OIG on Information Technology Security Tools
OIG: NASA’s Process for Acquiring Information Technology Security Assessment and Monitoring Tools
“NASA has not fully implemented a process for identifying its IT security assets, a necessity to meet federally mandated requirements and improve IT acquisition outcomes. Lack of such controls result in missed opportunities to capitalize on efficiencies and leverage purchasing power on critical IT security investments. NASA could use two internal management control processes Capital Planning and Investment Control (CPIC) and APM to improve visibility over purchases of IT security assessment and monitoring tools.”
That might help, yes.
Also if you’ve got sensitive data that you don’t want hackers to have then it better not be on a system linked to the internet or it’s gone. And if you have not inventoried what’s sensitive then how do you know what’s out on the internet? Or not?
well as we all know that information and technology has played a very important role in our day to life..so it should be updated.
this is really helpful.this was really needed and this tool is gonna help nasa for sure.thanks for sharing the article here.