Saturday, February 22, 2020

Certification and accreditation Research Paper Example | Topics and Well Written Essays - 500 words

Certification and accreditation - Research Paper Example However, the information system must meet the approved safeguards or protection in the two domains i.e. technical and managerial. The duration of a typical certification and accreditation process should be executed in sixteen to eighteen months. However the duration will vary due to the complexity level of the networked environment. (Stark, 1994) The dissimilarity between a Certified and an information system auditor is a compliment of both these roles. The certifier will review the systems for compliance with the stated requirements from the regulations, law or the board (Langsley & American Board of, 1983). In contrast, the auditor will validate the results submitted by the certifier for meeting the requirements. However, it is not necessary that an auditor may be a part of the same organization (Stark, 1994). Likewise, information system auditor is responsible for carrying out an independent review or audit of examination of records and activities for accessing the appropriateness of system controls for assuring compliance with policies and procedures. Similarly, a certifier is associated with conducting technical decisions of complying systems with organizational requirements, conducting risk assessment focused on system operation, certification actions and combining or integrating the finalized certification along with accredited packages. The post of this individual is known as Information System Security Manager. Furthermore, the contribution of a reviewer is associated with internal organizational role that falls under the role of a certifier (Stark, 1994). The phase 5 of the Certification and Accreditation process called as Disposal is not addressed. For instance, there is always a disposal phase of any process, system, applications etc. likewise, the process of system disposal, few factors need consideration. These factors are mentioned below: Disposal of Storage devices: if an

Wednesday, February 5, 2020

Internet Protocol V.6 (IPv6) Deployment and Security Concerns Essay

Internet Protocol V.6 (IPv6) Deployment and Security Concerns - Essay Example This paper will present a detailed analysis of the new version of the internet protocol (IPV6) and security issues and deployment concerns of the newest version of this Internet Protocol (IPv6). This paper will also follow the current problems with current Internet Protocol (IPv4) and related security issues. Hasenstein (1997) states that the the research and develoment on the internet protocol was started in the 1960s, the computing environment was not the like as it is nowadays. In addition, there was less number of consumers of internet as compared to today. At that time the telecommunications lines used to support the high-speed networks were not so powerful, quick, and error-free as they are today. Also, the appliƃ‚ ­cations transmitted over the internet involved smaller data packets, and there was not such a demand to transmit them in real time. As these demands on the internet began to grow, the designers and developers decided to create a modern and up-to-date internet protocol by taking the advantage of the current technology. Consequently, IPv4 was created (Hasenstein; Blumenthal and Clark; R. M. Hinden). According to Hinden (2003), the internet protocol version 6 is the advanced generation Internet Protocol version 4 that was intended to improve the features of IPv4. In addition, internet protocol version 4 was widespread in use that is still in dominant utilization. This IP4 version is the internet layer protocol intended for internetworks of packet-switched method. The fundamental driving force for the renovation of the internet protocol was the anticipated internet protocol version 4 addresses exhaustion that are reduced by increased number of users and machines connected to the internet. The newer version IPv-6 was initially released in December 1998 by the Internet Engineering Task Force (IETF). The IETF has published an internet standard specification