Information Technology

Information Technology

Cybersecurity

Cybersecurity falls under Information Operations (IO) and is used to protect and defend information and information systems. Definition: “Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation”. DoD Instruction 8500.01 Guide: …

Information Technology

Cybersecurity Read More »

Information Technology

Cybersecurity

Computer Security (Cybersecurity) is the protection of computer equipment from theft, hacking, natural disaster, tampering and corruption. The goal is to keep computer system running without interference from unauthorized sources. In the DoD, computer security is the responsibility of the security and Information Assurance (IA) department along with the user. DoD Computer Security Definition [1] …

Information Technology

Cybersecurity Read More »

Information Technology

Major Automated Information System

A Major Automated Information System (MAIS) is a defense acquisition program for an Automated Information System (AIS) that meets Acquisition Category (ACAT) IA requirements listed below.  An AIS is a system of computer hardware, computer software, data, and/or telecommunications that performs functions such as collecting, processing, storing, transmitting, and displaying information. A MAIS is determined …

Information Technology

Major Automated Information System Read More »

Information Technology

Information Technology Overview

Information Technology (IT) is the use of computers and software to manage information. It’s the career discipline responsible for storing information, protecting information, processing the information, transmitting the information as necessary, and later retrieving information as necessary. In the DoD, IT is responsible for Information Operations (IO), Cybersecurity, Information Superiority, and Interoperability (Net-Centric Operations). In …

Information Technology

Information Technology Overview Read More »