blog




  • Essay / Booz Allen Hamilton Cybersecurity Assessment

    IntroductionDuring the process of analyzing an organization's effectiveness in managing cybersecurity risks, various security policies need to be implemented. The cybersecurity policies developed for consulting firm Booz Allen Hamilton are a great example of this concept. The direct division created to meet the company's needs in cyberspace is the Cyber ​​Solution Network (CSN). The CSN division within Booz Allen Hamilton has a range of policies used to ensure the business is protected against risk. Cybersecurity Policy Best Practices The use of cybersecurity policies within CSN is intended to ensure the security of the division's assets. Written policies provide guidance on implementation, through references to applicable standards and best practice statements (Booz Allen Hamilton, 2012). As Control Data Corporation has stated, no asset can be 100% secure; Network security often focuses on strategic prevention or reactive procedures, rather than reviewing security policy and maintaining its operation (1999). The analysis therefore indicates that many violations are often due to recurring policy weaknesses. “Even the most reliable and advanced technologies can be weakened or rendered ineffective by poor decisions or weak operational practices” (Control Data Corporation, 1999, p. 3). The analysis conducted by Control Data Corporation (1999) provides a qualitative and precise assessment of compliance with the cybersecurity policy. This analysis is organized into several different categories: 1) Natural weaknesses of the security policy. Recognizing natural weaknesses is essential for Booz Allen Hamilton's Cyber ​​Security Network unit. The action of neglecting...... middle of paper ......n of one's assets. Works Cited Booz Allen Hamilton (2012). Booz Allen Cyber ​​Solutions Network. Retrieved from http://www.boozallen.com/consulting/prepare-for-whats-next/cyber/cyber-solutions-networkBooz Allen Hamilton (October 1, 2011). Laboratory governance policy. Retrieved from http://www.boozallen.comControl Data Corporation. (1999). Why security policies fail. Retrieved from http://www.scribd.com/doc/17220213/Why-Security-Policies-FailKabay, ME and Robertson, B. (2009). Security policy guidelines. In S. Bosworth, M. E. Kabay, & E. Whyne (Eds.), Handbook of computer security (5th ed.). New York, NY: John Wiley & Sons.NIST. US Department of Commerce, (2009). National Institute of Standards and Technology sp 800-53. Retrieved from website: http://csrc.nist.gov/publications/nistpubs/800-53-Rev3/sp800-53-rev3-final_updated-errata_05-01-2010.pdf