SRA International Study
Focusing its professional experience and talents on departments of the federal government's national security agencies was smart for SRA because there are a multitude of aspects within each department that need security and impenetrable services. In other words, there is an enormous amount of work for a security agency that is tackling those crucial issues in thirteen of the fifteen departments linked to the executive branch of the federal government. Moreover, providing IT services for the Joint Chiefs of Staff and the four military departments is an enormous job, which pays well of course but is also vital to the security of the nation. On top of those duties, SRA has a huge workload securing two of the largest agencies in the federal government. For example, the U.S. Department of Homeland Security -- established after the terrorist attacks on September 11, 2001 -- has numerous agencies within the Department which require security, including Domestic Nuclear Detection Office, Office of Intelligence and Analysis, Science and Technology Directorate, U.S. Secret Service, Immigration and Customs Enforcement, Transportation Security Administration, among several others. And the U.S. Department of Defense has a powerful need to secure its command and control, its communications, intelligence, reconnaissance and surveillance components, and so SRA has its hands full with the duties and responsibilities vis-a-vis these two massive federal agencies -- and all the individual departments within those behemoths. Beyond those responsibilities mentioned in the paragraph above, there are a myriad of other IT-related and security-related services that SRA provides, including training and web-development in other departments like the EPA, Veterans Administration and the Agency for International Development.
Open source intelligence is defined as those informational sources that are not hidden, but instead are found on television, in newspapers, over the radio and magazines, on the Internet and elsewhere. Gathering and analyzing these sources of intelligence -- SRA uses what it calls "NetOwl" text mining software -- is part of the job of protecting America and its assets. There is a strong relationship between open source intelligence and the need...
The fact that industrial control systems may be vulnerable to infiltration by other citizens, or international parties puts laws pertaining to intersection of systems transmission at the forefront of priorities for us all. At present, telecommunications interference of private citizens holds an up to a five-year prison sentence by U.S. federal law. How cyberterrorism is addressed, when the stakes are heightened, leaves a whole host of opportunities for citizens, and
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now