IATAC, Information Assurance Technology Center, is technical IT firms that provide quality technical and scientific information to assist in the Information Assurance operations in the defensive operations, and assist in upgrading Cyber security. The Defense department sponsors IATAC to provide the Department with the latest technological advancements. Defense Technical Information Centre, DTIC, manage DOD. The DOD staff includes highly trained engineers, scientists and personnel qualified in IACs. The staff provides and maintains detailed knowledge on technical, historical, scientific, and information that helps the department in providing quality services. According to Path (2012), the staff collects classified information and data, which help, develop analytical techniques and tools that improve the DOD. The tools the DOD develops to enhance their work include Inverse Path TPOL and Safety- Lab security Scanner.
The Inverse Path TPOL designs and implements software that is secure and of quality IT infrastructure that are effective for security purposes in the DOD. Path (2012) asserts that TPOL provides reliable security products that enhance the adaptability, effective and flexible security services that improve DOD security. TPOL has many advantages. TPOL acts as UNIX baseline, hence enabling the tool to detect any flaws in OVAL system. This improves the quality of the security system. It upgrades the DOD systems enabling effective security in the department. Users import OVAL systems that enable them detect any abnormality in the network. Users also export and edit any vulnerability in the security system. This function improves the quality of security services in the DOD department. Path (2012) confirms that using TPOL users can scan all networks regardless of the size of the enterprise. This ensures upgrading of security within the DOD. However, TPOL is extremely expensive to design and install. It takes a unusually long period to develop the system.
Safety lab provides integrated systems for computer and internet security. The company develops software that tackles network issues like software architecture, security audit, threat analysis and the systems detect and fix any vulnerability. According to Lab (2011), one of the advantages of the Safety- Lab is that it can perform a minimum of 10 hosts in each network session. This ensures the effective and comprehensive security details. Designers the tool and save it in PDF, XML and HTML formats. This enables non- users to use the tool to enhance security. The disadvantage of this tool is that it can be hacked, and this interferes with the effectiveness in its operations.
I would use these tools to enhance the security of firms. According to Path (2012), the systems provide the best operating systems in enhancing security.
References
Lab, S. (2011, June 23). Safety- lab. Retrieved October 1, 2012, from safety- lab. Com:
htt://ww.safety-lab.com
Path, I. (2012, September 3). Inverse Path corporation. Retrieved October 1, 2012, from Inverse
Path Web site: hhtp://www.inversepath/product
.