preview

The Pros And Cons Of Military Spying

Decent Essays

Espionage has been a part of America since its earliest days. Today it is not surprising to hear of newer forms of spying like a cyber-attack on a federal agency or intrusions into nuclear power plants that could potentially cause grave damage. One current example of an espionage event officially named by the FBI as Operation Ghost Stories occurred around the 2010-time frame. The FBI ran an investigation of at least ten Russian spies that had embedded themselves in communities, universities, and jobs without anyone suspecting (FBI). These deep-cover spies used stolen identities to obtain a front of being “normal” Americans that to all but knew their true identities. They assimilated into the fabric of our country, and their intent was to gather intelligence and to strike at a strategic time that could occur years down the road. It is not wonder that organizations are concerned when they have so much riding on keeping their networks secure. One method that companies have used to keep their secrets more secure is by using an intranet.
Security expert Prose explains that an intranet is a way to share data and keep it secure in one area―a private network―while using the Internet and running other aspects of an organization in another area (159). He further continues that information that is considered top secret, secret, or confidential should be separated …show more content…

The RMF developed by the National Institute of Standards and Technology (NIST) gives a 6-step process to plan, build, and design the complicated system. The six steps are: (1) Categorize, (2) Select, (3) Implement, (4) Assess, (5) authorize, and (6) Monitor. And of course, there are software programs on the market that can be used in designing your intranet with Microsoft’s Share Point being a top

Get Access