Saturday, June 1, 2013

Week 12 final blog lessons learned

Wow this course has flown by.  It seems like we have covered so much in the past 12 weeks that we could not fit it all in.  Just by doing the process models it has opened my eyes to a lot of things that the military does to keep us safe while using government computers.  Unlike the company that we could have chosen to do our process model on, the DOD, uses specific processes to weed out potential breaches and pass them along.  You can look at what DISA reports every day and that will give you added insight on what is out there and you can adjust your process model if needed to be able to see what is going on and fit it into your model.  I know I caused a lot of confusion with the acronyms that I used, but I try and spell it out in my descriptions.  There is a calculated level of risk out there each time that you log in to your computer and that is why I try and use common sense on what I can do each time I am on the computer.  When I am at work I tend to only look at government sponsored web sites and e commerce sites that I know are legit.  The big thing to remember also is to look at the warning orders that DISA provides and adjust your daily tasks on your computer to not put yourself at risk.  You can fix some of the behaviours before they happen and it is very important to do so.  If you can prevent and attack before it happens then you are going to be successful in stopping cyber terror.  I have had a great time in this class and I look forward to seeing you all down the road in other classes and at graduation.  Thanks again.

No comments:

Post a Comment