Information System Security

Information System Security

(Functional Area 7)

The security of information and computing resources at all organizational levels; including software/application and data security support, as well as disaster recovery planning and risk assessment.

Hardware/Software/Application Security Support

Disaster Recovery and Risk Assessment

Hardware/Software/Application Security Support

Description:

Strategies and solutions to defend hardware and software IT and telecommunications resources against adversaries such as viruses, worms and hackers for operating systems and applications in a mainframe, client/server, or networked environment.

Examples of Potential Services: 

The examples of services listed in this section are not all inclusive of the services available under the Master Contract.

Disaster Recovery and Risk Assessment

Description:

Disaster recovery planning and risk assessment in support of the mitigation of risks to IT and telecommunications systems and infrastructure. Through quantitative risk analyses establish recovery time and recovery point objectives, effective mitigation strategies, and documented disaster recovery plans. Assess adequacy of existing management, operational, and technical controls in safeguarding assets against waste, loss, unauthorized access/use, misappropriation to establish the consequences/impact of the potential threats on operations and service delivery requirements.

Examples of Potential Services: 

The examples of services listed in this section are not all inclusive of the services available under the Master Contract.