ORDER National Policy. Effective Date 09/21/09. Voice Over Internet Protocol (VoIP) Security Policy SUBJ:
|
|
|
- Isabel Patterson
- 10 years ago
- Views:
Transcription
1 National Policy ORDER Effective Date 09/21/09 SUBJ: Voice Over Internet Protocol (VoIP) Security Policy 1. Purpose of This Order. This Order establishes the Federal Aviation Administration s (FAA) Voice over Internet Protocol (VoIP) security policy, and assigns responsibilities for establishing a secure VoIP Program. This Order will ensure that security requirements are known to support VoIP technology securely on FAA information systems. 2. Whom This Order Affects. This Order applies to those who are responsible for planning, implementing, maintaining, or securing FAA-owned or FAA-controlled VoIP systems and services. This order also applies to grantees, consultants, licensees, and any person or entity, domestic or foreign, having a formal written agreement with the FAA to plan, implement, maintain, or secure FAA-owned or FAA-controlled VoIP systems and services. 3. Where Can I Find This Order? This Order is available on the FAA s Intranet website at the URL 4. Scope. This Order applies to all FAA-owned or FAA-controlled information systems, telecommunication networks, and VoIP-enabled systems, devices, or components that process, store, or transmit VoIP traffic. This Order also applies to all personnel accessing FAA-owned or FAA-controlled information systems that process, store, receive or transmit VoIP. This Order provides oversight of the FAA enterprise implementation of security for VoIP services and hardware components. This order does not apply to National Security Systems, classified communications or the protection of classified information. 5. General. VoIP is a general term for a family of transmission technologies that deal with the delivery of voice communications over the Internet or other packet-switched networks. VoIP networks are IP-based networks that transmit voice data. VoIP systems usually interface with the traditional Public Switched Telephone Network (PSTN), allowing for transparent voice communications. The same security considerations and controls applied to an IP data network must be applied to a VoIP network. The ease of access to and prolific nature of VoIP connections, along with the ability to easily intercept and analyze network data will lead to unnecessary risk and compromise of FAA information. 6. Statutory Policy and Regulatory Mandates. a. Code of Federal Regulations, Title 47, Chapter I Telecommunications, Federal Communications Commission (FCC), Part 9.5 Interconnected Voice over Internet Protocol Services, provides service requirements and conditions applicable to interconnected Voice over Internet Protocol service providers. b. The Federal Information Security Management Act of 2002 (FISMA) states that each Federal department and agency must identify and provide information security protections Distribution: Electronic Initiated By: AIS-500
2 commensurate with the risk and magnitude of the harm resulting from the unauthorized access, use, disclosure, disruption, modification, or destruction of information collected or maintained by or on behalf of an agency; or information systems used or operated by an agency or by a contractor of an agency or other organization on behalf of an agency. c. The OMB Circular A-130, Appendix III, Management of Federal Information Resources, states that a minimum set of controls are to be included in Federal automated information security programs assigns Federal agency responsibilities for the security of automated information, and links agency automated information security programs and agency management control systems. Federal departments and agencies must implement policies, standards, requirements, and procedures that are consistent with standards and guidance issued by the National Institute of Standards and Technology (NIST). 7. References. References are contained in Appendix A of this Order. 8. Definitions. Definitions of specialized terms used in this subject area, with relevant abbreviations and acronyms, are listed in this Order in Appendix B. All other definitions located in this Order that pertain to information systems security are stated in the FAA Order A, Information Systems Security Program, Appendix B. 9. Notice of Exception or Noncompliance. This Order establishes policy to comply with statutory and regulatory requirements, including the NIST Special Publications made mandatory by the FISMA. Compliance with the policy established by this Order is mandatory. 10. VoIP Policy. The integration of voice and data into a single physical network is a complex process that may introduce vulnerabilities and risk. In order to mitigate these risks, the following policy statements must be adhered to as stated below: a. VoIP systems and networks must adhere to a common security configuration recommended by the NIST Security Checklist Program ( the FCC, and FISMA security requirements. b. VoIP equipment used to transmit or discuss sensitive unclassified information must be protected with FIPS encryption standards and in accordance with FAA Order , Encryption Policy and FAA Order , Protecting Sensitive Unclassified Information. c. Use only cryptographic modules that are FIPS compliant and approved by the NIST Cryptographic Module Validation Program ( list to protect FAA SUI and SPII data in digital form. d. VoIP systems must follow the NIST SP security guidance on the separation of data and voice networks. 11. Roles and Responsibilities. All FAA organizations must comply with the roles and responsibilities per the FAA Order A, and carry out the additional responsibilities as follows: a. The FAA Chief Information Security Officer must (CISO): 2
3 (1) Oversee the VoIP security implementation and management process; (2) Develop the FAA VoIP security policy and approve LOB/SO VoIP security methodologies; (3) Review and approve the VoIP security implementation plans as submitted by the LOBs/SOs; and, (4) Ensure the FAA enterprise VoIP technologies are implemented in accordance with this Order. b. LOBs/SOs must: (1) Submit the VoIP security implementation plans to the CISO for approval. (2) Implement, manage, and maintain the VoIP security infrastructure; (3) Ensure the security implementation, management, and maintenance of the VoIP infrastructure is in accordance with this Order; (4) Develop internal security processes and procedures for the security implementation, management, and maintenance of the VoIP infrastructure; and (5) Ensure usage restrictions are documented for VoIP technology and equipment implemented within or utilized by a network or system. 12. Administrative Information. a. The FAA AIO/CIO can issue changes to the FAA Information Systems Security Program. The AIO/CIO s office approves changes that set policy, delegate authority, and assign responsibility. b. Each LOB/SO may develop additional guidance and procedures to ensure compliance with this Order. Any LOB/SO doing so must provide a copy of the supplement to this Order to the Director of AIS. All FAA organizations are encouraged to go beyond the requirements of this Order to address business, operational, or security needs, but the requirements of this Order must not be reduced. 13. Distribution. This Order is distributed to divisions in headquarters, regions, and centers with information systems or information systems security responsibility. Headquarters, regions, and centers must send this Order to all field offices and facilities within 30 days. David M. Bowen Assistant Administrator for Information Services and Chief Information Officer 3
4 Appendix A Appendix A. References Federal Management Regulation, Subchapter F, Part Telecommunications Management Policy. Federal Information Processing Standard (FIPS) 140-2, Security Requirements for Cryptographic Modules, May 2001 Federal Information Processing Standard (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems, December FIPS 200, Minimum Security Requirements for Federal Information and Information Systems, March NIST, SP , Recommended Security Controls for Federal Information Systems, December, 2007, Revision 2. NIST SP A, Guide for Assessing the Security Controls in Federal Information Systems, July NIST SP , Security Considerations for Voice over Internet Protocol, January NIST SP , Electronic Authentication Guideline, April 2006 FAA Order B, Protecting Personally Identifiable Information (PII), December 17, FAA Order A, FAA Information Systems Security Program, September 11, FAA Order Information Operations Conditions, August 25, FAA Order Internet Access Point Configuration Management, August 1, FAA Order , Patch Management, May 19, FAA Order , Encryption Policy, November 14, FAA Order , Protecting Sensitive Unclassified Information (SUI), February 1, A-1
5 Appendix B Appendix B. Definitions and Acronyms Interconnected VoIP Service. An interconnected Voice over Internet Protocol (VoIP) service is a service that provides IP-enabled voice service and (1) Enables real-time, two-way communications; (2) Requires a broadband connection for the user s location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits users generally to receive calls that originate on the public switched telephone network and to terminate calls to the public switched telephone network. Public Safety Answering Point (PSAP). The PSAP is the dispatch office that receives emergency calls from the public. A PSAP may be a local fire or police department, an ambulance service, or a regional office covering all services. Public Switched Telephone Network (PSTN). The world's collection of interconnected voiceoriented public telephone networks, both commercial and government-owned. It's the aggregation of circuit-switching telephone networks. Pseudo Automatic Number Identification (Pseudo-ANI). A number consisting of the same number of digits as ANI that is not a North American Numbering Plan telephone directory number and may be used in place of an ANI to convey special meaning. This special meaning assigned to the pseudo-ani is determined by agreements, as necessary, between the system originating the call, intermediate systems handling and routing the call, and the destination system. Sensitive Unclassified Information (SUI). SUI is any unclassified information in any form including: print, electronic, and visual and audio forms that must be protected from unauthorized disclosure outside of the FAA. The SUI is subject to limited, controlled distribution within the FAA as determined by the information steward. This includes personally identifiable information, aviation and homeland security, and protected critical infrastructure information, all of which may qualify for withholding from the public under the FOIA, 5 United States Code #552. Sensitive Personally Identifiable Information (SPII). SPII is the personally identifiable information that, if released for unauthorized use, is likely to result in substantial harm to the individual to whom such information relates. Voice over Internet Protocol (VoIP). VoIP is a general term for a family of transmission technologies for delivery of voice communications over the Internet or other packet-switched networks. This technology uses the Internet IP instead of traditional analog systems to transmit voice over packet-switched IP networks. VoIP systems carry telephony signals as digital audio encapsulated in a data-packet stream over IP. Wireline Network. A wired network, traditionally using copper wire or even fiber for transmission, as opposed to a wireless network, which uses radio frequencies to carry data. B-1
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
REMOTE ACCESS POLICY OCIO-6005-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER REMOTE ACCESS POLICY OCIO-6005-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III.
Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS
Department of Veterans Affairs VA Directive 6004 Washington, DC 20420 Transmittal Sheet September 28, 2009 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS 1. REASON FOR ISSUE: This Directive establishes
NASA Information Technology Requirement
NASA Information Technology Requirement NITR-2800-2 Effective Date: September 18,2009 Expiration Date: September 18, 2013 Email Services and Email Forwarding Responsible Office: OCIO/ Chief Information
Standards for Security Categorization of Federal Information and Information Systems
FIPS PUB 199 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Standards for Security Categorization of Federal Information and Information Systems Computer Security Division Information Technology
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
How To Get The Nist Report And Other Products For Free
National Institute of Standards and Technology (NIST) The Information Technology Lab Computer Security Division (893) Now What? What does NIST have for you to use and how do you get it? How do you contact
U.S. DEPARTMENT OF TRANSPORTATION FEDERAL AVIATION ADMINISTRATION. National Policy
CHANGE U.S. DEPARTMENT OF TRANSPORTATION FEDERAL AVIATION ADMINISTRATION National Policy ORDER 1280.1B CHG1 Effective Date: 08/16/2011 SUBJ: Protecting Personally Identifiable Information (Pll) 1. Purpose.
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
NIST Cyber Security Activities
NIST Cyber Security Activities Dr. Alicia Clay Deputy Chief, Computer Security Division NIST Information Technology Laboratory U.S. Department of Commerce September 29, 2004 1 Computer Security Division
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
MD 12.5 NRC CYBER SECURITY PROGRAM DT-13-15
U.S. NUCLEAR REGULATORY COMMISSION MANAGEMENT DIRECTIVE (MD) MD 12.5 NRC CYBER SECURITY PROGRAM DT-13-15 Volume 12: Approved By: Security R. W. Borchardt Executive Director for Operations Date Approved:
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan
Section 37.1 Purpose... 1. Section 37.2 Background... 3. Section 37.3 Scope and Applicability... 4. Section 37.4 Policy... 5
CIOP CHAPTER 37 Departmental Cybersecurity Policy TABLE OF CONTENTS Section 37.1 Purpose... 1 Section 37.2 Background... 3 Section 37.3 Scope and Applicability... 4 Section 37.4 Policy... 5 Section 37.5
NARA s Information Security Program. OIG Audit Report No. 15-01. October 27, 2014
NARA s Information Security Program OIG Audit Report No. 15-01 October 27, 2014 Table of Contents Executive Summary... 3 Background... 4 Objectives, Scope, Methodology... 7 Audit Results... 8 Appendix
FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS
TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2
FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL
FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL Clifton Gunderson LLP s Independent Audit of the Federal Housing Finance Agency s Information Security Program - 2011 Audit Report: AUD-2011-002
WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
United States Department of Agriculture Marketing and Regulatory Programs Grain Inspection, Packers and Stockyards Administration Directive GIPSA 3140.5 11/30/06 WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
Security Control Standard
Department of the Interior Security Control Standard Risk Assessment January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information
EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM MAINTENANCE PROCEDURES V1.8 JULY 18, 2012 1. PURPOSE The purpose of this procedure
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
Public Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
GENERAL TARIFF GENERAL TARIFF TERMS AND CONDITIONS. Glossary of Telecommunications Services. "2-800 Number" is a local Tollfree Number.
Page 1.1 GENERAL TARIFF TERMS AND CONDITIONS Glossary of Telecommunications Services For the purposes of this Tariff: "2-800 Number" is a local Tollfree Number. AUP means the Acceptable Use Policy issued
VERIZON COMMENTS REGARDING STAFF S LATEST DRAFT RULES FOR MULTILINE TELEPHONE SYSTEM ( MLTS ) 911 CALLS
VERIZON COMMENTS REGARDING STAFF S LATEST DRAFT RULES FOR MULTILINE TELEPHONE SYSTEM ( MLTS ) 911 CALLS Thank you for the opportunity to review Staff s draft revised proposed rules for Multiline Telephone
Office of Audits and Evaluations Report No. AUD-13-007. The FDIC s Controls over Business Unit- Led Application Development Activities
Office of Audits and Evaluations Report No. AUD-13-007 The FDIC s Controls over Business Unit- Led Application Development Activities September 2013 Executive Summary The FDIC s Controls over Business
White Paper VoIP Crash Phone Systems
White Paper VoIP Crash Phone Systems John Purnell March 1 st, 2015 Page 2 of 10 Contents 1.0 Executive Summary... 3 2.0 Abbreviations and Definitions... 3 3.0 What is a Crash Phone System?... 4 4.0 Technology
INTERCONNECTED VOIP REGULATORY COMPLIANCE MANUAL
INTERCONNECTED VOIP REGULATORY COMPLIANCE MANUAL Prepared and maintained by: The CommLaw Group www.commlawgroup.com 1420 Spring Hill Road, Suite 205 McLean, VA 22102 Regulatory Compliance Guide for Telecommunications
2 Voice over IP Network
2 Voice over IP Network VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 8 2.1 VoIP Network Elements...3 2.2 Single-Site VoIP Location...4 2.3 Multi-Site VoIP Location...5 2.4 PBX Networking
PREFACE TO SELECTED INFORMATION DIRECTIVES CHIEF INFORMATION OFFICER MEMORANDUM
PREFACE TO SELECTED INFORMATION DIRECTIVES CIO Transmittal No.: 15-010 CIO Approval Date: 06/12/2015 Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 CHIEF INFORMATION
Compliance and Industry Regulations
Compliance and Industry Regulations Table of Contents Introduction...1 Executive Summary...1 General Federal Regulations and Oversight Agencies...1 Agency or Industry Specific Regulations...2 Hierarchy
DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 CLOUD COMPUTING SERVICES
DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 Washington, DC 20420 Transmittal Sheet February 28, 2012 CLOUD COMPUTING SERVICES 1. REASON FOR ISSUE: This Directive establishes the Department of Veterans
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 05-32 July 2005 PROCESSING CLASSIFIED
KANSAS CORPORATION COMMISSION IP-to-IP Interconnection Report
KANSAS CORPORATION COMMISSION IP-to-IP Interconnection Report 2014 REPORT ON IP- TO- IP INTERCONNECTION A Summary of Status of the FCC s Internet Protocol- to- Internet Protocol Interconnection Proceeding
Excise Tax Advisory Excise Tax Advisories are interpretive statements authorized by RCW 34.05.230.
Excise Tax Advisories are interpretive statements authorized by RCW 34.05.230. ETA 3159.2011 Issue Date: May 20, 2011 Internet Protocol (IP) enabled telecommunications service taxability, sourcing, and
Nuclear Regulatory Commission Computer Security Office Computer Security Standard
Nuclear Regulatory Commission Computer Security Office Computer Security Standard Office Instruction: Office Instruction Title: CSO-STD-2105 Remote Access Security Standard Revision Number: 1.0 Effective
POLICY ON WIRELESS SYSTEMS
Committee on National Security Systems CNSSP No. 17 January 2014 POLICY ON WIRELESS SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION CHAIR
Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program
U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.
VoIP / SIP Planning and Disclosure
VoIP / SIP Planning and Disclosure Voice over internet protocol (VoIP) and session initiation protocol (SIP) technologies are the telecommunication industry s leading commodity due to its cost savings
Dr. Ron Ross National Institute of Standards and Technology
Managing Enterprise Risk in Today s World of Sophisticated Threats A Framework for Developing Broad-Based, Cost-Effective Information Security Programs Dr. Ron Ross National Institute of Standards and
EPA Classification No.: CIO-2150.3-P-02.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM AWARENESS AND TRAINING PROCEDURES V3.1 JULY 18, 2012 1. PURPOSE The purpose of this
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Centers for Disease and Prevention National Center for Chronic Disease Prevention and Health
Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
HOUSE BILL NO. 1395. A BILL for an Act to create and enact a new section to chapter 57-40.6 of the North Dakota
.0.000 Sixty-fourth of North Dakota HOUSE BILL NO. Introduced by Representatives J. Nelson, D. Johnson, Maragos Senator Oehlke A BILL for an Act to create and enact a new section to chapter -0. of the
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
TICSA. Telecommunications (Interception Capability and Security) Act 2013. Guidance for Network Operators. www.gcsb.govt.nz www.ncsc.govt.
TICSA Telecommunications (Interception Capability and Security) Act 2013 Guidance for Network Operators www.gcsb.govt.nz www.ncsc.govt.nz Contents Introduction...2 Overview of the Guidance...3 Focus of
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION CONTRACTOR SECURITY OF THE SOCIAL SECURITY ADMINISTRATION S HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 12 CREDENTIALS June 2012 A-14-11-11106
Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013
Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,
PSWN. Land Mobile Radio System Security Planning Template. Final. Public Safety Wireless Network
PSWN Public Safety Wireless Network Land Mobile Radio System Security Planning Template Final FOREWORD This document, presented by the Public Safety Wireless Network (PSWN) program, provides a template
Calling All Countries: The VoIP Revolution is Here!
Calling All Countries: The VoIP Revolution is Here! Panel: Sheba Chacko BT Global Services Tony Oliver Microsoft Corporation Andrew Powell Leap Wireless International, Inc. Agenda What is VoIP? Regulating
Regulation of New Technologies: IP Telephony and Next Generation Networks
Regulation of New Technologies: IP Telephony and Next Generation Networks By Lawrence S M KWAN Seminar on Next Generation Networks and Telecommunication Regulations WuXi, China 25 26 August 2004 1 Outline
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 AP-2/03-1
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 FISMA Legislation Overview (Public Law 107-347) Framework for ensuring effectiveness of Federal
DHS Sensitive Systems Policy Directive 4300A
DHS Sensitive Systems Directive 4300A Version 8.0 March 14, 2011 This is the implementation of DHS Management Directive 140-01 Information Technology System Security, July 31, 2007 DEPARTMENT OF HOMELAND
Which of the following types of phone service does your company use for its primary means of voice communications
VoIP and the SMBs - Tapping the Market By Matt Delpercio Despite the benefits of IP telephony, only a small percentage of small to medium businesses (SMBs) use VoIP as their primary means of voice communications.
ENTERPRISE VOICE SERVICE TERMS. Enterprise Voice Service Terms
Enterprise Voice Service Terms Contents 1. How these Service Terms work... 3 2. Our Obligations... 3 3. Your Obligations... 3 4. Emergency Calls... 4 5. Service Constraints... 4 6. Number Porting... 5
Barbados Voice over Internet Protocol (VoIP) Policy
Barbados Voice over Internet Protocol (VoIP) Policy Policy in accordance with sections 4 (2)(b) and 4 (2)(f) of the Telecommunications Act Cap 282B. This policy describes the terms and outlines the techniques
The State of 911 Webinar Series. National 911 Program January 24, 2013 12:00 PM
The State of 911 Webinar Series National 911 Program January 24, 2013 12:00 PM The National 911 Program designed this webinar series to provide a unique combination of useful tools, information about Federal
DEPARTMENT OF THE INTERIOR. Privacy Impact Assessment Guide. Departmental Privacy Office Office of the Chief Information Officer
DEPARTMENT OF THE INTERIOR Privacy Impact Assessment Guide Departmental Privacy Office Office of the Chief Information Officer September 30, 2014 Table of Contents INTRODUCTION... 1 Section 1.0 - What
IT Compliance in Acquisition Checklist v3.5 Page 1 of 7
IT Compliance in Acquisition Checklist v3.5 Page 1 of 7 Instructions: This IT checklist, with appropriate signatures, must be completed for Information Technology (IT) acquisitions within the Department
Security and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: [email protected] Abstract This paper address all
Telephone Charging System
Telephone Charging System Helsinki University of Technology Yao Yanjun Petteri Tulikoura Agenda Introduction Traditional telephone charging system Outdated Charging Charging Nowadays Future scenarios for
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
COMPLIANCE WITH THIS PUBLICATION IS MANDATORY. NOTICE: This publication is available digitally on the AFDPO WWW site at: http://afpubs.hq.af.mil.
BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 33-204 21 September 2001 Communications and Information INFORMATION ASSURANCE (IA) AWARENESS PROGRAM COMPLIANCE WITH THIS PUBLICATION IS
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
APPLICATION OF THE NEW EU REGULATORY FRAMEWORK TO IP TELEPHONY
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) APPLICATION OF THE NEW EU REGULATORY FRAMEWORK TO IP TELEPHONY Paris, March
Justice Management Division
Justice Management Division Privacy Impact Assessment for the Justice Unified Telecommunications Network (JUTNet) Voice Services System Issued by: Arthur E. Gary, General Counsel and Senior Component Official
INFORMATION SECURITY. Additional Oversight Needed to Improve Programs at Small Agencies
United States Government Accountability Office Report to Congressional Requesters June 2014 INFORMATION SECURITY Additional Oversight Needed to Improve Programs at Small Agencies GAO-14-344 June 2014 INFORMATION
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
ITL BULLETIN FOR AUGUST 2012
ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division
TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7
PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255
DOJ 2640.2F INFORMATION TECHNOLOGY SECURITY. Assistant Attorney General for Administration FOREWORD
DOJ 2640.2F Approval Date: November 26, 2008 Approved By: Distribution: Initiated By: LEE J. LOFTHUS Assistant Attorney General for Administration BUR/H-1; OBD/H-1; SPL-23 Department Chief Information
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
Guidelines on International Gateway Access and Voice over Internet Protocol (VoIP) Issued by the Nigerian Communications Commission
Guidelines on International Gateway Access and Voice over Internet Protocol (VoIP) Issued by the Nigerian Communications Commission 1. Background (1) The Nigerian Communications Commission ( the Commission
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2013 May 29, 2014 13-01391-72 ACRONYMS AND
Department of Homeland Security Management Directives System MD Number: 4500.1 Issue Date: 03/01/2003 DHS E-MAIL USAGE
Department of Homeland Security Management Directives System MD Number: 4500.1 Issue Date: 03/01/2003 DHS E-MAIL USAGE I. Purpose This directive establishes Department of Homeland Security (DHS) policy
NASA Information Technology Requirement
NASA Information Technology Requirement NITR 2810-17 Effective Date: November 12, 2008 Expiration Date: May 16, 2011 System Maintenance Policy and Procedures Responsible Office: Office of the Chief Information
Glossary of Terms and Definitions
Glossary of Terms and Definitions 911 Governing Authority 911 Governing Authority means a municipality or other state or local government agency, or an authorized agent of one or more municipalities or
SECURELINK.COM COMPLIANCE AND INDUSTRY REGULATIONS
COMPLIANCE AND INDUSTRY REGULATIONS INTRODUCTION Multiple federal regulations exist today requiring government organizations to implement effective controls that ensure the security of their information
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
Integrated Financial Management Information System (IFMIS) Merger
for the Information System (IFMIS) Merger DHS/FEMA/PIA-020 December 16, 2011 Contact Point Michael Thaggard Office of Chief Financial Officer (202) 212-8192 Reviewing Official Mary Ellen Callahan Chief
