...controls consist of the procedures that are implemented to define the roles, responsibilities, policies and various administrative functions that are required to manage the control environment as well as necessary to oversee and manage the confidentiality, integrity and availability of the organizations information assets. Administrative controls can range from very specific to very broad and can vary depending on the organizational needs, particular industry, and legal implications. Administrative controls can generally be broken down into six major categories which include operational policies and procedures, personnel security, evaluation, and clearances, security policies, monitoring, user management, and privilege management. Ultimately, the senior management within an organization must decide what role security will play within the organization and define the security goals and directives. Due care by definition is the care that an ordinary and reasonable person would take over their own property or information. An example of this would for a person to place documents that contain sensitive information such as social security cards, passports, etc. in a locked safe within their home. This measure is taken to ensure that only those individuals with authorized access can obtain those documents and view the sensitive information. Due care is a legal concept that is used to assist in determining the level of liability in a court of law. If it is determined that due care was taken...
Words: 1204 - Pages: 5
...Week 1: Lecture 1: Information * Information * Information is things that are or can be known about a topic. It is also known as communicable knowledge, which is something you can impart to someone else. It is an unambiguous abstraction of data. Now in the digital sense, the smallest unit of information is a single bit; is the bit on or is the bit off? Now if we go back to the days of landline telephone service, you would call information which would give you a phone number for a subscriber if you describe enough detail who the describer might be. The difference between data and information is that information is knowledge that you get or abstract through processing of data. What I do with those 1’s and 0’s, and how I would apply application software to it, transitions data and turns it into knowledge. * The other thing about information is that information depends on the context around it. For example, lets take numbers….10 digits, well 10 digits by themselves can just be 10 digits, but if I put a semicolon in between them (:), it can now be assumed that it is a time or a duration or a track record. Now if I would put a $ in front of those numbers, it could be the price of something or the amount of money in my wallet. Now if I add another meaning to those numbers lets say, I make the first 3 digits an area or a region assignment, the next 2 digits a group and the last 4 a serial number….I will then have the coding for a social security number. Now they...
Words: 1168 - Pages: 5
...ensures that only those with the rights and privileges to access information are able to do so. When unauthorized individuals or systems can view information, confidentiality is breached.” (http://arapaho.nsuok.edu/~hutchisd/IS_4853/C6572_01.pdf) “In an organization, the value of confidentiality of information is especially high when it involves personal information about employees, customers, or patients. Individuals who deal with an organization expect that their personal information will remain confidential, whether the organization is a federal agency, such as the Internal Revenue Service, or a business.” ((http://arapaho.nsuok.edu/~hutchisd/IS_4853/C6572_01.pdf.) This is a concept true in the Army there are two different levels of security clearances for everyone. There is the secret and the top secret each requires a vigorous investigation into a person’s past to make sure they should have the level of clearance they are requesting. If a person doesn’t have at least a secret clearance they are not allowed to access the SIPRnet, which is the Secret Internet Protocol Router Network. This network protocol holds all of the units secure data and can only be accessed by personnel with the proper clearance. Integrity “Information has integrity when it is whole, complete, and uncorrupted.” (http://arapaho.nsuok.edu/~hutchisd/IS_4853/C6572_01.pdf.) “The integrity of information is threatened when the information is exposed to corruption, damage, destruction, or other disruption...
Words: 889 - Pages: 4
...ACCESS AUTHORIZATIONS ..................................................................................................3 SECURITY EDUCATION.........................................................................................................4 CONSULTANTS ......................................................................................................................5 STANDARD PRACTICE PROCEDURES (SPP) .....................................................................5 SUBCONTRACTING ...............................................................................................................5 VISIT CONTROL .....................................................................................................................6 CLASSIFIED MEETINGS ........................................................................................................6 CLASSIFICATION...
Words: 10033 - Pages: 41
...is being honest, reporting the lack of security for classified documents, and dishonesty within my section. 2. Employ applicable laws and regulations. Each unit has s Standard Operation Procedure. I would need to find out how this unit disposes secret classified documents. According to Army Regulation 380-5 chapter IX Disposal and Destruction of secret classified documents. Records of destruction of Secret and Confidential information are not required except for NATO Secret and some limited categories of specially controlled Secret information. 3. Reflect on the ethical values and their ramifications. I find the army values very important in this situation. SGT Day he showed his loyalty to SFC Sharp by stating, “As far as I’m concerned SFC Sharp destroyed them two weeks ago.” In my opinion this isn’t the ethical way business should be done in my section. My obligation as a leader is to refuse to take shortcuts that could undermine the integrity of my unit. Army values are trusting that all people have done their jobs and fulfilled their duty. 4. Consider other applicable moral principles. Remaining loyal to the overall mission of safeguarding the nations security from enemies both foreign and domestic. Fulfilling my duties as an NCO by remaining professional and ensuring proper attention is brought to this situation. Respecting the men and women that could be in potential danger if classified information got into the wrong hands. Not compromising my integrity...
Words: 298 - Pages: 2
...job on a classified program back at the NSA (Edward Snowden Biography, n.d.). Accordingly, to gain access to clandestine programs and highly classified information, Snowden was granted...
Words: 2005 - Pages: 9
...* What Makes an Army Leader Practical Exercise * Student Handout 1. Clearly define the ethical problem. a. The ethical problem in this situation is Whether or not I should be honest and do the right thing by turning in SFC Sharp for possibly destroying some “Secret” documents. 2. Employ applicable laws and regulations. a. Each Unit is responsible for coming up with their own SOP’s from Tactical movements to situations such as this one (Security breach), which should state proper disposal of documents that are considered Secret. SOP’s along with the unit’s regulations should also have Army regulations, so I would check my SOP to determine if proper disposal of classified information was conducted and what steps I need to take to ratify this situation. 3. Reflect on the ethical values and their ramifications. a. When I signed on that dotted line I also swore to live by the Army Values. Some Values that I think go with this situation are Loyalty, Duty, and Integrity. I need to be loyal to my country, unit and myself to do the right thing and report this situation. Not doing so is not showing my loyalty to my country and unit. It is also my duty to fulfill my obligations fully and report anything that could hurt my unit in any way, especially in a security breach situation. Never know if it may be some type of terrorist act. By choosing not to report this, it is undermining my Integrity. There should be no...
Words: 701 - Pages: 3
...Project for IS4550 Shurleen E. Wilson-Fye ITT-Duluth Ms. Brown Contents Coversheet ……………………………………………………………………………… 1 Glossary…………………………………………………………………………………….2-3 Overview, Purpose, Scope……………………..4-5 Training………………………………………………….5-6 Procedure………………………………………………….6 Policy……………….………………………………….….6-9 Policy 1: Information Systems Policy..…..10-13 Policy 2: Security of Laptop…………………..14-16 Policy 3: Clean Desk policy…….……………..17-18 Policy 4: Workstation Policy………………………19 Policy 6: Email Policy………………………..….20-21 Policy 7: Personnel policy………………….…22-23 Policy 9: Data Breach Policy………………...24-27 Policy 10: Software policy………………………29-31 Policy 11: Data and information classification……32 Policy 12: Internal Treats…………………………………….33 Policy 13: Policies and Procedures for Electronic Protected Health Information (ePHI) and Personally Identifiable Information (PII)...34-35 Policy 14: Wireless LAN Security Policy……………………..36 IS security Awareness policy…………………………………..37-38 Conclusion……………………………………………………………………39 References……………………………………………………………………40 Overview: DSA contractors has been awarded a contract with the Department of Defense. Our next task is to revamp the companies’ policy to ensure compliance with DOD policy. All employees have to be retrained on new policy to ensure that DSA medicate violations. The attitudes and atmosphere of change will also be needed to ensure compliance with DOD standards. Training sessions is scheduled for all employees...
Words: 9781 - Pages: 40
...SFC Sharp’s desk and the wall that had been certified by him as being destroyed. This is classified as a security violation. When I had confronted SGT Day, his reaction was to pretend that the situation did not exist and ignore the problem stating “as far as I know those documents were destroyed two weeks ago”. In this particular instance, the first thing that I would do is review the unit SOP and Army regulations pertinent to the safe guarding and destruction of classified documents. AR 380-5, paragraph 6-22 states “Commands will establish procedures to control all “SECRET” and “CONFIDENTIAL” information and material originated, received, distributed, or routed to sub–elements within the command, and all information disposed of by the command by transfer of custody or destruction.” AR 380-5, paragraph 6-29 states “Records of destruction are not required for “SECRET” material”. Since the Army Regulation states that it is up to the command on how to destroy “SECRET” and “CONFIDENTIAL” documents, I would review my Unit SOP. Depending upon what the Unit SOP stated would then govern what steps were required to take next. Some of the ethical values that are being compromised in this situation are Loyalty, Integrity and Duty. Loyalty towards your supervisor is always good as long the supervisor is living by the Army Standards and Regulations. You should not, however, forget that you are required to have Loyalty to your Country, the Army and your Unit as well. As a Non-Commissioned Officer...
Words: 532 - Pages: 3
...the extracted material from the General Dennis J. Reimer Training and Doctrine Digital Library (https://atiam.train.army.mil). The text may contain passive voice, misspellings, grammatical errors, etc., and may not be in compliance with the Army Writing Style Program. Clearly define the problem: SFC Sharp has violated AR 380-5 Department of the Army Information Security Program by not destroying the secret document scheduled to be destroyed. SGT Day implied that SFC Sharp was the only one present when destroying the classified material. AR 380-5 states that there must be two witnesses present at the destruction of any material classified higher than confidential. SFC Sharp has also violated Article 107 of the UCMJ (False Official Statements). SFC Sharp may have become complacent and in-turn allowed his soldiers to become complacent in the proper procedures in the handling of classified material. As a result of the mishandling of classified documents not one person in the section could be sure the document was not copied in anyway. The mission of the section could halted just on the speculation of leaked classified documents. Employ the applicable laws and regulations: The laws and regulations violated were Article 107 of UCMJ and AR 380-5. Reflect on ethical values and ramification: It is possible that SFC Sharp may have made a mistake by not destroying the document or possibly destroying a document he thought was the proper document. Regardless of SFC Sharp’s...
Words: 566 - Pages: 3
...gathering, there is an assumption that other countries are gathering intelligence in similar ways. The only way to combat intelligence gathering against the United States is to know what technological intelligence collection resources are being used for gathering information. This is the job of Multidisciplinary Counterintelligence (MDCI). How does the government know that lines are secure from signals intelligence of foreign adversaries? One of the main tasks of MDCI is the "communication line" of the American Government. Radio waves can easily be detected with the right equipment anywhere within the area, and even microwaves can be detected with a receiver in the right place. MDCI combats these problems with encryption for messages and secure lines for voice communication. The encryption process is found on the governments SIPRnet web, which is used for the transfer of classified information only. For voice communications, the government uses secured lines that will scramble communications into meaningless sounds or scratches. The only problem with these types of devices is that they cannot be located just anywhere and can be very expensive to maintain; furthermore, facilities must be able to support these classified mediums. With all of this in mind, many of the nation's government officials may not be using these secured lines and opt to take a chance with telephone lines. This problem became apparent when the Soviet (now Russian) Embassy was placed in Washington. With the...
Words: 290 - Pages: 2
...There have been a number of times in the United States history where there have been secret and top secret information has been disclosed or sold to another nation. Two of these occasions, unrelated, were because of Robert Philip Hanssen and Noshir Sheriarji Gowadia. Hanssen was an FBI agent who decided to sell top foreign intelligence and laundry list of other top secret information to Soviet Russian intelligence agencies. Hanssen’s actions are considered espionage because he was purposefully hiding what he was doing while employed by the FBI and using his clearance for his personal gain. Gowadia sold his own work in which he developed while working for Northrop Corp, which was actually selling military secrets. Gowadia sold these military secrets to China which resulted in the development of similar aircraft. The result of the actions of these two men was great damage to national security and putting at risk the safety of many, many people of not only the United States, but many people across the globe....
Words: 1634 - Pages: 7
...Can WikiLeaks be Found Guilty of a Crime for Its Release Of the Iraq War Materials, Afghanistan War Materials and Diplomatic Cables? In 2010, WikiLeaks released three large groups of information – classified documents concerning the Iraqi war, classified Pentagon documents concerning the conflict in Afghanistan, and U.S. State Department diplomatic cables. There was an outcry from members in the U.S. government, U.S. lawmakers, and U.S. citizens as they questioned how WikiLeaks could have legally obtained and released this information. There were also those who applauded WikiLeaks and saw them as part of the new media, simply carrying on the struggle between the people’s right to know versus national security. In this new Internet age, where data can be immediately published to an enormous audience from anywhere in the world with the simple push of a button, and where wars are no longer declared on a country but on generalized “terror,” is a site like WikiLeaks protected? WikiLeaks Background WikiLeaks states on its website: WikiLeaks is a non-profit media organization dedicated to bringing important news and information to the public. We provide an innovative, secure and anonymous way for independent sources around the world to leak information to our journalists. We publish material of ethical, political and historical significance while keeping the identity of our sources anonymous, thus providing a universal way for revealing of supposed and censored injustices. WikiLeaks...
Words: 5807 - Pages: 24
...Skip to NavigationSkip to Content TermPaperWarehouse.com - Free Term Papers, Essays and Research Documents The Research Paper Factory JoinSearchBrowseSaved Papers Search Home Page »Philosophy and Psychology Personal Model of Helping In: Philosophy and Psychology Personal Model of Helping PERSONAL MODEL OF HELPING Karen Carr January 10, 2010 BSHS312 – Effective Models of Helping Dr. Princess Clarke \ How and why you formed this viewpoint In growing up I always wanted to help other people. I was the child who other children confided in or came to when they wanted to talk or needed help with a problem. When growing up it was not common for black people to go to counseling. Families kept secrets among themselves and sometimes those secrets came back to haunt people many years later. When faced with problems people relied on their spiritual beliefs, the support of the family, and sometimes close friends. If a girl had gotten pregnant and not married that would have been kept top secret. Usually a family member would raise the baby and no one would ever speak openly about it. My family had to deal with the death of two of my brothers at young ages. It hurt my mother deeply having to deal with the loss of two children because of violence. These tragedies were never discussed even as we became adults. As I became older I realized that my mother and our entire family should have gotten counseling. It was not until after my mother passed that my uncle shared...
Words: 379 - Pages: 2
...SFC Sharp failed to report the security issue that the documents were lost. A lack of honesty on his part? Or was all this legit? Was it intentional or not? How should I go about handling this situation? Army Regulation 380–5 covers the safeguarding of classified materials. It states that in discovery of this type of security breach that any person, who discovers classified information out of proper control will, take custody of the information, safeguard it, and immediately report to their security manager, S2, or CO. The mishandling of secret information can cause serious damage to our national security. At this moment I am looking at myself and where do my values take me. First is Duty, how do I do what is right though under this pressure? My loyalty is with my fellow NCO’s and also my unit, and above all my country. This guy is about move forward in his career, and of I destroy that, how does that look on me? Yes it is the hard right vs. the easy wrong situation. What I choose to do can affect my professional relationship with other in this unit in so many ways. If I report this directly to the CO, I will be in the right but what will that do to SFC Sharp? Do I go along with the response that I received from SGT Day, thus making me just as wrong and guilty of what SFC Sharp did intentionally or unintentionally? Then if this comes up later I can be charged as an accessory to the fact. I could take this issue directly to SFC Sharp first and see what he wants to do about the...
Words: 430 - Pages: 2