Verified Document

Sra: Company That Protects America's Vital Infrastructures Case Study

SRA International Study Focusing its professional experience and talents on departments of the federal government's national security agencies was smart for SRA because there are a multitude of aspects within each department that need security and impenetrable services. In other words, there is an enormous amount of work for a security agency that is tackling those crucial issues in thirteen of the fifteen departments linked to the executive branch of the federal government. Moreover, providing IT services for the Joint Chiefs of Staff and the four military departments is an enormous job, which pays well of course but is also vital to the security of the nation. On top of those duties, SRA has a huge workload securing two of the largest agencies in the federal government. For example, the U.S. Department of Homeland Security -- established after the terrorist attacks on September 11, 2001 -- has numerous agencies within the Department which require security, including Domestic Nuclear Detection Office, Office of Intelligence and Analysis, Science and Technology Directorate, U.S. Secret Service, Immigration and Customs Enforcement, Transportation Security Administration, among several others. And the U.S. Department of Defense has a powerful need to secure its command and control, its communications, intelligence, reconnaissance and surveillance components, and so SRA has its hands full with the duties and responsibilities vis-a-vis these two massive federal agencies -- and all the individual departments within those behemoths. Beyond those responsibilities mentioned in the paragraph above, there are a myriad of other IT-related and security-related services that SRA provides, including training and web-development in other departments like the EPA, Veterans Administration and the Agency for International Development.

Open source intelligence is defined as those informational sources that are not hidden, but instead are found on television, in newspapers, over the radio and magazines, on the Internet and elsewhere. Gathering and analyzing these sources of intelligence -- SRA uses what it calls "NetOwl" text mining software -- is part of the job of protecting America and its assets. There is a strong relationship between open source intelligence and the need...

SRA's software can analyze unlimited numbers of reports and newspapers and web pages -- and can translate this data from Farsi, Korean, Spanish, French, Arabic, English and Chinese -- through its text and mining capabilities. Businesses (and individuals who post information on Facebook, etc.) should be concerned about their open source materials because with data mining functionality, a company like SRA can find and store data from any company's spreadsheets and databases.
Critical infrastructures, according to the Department of Homeland Security, are the "…assets, systems, and networks, whether physical or virtual," that are so important that having them violated could negatively impact U.S. economic security and the public health and welfare (DHS). According to the SRA report, the United States' critical infrastructures include: the Department of Defense, Department of Homeland Security, Department of Health and Human Services, the General Accounting Office, the Treasury Department and the Environmental Protection Agency. As for examples within the Homeland Security Department, there are several critical infrastructure sectors, including the "chemical sector," the "communications sector," the "dams sector," the "energy sector," the "emergency services sector" and the "energy sector," among others.

The importance of improved interoperability -- one system using parts of another system, or interacting by sharing data and interpreting shared data with another system -- cannot be overstated when it comes to protecting American critical infrastructure from hackers, terrorists, or others who would bring harm to the United States. For example, the SRA has provided privacy training for government personnel, SRA is "integrating privacy policy across" several federal agencies, an example of interoperability. The security strategies that work for the Department of Homeland Security in most cases also work for the Department of Defense; and hence, interoperability and interrelationship cooperation are vital when it comes to protecting federal agencies from attack or compromise.

When FISMA replaced the Government Information Security Reform Act (GISRA) it was done to plug certain holes -- things that were…

Sources used in this document:
Works Cited

Department of Homeland Security. (2013). Critical Infrastructures. Retrieved June 5, 2014,

from http://www.dhs.gov.

SRA International, Inc. (2010). Automating Compliance with Federal Information Security

Requirements.
Cite this Document:
Copy Bibliography Citation

Related Documents

Data Mining
Words: 1427 Length: 4 Document Type: Research Paper

Data Mining Determine the benefits of data mining to the businesses when employing: Predictive analytics to understand the behaviour of customers "The decision science which not only helps in getting rid of the guesswork out of the decision-making process but also helps in finding out the perfect solutions in the shortest possible time by making use of the scientific guidelines is known as predictive analysis" (Kaith, 2011). There are basically seven steps involved

Data Mining in Health Care Data Mining
Words: 1003 Length: 3 Document Type: Essay

Data Mining in Health Care Data mining has been used both intensively and extensively in many organizations.in the healthcare industry data mining is increasingly becoming popular if not essential. Data mining applications are beneficial to all parties that are involved in the healthcare industry including care providers, HealthCare organizations, patients, insurers and researchers (Kirby, Flick,.&Kerstingt, 2010). Benefits of using data mining in health care Care providers can make use of data analysis in

Data Mining Businesses Can Receive Many Benefits
Words: 1387 Length: 4 Document Type: Essay

Data Mining Businesses can receive many benefits from data mining. Which benefits they receive, however, can also depend on the way in which their data mining is undertaken. Predictive analytics are used to understand customer behavior, and businesses use the behavior of the customer in the past to attempt to determine what the customer will do in the future (Cabena, et al., 1997). While it is not an exact science, many

Data Warehousing and Data Mining
Words: 2013 Length: 6 Document Type: Term Paper

Data Warehousing and Data Mining Executive Overview Analytics, Business Intelligence (BI) and the exponential increase of insight and decision making accuracy and quality in many enterprises today can be directly attributed to the successful implementation of Enterprise Data Warehouse (EDW) and data mining systems. The examples of how Continental Airlines (Watson, Wixom, Hoffer, 2006) and Toyota (Dyer, Nobeoka, 2000) continue to use advanced EDW and data mining systems and processes to streamline

Data Mining, a Process That Involves the
Words: 1271 Length: 4 Document Type: Essay

Data mining, a process that involves the extraction of predictive information which is hidden from very large databases (Vijayarani & Nithya,2011;Nirkhi,2010) is a very powerful and yet new technology having a great potential in helping companies to focus on the most important data in their data warehouses. The use of data mining techniques allows for the prediction of trends as well as behaviors thereby allowing various businesses to make proactive

Data Mining in Business Research
Words: 1160 Length: 4 Document Type: Term Paper

The ability to parse through the many records of transactions, customer contacts, and many other items stored electronically creates the foundation for data mining's definition. Data mining specifically is defined as the process of data selection, exploration and building models using vast data stores to uncover previously unknown patterns, insights, and observations that lead to strategies for effective differentiation and growth. Central to the development of data modeling is the creation of data and prediction models based

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now