CrossTalk. The Journal of Defense Software Engineering. Volume 24, Number 5, Sep/Oct 2011
DEPARTMENT OF DEFENSE WASHINGTON DC MILITARY HEALTH SYSTEM
Pagination or Media Count:
Part of our role at DHS is to better enable all stakeholders to secure their part of cyberspace. Given that our adversaries will exploit even the smallest weakness, identifying and mitigating exploitable weaknesses before they become a pathway for attack is vital to the defense against predatory practices. One weak link in the chain can compromise an entire software application and degrade our enterprise capabilities. Organizations must understand their information asset vulnerabilities. In order to assess the nature and extent of these vulnerabilities, organizations must first collect a consistent set of metrics. The Federal Government is collecting metrics with the help of the CyberScope Initiative, which mandates that federal civilian agencies report cybersecurity data using standardized formats. The CyberScope application is a web-based interactive tool that allows agencies to report data that complies with Federal Information Security Management Act FISMA rules. Ultimately, this tool helps federal agencies identify weaknesses, thus enabling the cyber enterprise to better defend against predatory attackers by making their assets more resilient.
- Computer Programming and Software