Therefore, before implementing desktop application security measures, the IAO or will submit a change notice to the CCB for review and approval. The responsible Configuration Control Board (CCB) will approve revisions to site systems that could have a security impact. The requirements and recommendations set forth in this document will assist IAOs and Information Assurance Managers (IAMs) in protecting desktop applications in DoD locations hereafter referred to as sites. Where applications do offer security options, the default settings typically do not provide a strong security posture. Compounding this problem is the fact that the vendors of software applications have not expended sufficient effort to provide strong security in their applications. Malicious and mischievous forces have attempted to take advantage of the vulnerabilities and dependencies to disrupt the work processes of the Government. Unfortunately, this presence also brings about dependence and vulnerabilities. The nearly universal presence of systems on the desktops of all levels of staff provides tremendous opportunities for office automation, communication, data sharing, and collaboration. This Mozilla Firefox Technology Overview provides the technical security policies, requirements, and implementation details for applying security concepts to Commercial-Off-The-Shelf (COTS) applications.
0 Comments
Leave a Reply. |