Performance And Accountability Report - Fiscal Year 2013 - Federal Aviation Administration - U.s. Department Of Transportation Page 52

ADVERTISEMENT

Information Security
cyber incident is measured in hours, with each system’s ISCP
Ensure no cyber security event significantly degrades or
documenting the maximum tolerance for downtime in hours. If
disables a mission-critical FAA system.
this calculation results in a positive number, then the incident is
FY 2013
Ensure no cyber security event significantly degrades or
Target
counted as an event.
disables a mission-critical FAA system.
FY 2013
0
Today’s electronically-networked environment requires that the
Result
FAA’s more than 300 computer systems be secure. In FY 2013,
Public
The public benefits from an efficient, safe and secure
with zero cyber events that significantly degraded or disabled any
Benefit
national airspace with no disruption of services.
mission-critical FAA systems, we resoundingly met our goal. FAA
employees were able to continue to provide, and the flying public
The FAA operates one of the most complex aviation systems
continued to benefit from, the safest, most efficient aviation
in the world—consisting of thousands of people, procedures,
system in the world.
facilities, and equipment—that results in safe and expeditious
Our compliance program meets federal, departmental, and
air travel. Successful operation of the national aviation system
agency policies that require the regular testing and evaluation of
depends upon our ability to continuously track the position,
information security policies, procedures, and practices. During
routes of flight, and movement of aircraft. Unfortunately,
FY 2013, we completed a comprehensive assessment of our
attackers seek to exploit the critical infrastructure behind this
security systems to ensure that policies were being correctly
capability. Through cyber events (attacks conducted through
implemented and were providing full protection to all parts of the
computers), they persist in attempts to disrupt critical services by
agency.
exploiting software, hardware, and network infrastructure flaws.
The future of information security at the FAA calls for continuous
How is the number of events determined? The computation of
refinement of agency services, clarification and implementation
a cyber event is based on the time the system is not available,
of additional performance measures, and increased use of new
minus the maximum tolerance for downtime in the system’s
technologies to protect the agency and the flying public.
information security contingency plan (ISCP). The time for each
Information Security
Number of cyber security events that significantly degrade or disable a mission-critical FAA system
FY 2007
FY 2008
FY 2009
FY 2010
FY 2011
FY 2012
FY 2013
Actual
0
0
0
0
0
0
0
Target
0
0
0
0
0
0
0
Target
Achieved?
50
|
|
Federal Aviation Administration
Fiscal Year 2013
Performance and Accountability Report

ADVERTISEMENT

00 votes

Related Articles

Related forms

Related Categories

Parent category: Business