NEC Banner US Army Logo
Network Enterprise Center - Fort Hamilton
Untitled Document
INFORMATION SUPPORT DIVISION

MISSION

           Our mission is to provide Fort Hamilton end users with highly reliable and dependable System Support services.  We aim at providing 99.99% uptime of all critical systems and services on which end users rely on in order to carry out their missions.

Below are the services provided by Information Support Division:

  • Provides core Network support which includes Local Area Network connectivity via cable and fiber, DOS server application support, OS security, access control, virus protection, data backups, redundancy support, and growth capacity.
  • Maintaining the email infrastructure and troubleshooting issues to ensure email service is readily available to all Fort Hamilton email account users.
  • Provides Blackberry Enterprise Server (BES) to Army customers to allow secure access to the Fort Hamilton email via the Blackberry wireless communication devices.
  • Operates the Customer Support Center providing Tier II and Tier I level support
  • Provides VPN secure access to the Fort Hamilton Campus Area Network (CAN). A VPN connection provides a means for a registered user of Fort Hamilton services to access those services from a remote location over a secure channel.
  • Provides Computer Imaging services - Operating System (OS) and standard software to desktop computer systems on the Fort Hamilton Network.
  • Provides web services support for the Fort Hamilton community. These services include the Fort Hamilton public Website, Fort Hamilton Intranet web portal, and Army AKO sites for both Mission and Garrison elements. Also provide for all web based application support, database development and support. Ensures that all web based applications are compliant with all DoD/OPSEC, DA regulations and directives.
  • Review and approve all IT hardware and software purchases on the installation.
Mission Statement: Our mission is to provide timely and quality world class support to service members and civilians by implementing and executing effective and efficient Command, Control, Communications, Computers, and Information Management (C4IM) common-user policies, standards, architectures, programs, plans and budgets for communications, visual information, information assurance, and automations support.
BUSINESS AND PLANS DIVISION HOURS OF OPERATIONS

The Network Enterprise Center - Fort Hamilton Business and Plans Division consists of three branches: Business Management Branch, Plans, Architecture and Service Operations Branch and the Logistics Branch.  The staff in these branches is responsible for providing technical, administrative, program management and support work to integrate Command, Control, Communications and Computers for Information Management (C4IM) services with business needs for the customer base serviced at the United States Army Garrison Fort Hamilton and its tenant organizations. Additionally, this division manages the organizational needs for security, personnel management, career management and logistics management.         

The Business and Plans Division oversees technical assignments of planning, preparation and negotiation of service level agreements, service declarations, operational level agreements, and underpinning contracts. This includes developing customer relationship management, development and maintenance of the activity based costing model, planning processes for C4IM capital investments, data collection of C4IM performance metrics and reporting performance measures the United States Army Information Technology Metrics.  This division is responsible to develop, design and manage of the information technology service continuity of operations plan (COOP).

301 General Lee Ave
Brooklyn NY 11209

Tel: 718.630.4091
DSN: 232.4426

Hours of Operation:
Mon-Fri 0730-1700
Closed on Federal Holidays
INFORMATION ASSURANCE DIVISION  

Information Assurance: Information assurance (IA) is the practice of managing information-related risks. More specifically, IA practitioners seek to protect and defend information and information systems by ensuring confidentiality, integrity, authentication, availability, and non-repudiation. These goals are relevant whether the information are in storage, processing, or transit, and whether threatened by malice or accident. In other words, IA is the process of ensuring that authorized users have access to authorized information at the authorized time. We emphasize strategic risk management over tools and tactics. In addition to defending against malicious hackers and code (e.g., viruses), IA includes other corporate governance issues such as privacy, compliance, audits, business continuity, and disaster recovery. Further, while information security draws primarily from computer science, IA is interdisciplinary and draws from multiple fields, including accounting, fraud examination, forensic science, management science, systems engineering, security engineering, and criminology, in addition to computer science. Therefore, IA is best thought of as a superset of information security. 

SIPRNET: The SIPRNet (Secret Internet Protocol Router Network) is a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information (up to and including information classified SECRET) by packet switching over the TCP/IP protocols in a "completely secure" environment. It also provides services such as hypertext documents and electronic mail. In other words, the SIPRNet is the DoD’s classified version of the civilian Internet together with its counterpart, the TOP SECRET and SCI Joint Worldwide Intelligence Communications System, JWICS. The NIPRNET is used to exchange sensitive but unclassified (SBU) information. Except for existing within a secure environment, the SIPRNet is virtually indistinguishable from the Internet to the user. Its chief visible difference is the domain name system, with almost all sites being under '.smil.mil' or '.sgov.gov' . Among its many features, computers cleared for SIPRNet access connect to the network via secure dial-up or LAN connections, access web pages written in standard HTML using a standard web browser, can upload and download files via FTP connections, and can send or receive email messages through SMTP services using any standard email client. All data transmitted on SIPRNet between secure facilities must be encrypted by approved NSA encryption systems. While the public Internet can be used to transmit encrypted SIPRNet packets ("SIPR over NIPR"), no access is permitted between the two networks.

COMSEC: Communications security (COMSEC): Measures and controls taken to deny unauthorized persons information derived from telecommunications and ensure the authenticity of such telecommunications. Communications security includes cryptosecurity, transmission security, emission security, traffic-flow security. and physical security of COMSEC equipment. 

  1. Cryptosecurity: The component of communications security that results from the provision of technically sound cryptosystems and their proper use. This includes ensuring message confidentiality and authenticity.
  2. Emission security (EMSEC): Protection resulting from all measures taken to deny unauthorized persons information of value which might be derived from intercept and analysis of compromising emanations from crypto-equipment, automated information systems (computers), and telecommunications systems.
  3. Physical security: The component of communications security that results from all physical measures necessary to safeguard classified equipment, material, and documents from access thereto or observation thereof by unauthorized persons.
  4. Traffic-flow security: Measures that conceal the presence and properties of valid messages on a network. It includes the protection resulting from features, inherent in some cryptoequipment, that conceal the presence of valid messages on a communications circuit, normally achieved by causing the circuit to appear busy at all times.
  5. Transmission security (TRANSEC): The component of communications security that results from the application of measures designed to protect transmissions from interception and exploitation by means other than cryptanalysis (e.g. frequency hopping and spread spectrum).  

“Note: All DoD users must take the annual DoD Information Assurance Awareness Training through the Fort Gordon website. Once logged on, click “Courses” in the top navigation banner and click “DoD Information Assurance Awareness Training”. Please ensure to read all three steps as described on the website before taking the training and exam. Army personnel must meet special requirements in order to receive full credit for the course.”

 

 

Information Support Division Business and Plans Division Information Assurance Division 7th Signal Command 93rd Signal Brigade iSalute
Contact us
 
Privacy Statement