Identify Vulnerabilities Within The Information Security Infrastructure

1588 WordsFeb 29, 20167 Pages
identify rogue agents, corrupt officials and leakers, and draws on a Defense Department model under development for more than a decade, according to officials and documents reviewed by the AP. (2014) FISMA has provided several major provisions that can be categorized in three categories: (1) assessments, (2) enforcements, and (3) compliance. These provisions are used to accomplish the same goal and that is to maximize the safety of computer systems and stored data. Assessments are used to determine if sufficient security is being utilized to protect federal data. These requirements are put in place to identify vulnerabilities within the information security infrastructure. It rates potential weak points that may be caused if vulnerability was found and a plan of action must be developed and executed to elevate found vulnerabilities to meet desire security standards. System administrators are obligated to assist their higher levels with found assessment and suggestions on how to improve the information system infrastructure. Scanning the system infrastructure is one of many modes used to assess the strength of information security. Several software, such as QualysGuard, have been designed to scan system architecture. QualysGuard is an automated suite that simplifies information security measures by rendering critical security intelligence. The suite offers full protection of all information security systems, auditing, and compliance assessments. Accrediting and

More about Identify Vulnerabilities Within The Information Security Infrastructure

Open Document