Int. J. of Business Continuity and Risk Management   »   2013 Vol.4, No.1



Title: DoD cyber technology policies to secure automated information systems


Authors: Maurice Eugene Dawson Jr.; Miguel Crespo; Stephen Brewster


Department of Management and Marketing, College of Business and Public Affairs, Alabama A&M University, P.O. Box 429, Normal, AL 35762, USA
Ernst & Young, 2005 Market Street #700, Philadelphia, PA 19103, USA
Textron Systems – AAI UAS, 124 Industry Lane, Cockeysville, MD 21030, USA


Abstract: Availability, integrity, and confidentiality (AIC) is a key theme everywhere as cyber security has become more than an emerging topic. The Department of Defense (DoD) has implemented multiple processes such as the Department of Defense information assurance certification and accreditation process (DIACAP), common criteria (CC), and created proven baselines to include information assurance (IA) controls to protect information system (IS) resources. The aim of this research study shall provide insight to the applicable processes, IA controls, and standards to include providing a method for selecting necessary government models and for system development.


Keywords: cyber security; risk management; information assurance; corporate governance; security controls; certification and accreditation; C&A; Department of Defense; DoD; USA; United States; information systems; standards; common criteria.


DOI: 10.1504/IJBCRM.2013.053089


Int. J. of Business Continuity and Risk Management, 2013 Vol.4, No.1, pp.1 - 22


Submission date: 02 Sep 2012
Date of acceptance: 04 Oct 2012
Available online: 04 Apr 2013



Editors Full text accessAccess for SubscribersPurchase this articleComment on this article