Information Systems Risk Management: SATCOM Term Paper by JCowie024

Information Systems Risk Management: SATCOM
A look at risk management.
# 128229 | 1,322 words | 8 sources | APA | 2010 | US
Published on Jul 06, 2010 in Computer and Technology (Technology)

$19.95 Buy and instantly download this paper now


This paper covers the subject of information risk management in general and in the military in particular. It includes information regarding the ability to identify threats and vulnerabilities and discusses how to develop strategies and implementations to minimize the risks.

Principles of Information Risk Management
Risk Assessment and Management
SATCOM Vulnerabilities
External and Internal Threats
Appropriate Levels of Security
Intrusion Detection Systems
Securing and Encrypting Networks
Identity Management

From the Paper:

"All organizations including the military are exposed to uncertainties. Managing these uncertainties is not an easy task especially when the protection of an information security system is at stake. The principles of information risk management include the ability to identify threats and vulnerabilities. Once the threats and vulnerabilities have been indentified, it is important to develop strategies and implement them to keep them from being exploited."

Sample of Sources Used:

  • Baddlely, A. (2005). Secure Personal Communications on the Battlefield. Retrieved from:
  • Bain, M. (2009). 3 basic steps to thwart most cyber attacks, courtesy of NSA. Retrieved from:
  • Buenneke, R. (2005, December). Commercial SATCOM Protection Performance Criteria [PowerPoint slides]. Retrieved from
  • Elky, S. (2006). Introduction to Information System Risk Management. Retrieved from:
  • Erwin, S. (2003). 'No Single Solution' for Army's Info-Tech Problems. Retrieved from:

Cite this Term Paper:

APA Format

Information Systems Risk Management: SATCOM (2010, July 06) Retrieved April 21, 2024, from

MLA Format

"Information Systems Risk Management: SATCOM" 06 July 2010. Web. 21 April. 2024. <>