This is not a NASA Website. You might learn something. It's YOUR space agency. Get involved. Take it back. Make it work - for YOU.
IT/Web

OIG on Information Technology Security Tools

By Keith Cowing
NASA Watch
March 18, 2013
Filed under , , ,

OIG: NASA’s Process for Acquiring Information Technology Security Assessment and Monitoring Tools
“NASA has not fully implemented a process for identifying its IT security assets, a necessity to meet federally mandated requirements and improve IT acquisition outcomes. Lack of such controls result in missed opportunities to capitalize on efficiencies and leverage purchasing power on critical IT security investments. NASA could use two internal management control processes Capital Planning and Investment Control (CPIC) and APM to improve visibility over purchases of IT security assessment and monitoring tools.”

NASA Watch founder, Explorers Club Fellow, ex-NASA, Away Teams, Journalist, Space & Astrobiology, Lapsed climber.

3 responses to “OIG on Information Technology Security Tools”

  1. Ralphy999 says:
    0
    0

    That might help, yes.

    Also if you’ve got sensitive data that you don’t want hackers to have then it better not be on a system linked to the internet or it’s gone. And if you have not inventoried what’s sensitive then how do you know what’s out on the internet? Or not?  

  2. motor bike insurance says:
    0
    0

    well as we all know that information and technology has played a very important role in our day to life..so it should be updated.

  3. motor bike insurance says:
    0
    0

    this is really helpful.this was really needed and this tool is gonna help nasa for sure.thanks for sharing the article here.