Computer Network Defense (CND) And the Intelligence Community – A Higher Level of Security

Computer Network Defense (CND) And the Intelligence Community – A Higher Level of Security

 

There are three sectors of the Federal Government that are vitally concerned with Computer Network Defense and the Intelligence Community adds an additional level of security because of the classified nature of communit computercyber offical website y activities.

As a result, contractors that provide Computer Network Defense (CND) services are held to even higher standards than the usual high requirements of vendors for Cyber Security projects.

The concept of Computer Network Defense includes a broad menu of services that provide an infrastructure against cyber attacks from domestic and international sources. While each agency has specific Cyber Security needs and protection of classified data and information, a general roadmap can be developed and used as a template for individual users.

General Objectives:

In general, contractors that perform Computer Network Defense Services are tasked to meet four objectives.

  • Recommending architectures, software and hardware
    · Implementing the government approved solution
    · Performing operations and maintenance of the CND program
    · Insuring that security requirements for classified material are met ( a higher level of security requirement)

The contractor is also required to make regular formal reports and/or briefings detailing status and accomplishments in the various CND functional areas.

Specific CND duties include, but are not limited to:

Deployment:

Deployment requires the contractor to develop all hardware and software required to establish a state of the art Cyber Security Defensive network that will improve defenses, ensure that the systems operate properly and monitor activities on a day to day basis. It is important that the entire deployment effort coordinates with the agency security office to ensure that the protection of classified data is not compromised. Deployment usually includes:

 

Leave a Comment