Mercury's surface in "enhanced color," a color scheme created to emphasize color differences. This is not what Mercury would look like to the human eye, but by applying mathematical analysis to images, color differences can be accentuated beyond those visible to a person.
Mount Rushmore National Memorial under construction.
The workers had to endure conditions that varied from blazing hot to bitterly cold and windy. Each day they climbed 700 stairs to the top of the mountain to punch-in on the time clock. Then 3/8 inch thick steel cables lowered them over the front of the 500-foot face of the mountain in a "bosun chair." Despite the dangers, no one was killed during the project.
Otters in Glacier Bay National Park and Preserve, Alaska.
The sea otter population of Glacier Bay has increased dramatically in the past 20 years. Ecologists consider sea otters a keystone species here. Otters consume vast quantities of clams, urchins, crabs, and other invertebrates and their presence creates ripples through the ecosystem. NPS photo.
Every day someone like you becomes a wildland wildfire fighter, a teacher, a trail-builder, a museum curator, or a park ranger. Discover your opportunities in national parks. Come to play. Come to learn. Come to serve. Develop your environmental leadership skills. Find a job. Be the next generation to preserve and protect these great places.
With more than 80% of Americans living in urban areas, urban parks are more important than ever. The father of American landscape architecture, Frederick Law Olmsted, said of urban parks:
It is one great purpose of the Park to supply to the hundreds of thousands of tired workers, who have no opportunity to spend their summers in the country, a specimen of God's handiwork that shall be to them, inexpensively, what a month or two in the White Mountains or the Adirondacks is, at great cost, to those in easier circumstances.
Functions of the Information Assurance Division include:
Developing Enterprise IT Security policies, standards, guidelines and procedures
Ensuring the Confidentiality, Integrity and Availability of DOI Information and Systems
Oversight of System Assessments & Authorizations across the Department
Support for the Department's Cyber Security Assessment and Management (CSAM) system allowing for the oversight of A&A packages and Plan of Action and Milestone (POA&M) reporting
Management of Office of the Secretary (OS) POA&M items in CSAM
Developing an Enterprise Risk Management Framework
Establishing an Enterprise Continuous Monitoring Program
Developing Privacy Act policies, standards, guidelines and procedures
Identifying relevant IT infrastructure controls for implementation to meet Privacy Act requirements
The Information Assurance Division's revised structure is comprised of the following functional areas:
Enterprise IT Security Policy and Planning
Enterprise Assessment and Authorization Oversight
IT Security Education, Awareness and Training
IT Security Program Management including Information Technology Security Team (ITST) Coordination
IT Security Policy and Planning
DOI IT security policies are created to set management expectations for securing IT systems and ensuring clear guidelines are defined for system user behavior, and ensuring consistent system performance. They are necessary for compliance with federal mandates, such as the Federal Information Security Management Act (FISMA), Office of Management and Budget (OMB) memoranda and circulars, National Institute of Standards and Technology (NIST) guidance, and industry best practices.
Assessment and Authorization Management
Security accreditation is the official management decision given by a senior agency official to authorize operation of an information system and to explicitly accept the risk to agency operations, agency assets, or individuals based on the implementation of an agreed-upon set of security controls. Required by OMB Circular A-130, Appendix III, security accreditation provides a form of quality control and challenges managers and technical staffs at all levels to implement the most effective security controls possible in an information system, given mission requirements, technical constraints, operational constraints, and cost/schedule constraints. By accrediting an information system, an agency official accepts responsibility for the security of the system and is fully accountable for any adverse impacts to the agency if a breach of security occurs. Thus, responsibility and accountability are core principles that characterize security accreditation.
IT Security Education, Awareness and Training
Awareness training plays an important role in achieving the Department's goals for information security and privacy. Annual information security and privacy awareness training is provided to all DOI employees, and others who have access to DOI information systems. The training objectives are to enhance awareness of the threats to, and vulnerabilities of, information systems; and to encourage the use of good information security practices within the Department.
The Department established the IT Security Team (ITST) in January 2002. The Team's mission is to help ensure the successful implementation of the Office of Management and Budget (OMB) Circular A-130, Appendix III. The ITST is chaired by the DOI CISO with membership comprised of Bureau CISOs and representatives from the Inspector General's office. The team works on issues relating to information security such as policy, procedures, security technologies and reporting to oversight agencies.