Contact Information

Uniformed Services University of the Health Sciences
Office of the Chief Information Officer
4301 Jones Bridge Road
Bethesda, Maryland 20814

Timothy J. Rapp
Room A2027

Organizational Chart

USU Courtyard

Information Assurance & Computer Network Defense

What is IA?

Information operations that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.

What does this mean?

  • Availability - Making sure the computer and the information is there when we need it
  • Integrity - Making sure the information we use, transmit, process, or stored has not been corrupted or adversely manipulated.
  • Authentication - Making sure we know who is using our computers and accessing our data.
  • Confidentiality - Making sure the information is protected from disclosure.
  • Non-repudiation - Making sure the information is tagged so when we send it - we know it got there, and the recipient knows who sent it.

Why do we need IT Security?

  • Every user should be aware of the need for computer and network security
  • Computer and network security is more important when sharing services
  • Most of our users utilize DOD systems that are monitored
  • The commercial network must also be protected
  • DOD requires that networks, servers, and operations be certified
  • DOD policy requires annual information assurance awareness training
  • We need to emphasize important security tasks and acceptable user practices

Quick Links

IA Tools

FTC on Spam Email

IA Training