As the designated computer security office, the end-user may expect certain services from our office. Our office is available during regular business hours for any procedural questions that may concern the user. The computer security office is available should problems arise that the user feels cannot be rectified without some outside assistance. Typically this can manifest itself in situations such as the discovery of a virus on a system or a question concerning the proper disposal of any IS equipment or storage media.
In addition to our user support, accreditation and training activities, the IS Security Office is actively involved in system test and monitoring of various activities on NRL networks and is responsible to respond to various IS related incidences. Our networks are constantly bombarded by off-site hacker/cracker penetration attempts, as well as susceptibility to virus attacks.
In our network monitor and test role, we provide a quick response capability as well as actively evaluating and continually upgrading network security protection measures for system manager and user. Incidence response functions will be covered later in this document.