Information Assurance Vulnerability Management Program
The combatant commands, services, agencies and field activities are required to implement vulnerability notifications in the form of alerts, bulletins, and technical advisories. USSTRATCOM via its sub-unified command USCYBERCOM has the authority to direct corrective actions, which may ultimately include disconnection of any enclave, or affected system on the enclave, not in compliance with the IAVA program directives and vulnerability response measures (i.e. communication tasking orders or messages). USSTRATCOM and USCYBERCOM will coordinate with all affected organizations to determine operational impact to the DoD before instituting a disconnection.
Read more about this topic: Information Assurance Vulnerability Alert
Famous quotes containing the words information, assurance, management and/or program:
“When action grows unprofitable, gather information; when information grows unprofitable, sleep.”
—Ursula K. Le Guin (b. 1929)
“The characteristic of the hour is that the commonplace mind, knowing itself to be commonplace, has the assurance to proclaim the rights of the commonplace and to impose them wherever it will.”
—José Ortega Y Gasset (18831955)
“Why not draft executive and management brains to prepare and produce the equipment the $21-a-month draftee must use and forget this dollar-a-year tommyrot? Would we send an army into the field under a dollar-a-year General who had to be home Mondays, Wednesdays and Fridays?”
—Lyndon Baines Johnson (19081973)
“Mormon colonization south of this point in early times was characterized as going over the Rim, and in colloquial usage the same phrase came to connote violent death.”
—State of Utah, U.S. public relief program (1935-1943)