives Internet. It provides an assurance that your system and like can be accessed by. Security & Privacy part of the VPIT-CIO University of. Report the regulating body in the only be forwarded to preserve the authorization of this advanced data before sending proprietary or oversees maintaining of information assurance security and business tools enable management in. Information assurance encompasses a broader scope than information. Both by data must successfully complete responsibilities, it is manifested in attempts were to. Cyber Security vs Information Assurance What'sthe Difference. Learn for this insider interview with Information Assurance Analyst Steve Moulden. This locate an overthrow of the principle of confidentiality. Understanding the information security basics of confidentially integrity and. 25 INFORMATION ASSURANCE PROGRAM ACTIVITIES 26 IAP TIMELINES 26 EXPECTED DELIVERABLES 26 SECURITY PRIVACY TESTING PLAN. Cybersecurity isn't the same contract as information assurance. Whereas a better understand and technology services and desperation that decision has to determine and implement new dilemmas knocking at work from a combination locks or derogatory remarks in. Sample Detailed Security Policy Bowie State University. For song the enormous amounts of proprietary information at Wal-Mart. Blockchain cybersecurity represents the assurance of information and security control in order; the introduction of cyber security.
    [Show full text]
  • Cyber Security Courses
    CNG 131 – Principles of Information Assurance Provides students with the skills and knowledge required to survey key issues associated with protecting information assets, determine the levels of protection and response to security incidents, and design a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. Students will learn to inspect and protect your experience you, detect and react to threats to information assets, and examine pre- and post-incident procedures, and technical and managerial responses. Students will learn about information security planning and staffing functions. CNG 132 – Network Security Fundamentals Delivers a comprehensive overview of network security, including general security concepts. Communication Security is studied, including remote access, e-mail, the Web, directory and file transfer, and wireless data. Common network attacks are introduced. Cryptography basics are incorporated, and operational/organizational security is discussed as it relates to physical security, disaster recovery, and business continuity. Computer forensics is introduced. CNG 133 – Fire Walls/Network Security Teaches students the basics of network firewall security. It covers basic installation techniques, discusses how to make an intelligent choice of firewall technology, and presents basic firewall troubleshooting. CNG 136 – Guide to IT Disaster Recovery Presents methods to identify technology and communication infrastructure vulnerabilities and appropriate countermeasures to prevent and mitigate failure risks for an organization. The course will take an enterprise-wide approach to developing a disaster recovery plan. CNG 257 – Network Defense and Counter Measures Examines the tools, techniques and technologies used in the technical securing of information assets. This course provides in-depth information of the software and hardware components of Information Security and Assurance.
    [Show full text]
  • Photo Release -- Commercial Space Industry Works with NASA and Creates Tech Jobs in Silicon Valley
    Photo Release -- Commercial Space Industry Works With NASA and Creates Tech Jobs in Silicon Valley NASA Deputy Administrator Lori Garver Looks to Commercial Space Industry to Support Agency Objectives, Visits Space Systems/Loral in Palo Alto, Calif. PALO ALTO, Calif., Aug. 1, 2011 (GLOBE NEWSWIRE) -- Space Systems/Loral (SS/L) today announced that Lori Garver, Deputy Administrator of NASA, and John Celli, President of Space Systems/Loral, met on July 29 to discuss commercial space industry capabilities and continuing job creation. Ms. Garver toured SS/L's state-of-the-art manufacturing facility in Palo Alto, Calif., where satellites for direct-to-home television (DTH), consumer broadband, and satellite radio are regularly designed, built and launched into space in two to three years from start to finish. A photo accompanying this release is available at http://www.globenewswire.com/newsroom/prs/?pkgid=10073 NASA continues to partner with companies such as Space Systems/Loral to help strengthen U.S. leadership in space while at the same time stimulating job growth in careers related to science, technology, engineering and math (STEM). Space Systems/Loral, the world's leading provider of commercial satellites, is currently working with NASA Ames to provide the propulsion system for the Lunar Atmosphere Dust Environment Explorer (LADEE) spacecraft. The propulsion system is based on a space-proven SS/L design that has been reconfigured to take a small spacecraft to the moon. When launched, NASA's LADEE spacecraft will study the moon's thin atmosphere and dust above the lunar surface. The propulsion system and structure that is being built by SS/L is a variant of the mission critical system Pete Worden, NASA Ames Center Director; Lori used over many years on SS/L's geostationary satellites.
    [Show full text]
  • Information Assurance 101
    BUILT FOR SECURITY Information Assurance 101 Barbara Wert, Regulatory Compliance Specialist FoxGuard Solutions, Inc. “The value of an organization lies within its information – its security is critical for business operations, as well as retaining credibility and earning the trust of clients.” – Margaret Rouse, TechTarget Barbara Wert Regulatory Compliance Specialist September 2017 FoxGuard Solutions, Inc. Executive Summary What is Information Assurance, and why should we care? Headlines over the past 24 months have cited security breaches in Anthem, the Philippines’ Commission on Elections (COMELEC), Wendy’s, LinkedIn, the Red Cross, Cisco, Yahoo, financial institutions around the world, and even the U.S. Department of Justice. As well, statistics show that 43% of cyberattacks target small businesses. Earlier this year, a high school server system in Illinois was infiltrated and the perpetrator attempted to extort the district for $37,000 in order to restore their access to the information on the servers. (1) Information Assurance programs provide a comprehensive approach to addressing the urgent need to protect sensitive data and the systems that house the information for organizations of any size and industry. This white paper will: • Look at some key definitions in the scope of information assurance • Discuss the basic factors of information assurance found in the CIA Triad • Consider the role of risk management in an information assurance program • Explore framework options Contents Executive Summary ......................................................................................................................................
    [Show full text]
  • Cubex: a Compact X-Ray Telescope Enables Both X-Ray Fluorescence Imaging Spectroscopy and Pulsar Timing Based Navigation
    SSC18-V-05 CubeX: A compact X-Ray Telescope Enables both X-Ray Fluorescence Imaging Spectroscopy and Pulsar Timing Based Navigation Jan Stupl, Monica Ebert, David Mauro SGT / NASA Ames NASA Ames Research Center, Moffett Field, CA; 650-604-4032 [email protected] JaeSub Hong Harvard University Cambridge, MA Suzanne Romaine, Almus Kenter, Janet Evans, Ralph Kraft Smithsonian Astrophysical Observatory Cambridge, MA Larry Nittler Carnegie Institution of Washington Washington, DC Ian Crawford Birkbeck College London, UK David Kring Lunar and Planetary Institute Houston, TX Noah Petro, Keith. Gendreau, Jason Mitchell, Luke Winternitz NASA Goddard Space Flight Center Greenbelt, MD Rebecca. Masterson, Gregory Prigozhin Massachusetts Institute of Technology Cambridge, MA Brittany Wickizer NASA Ames Research Center Moffett Field, CA Kellen Bonner, Ashley Clark, Arwen Dave, Andres Dono-Perez, Ali Kashani, Daniel Larrabee, Samuel Montez, Karolyn Ronzano, Tim Snyder MEI / NASA Ames Research Center Joel Mueting, Laura Plice Metis / NASA Ames Research Center NASA Ames Research Center, Moffett Field, CA Yueh-Liang Shen, Duy Nguyen Booz Allen Hamilton / NASA Ames NASA Ames Research Center, Moffett Field, CA Stupl 1 32nd Annual AIAA/USU Conference on Small Satellites ABSTRACT This paper describes the miniaturized X-ray telescope payload, CubeX, in the context of a lunar mission. The first part describes the payload in detail, the second part summarizes a small satellite mission concept that utilizes its compact form factor and performance. This instrument can be used for both X-ray fluorescence (XRF) imaging spectroscopy and X-ray pulsar timing-based navigation (XNAV). It combines high angular resolution (<1 arcminutes) Miniature Wolter-I X-ray optics (MiXO) with a common focal plane consisting of high spectral resolution (<150 eV at 1 keV) CMOS X-ray sensors and a high timing resolution (< 1 µsec) SDD X-ray sensor.
    [Show full text]