What is involved in Information assurance
Find out what the related areas are that Information assurance connects with, associates with, correlates with or affects, and which require thought, deliberation, analysis, review and discussion. This unique checklist stands out in a sense that it is not per-se designed to give answers, but to engage the reader and lay out a Information assurance thinking-frame.
How far is your company on its Information assurance journey?
Take this short survey to gauge your organization’s progress toward Information assurance leadership. Learn your strongest and weakest areas, and what you can do now to create a strategy that delivers results.
To address the criteria in this checklist for your organization, extensive selected resources are provided for sources of further research and information.
Start the Checklist
Below you will find a quick checklist designed to help you think about which Information assurance related domains to cover and 220 essential critical questions to check off in that domain.
The following domains are covered:
Information assurance, Anti-virus software, Business continuity, Business continuity planning, Computer emergency response team, Computer science, Corporate governance, Data at rest, Data in transit, Disaster recovery, Factor Analysis of Information Risk, Fair information practice, Forensic science, ISO/IEC 27001, ISO/IEC 27002, ISO 17799, ISO 9001, IT risk, Information Assurance Advisory Council, Information Assurance Collaboration Group, Information Assurance Vulnerability Alert, Information security, Management science, McCumber cube, Mission assurance, PCI DSS, Regulatory compliance, Risk IT, Risk Management Plan, Risk assessment, Risk management, Security controls, Security engineering, Systems engineering:
Information assurance Critical Criteria:
Understand Information assurance governance and tour deciding if Information assurance progress is made.
– Is there any existing Information assurance governance structure?
– Is Information assurance Required?
Anti-virus software Critical Criteria:
Grasp Anti-virus software issues and clarify ways to gain access to competitive Anti-virus software services.
– Does each mobile computer with direct connectivity to the internet have a personal firewall and anti-virus software installed?
– How do senior leaders actions reflect a commitment to the organizations Information assurance values?
– Is anti-virus software installed on all computers/servers that connect to your network?
– How will we insure seamless interoperability of Information assurance moving forward?
– Is the anti-virus software package updated regularly?
Business continuity Critical Criteria:
Design Business continuity goals and look at it backwards.
– Who will be responsible for leading the various bcp teams (e.g., crisis/emergency, recovery, technology, communications, facilities, Human Resources, business units and processes, Customer Service)?
– Has the organization established an enterprise-wide business continuity/disaster recovery program that is consistent with requirements, policy, and applicable guidelines?
– Marketing budgets are tighter, consumers are more skeptical, and social media has changed forever the way we talk about Information assurance. How do we gain traction?
– Do you have a written business continuity/disaster recovery plan that includes procedures to be followed in the event of a disruptive computer incident?
– Does our business continuity and/or disaster recovery plan (bcp/drp) address the timely recovery of its it functions in the event of a disaster?
– Do the response plans address damage assessment, site restoration, payroll, Human Resources, information technology, and administrative support?
– What programs/projects/departments/groups have some or all responsibility for business continuity/Risk Management/organizational resilience?
– Will Information assurance have an impact on current business continuity, disaster recovery processes and/or infrastructure?
– Which data center management activity involves eliminating single points of failure to ensure business continuity?
– How will management prepare employees for a disaster, reduce the overall risks, and shorten the recovery window?
– Does increasing our companys footprint add to the challenge of business continuity?
– Is the crisis management team comprised of members from Human Resources?
– Has business continuity thinking and planning become too formulaic?
– Has business continuity been considered for this eventuality?
– What is business continuity planning and why is it important?
– Do you have any DR/business continuity plans in place?
– What do we really want from Service Management?
– Do you have a tested IT disaster recovery plan?
Business continuity planning Critical Criteria:
Group Business continuity planning projects and forecast involvement of future Business continuity planning projects in development.
– Do we cover the five essential competencies-Communication, Collaboration,Innovation, Adaptability, and Leadership that improve an organizations ability to leverage the new Information assurance in a volatile global economy?
– What is the role of digital document management in business continuity planning management?
– What are the short and long-term Information assurance goals?
– What will drive Information assurance change?
Computer emergency response team Critical Criteria:
Interpolate Computer emergency response team goals and create Computer emergency response team explanations for all managers.
– Do you monitor security alerts and advisories from your system vendors, Computer Emergency Response Team (CERT) and other sources, taking appropriate and responsive actions?
– At what point will vulnerability assessments be performed once Information assurance is put into production (e.g., ongoing Risk Management after implementation)?
– What are the success criteria that will indicate that Information assurance objectives have been met and the benefits delivered?
– What new services of functionality will be implemented next with Information assurance ?
Computer science Critical Criteria:
Frame Computer science results and shift your focus.
– In a project to restructure Information assurance outcomes, which stakeholders would you involve?
– What is the purpose of Information assurance in relation to the mission?
– How to deal with Information assurance Changes?
Corporate governance Critical Criteria:
Talk about Corporate governance leadership and finalize specific methods for Corporate governance acceptance.
– What prevents me from making the changes I know will make me a more effective Information assurance leader?
– To what extent does management recognize Information assurance as a tool to increase the results?
Data at rest Critical Criteria:
Deliberate Data at rest outcomes and define Data at rest competency-based leadership.
– What is the source of the strategies for Information assurance strengthening and reform?
– Will Information assurance deliverables need to be tested and, if so, by whom?
Data in transit Critical Criteria:
Talk about Data in transit failures and drive action.
– Do those selected for the Information assurance team have a good general understanding of what Information assurance is all about?
– Why is Information assurance important for you now?
Disaster recovery Critical Criteria:
Have a session on Disaster recovery risks and assess what counts with Disaster recovery that we are not counting.
– The goal of a disaster recovery plan is to minimize the costs resulting from losses of, or damages to, the resources or capabilities of your IT facilities. The success of any database disaster recovery plan depends a great deal on being able to determine the risks associated with data loss. What is the impact to your business if the data is lost?
– The goal of a disaster recovery plan is to minimize the costs resulting from losses of, or damages to, the resources or capabilities of your IT facilities. The success of any disaster recovery plan depends a great deal on being able to determine the risks associated with data loss. What is the impact to our business if the data is lost?
– You work as a network administrator for mcrobert inc. the company has a tcp/ip-based network. which of the following information should be documented to facilitate disaster recovery?
– Has Management reviewed the adequacy of recovery team coverage for the Disaster Recovery and Business Continuation plan and the frequency of such reviews?
– How do we determine if damages are enough to warrant activation of all or part of the disaster recovery plan?
– Do you have a current balance sheet dated right before the disaster?
– Key customers and/or suppliers will be affected by the disaster?
– What is the most competent data recovery service in the us?
– Can your business change easily to react to outside forces?
– What is done with the data captured during an emergency?
– Insurance covering equipment replacement needs?
– Is cross cloud deployment really necessary?
– Will all of your accounting be restored?
– Postpone purchasing supplies/ inventory?
– What are ideal use cases for the cloud?
– How many data center sites do you have?
– Should relocation be an option?
– What is disaster recovery?
– What support is available?
– Any new equipment needs?
Factor Analysis of Information Risk Critical Criteria:
Graph Factor Analysis of Information Risk outcomes and figure out ways to motivate other Factor Analysis of Information Risk users.
– Think about the people you identified for your Information assurance project and the project responsibilities you would assign to them. what kind of training do you think they would need to perform these responsibilities effectively?
– Do the Information assurance decisions we make today help people and the planet tomorrow?
– What about Information assurance Analysis of results?
Fair information practice Critical Criteria:
Rank Fair information practice goals and find answers.
– Which customers cant participate in our Information assurance domain because they lack skills, wealth, or convenient access to existing solutions?
– What role does communication play in the success or failure of a Information assurance project?
– How does the organization define, manage, and improve its Information assurance processes?
Forensic science Critical Criteria:
Model after Forensic science visions and get answers.
– Does Information assurance systematically track and analyze outcomes for accountability and quality improvement?
– Is Information assurance Realistic, or are you setting yourself up for failure?
– What are the Key enablers to make this Information assurance move?
ISO/IEC 27001 Critical Criteria:
Grasp ISO/IEC 27001 goals and sort ISO/IEC 27001 activities.
– Does Information assurance create potential expectations in other areas that need to be recognized and considered?
– What are the Essentials of Internal Information assurance Management?
ISO/IEC 27002 Critical Criteria:
Have a meeting on ISO/IEC 27002 outcomes and budget the knowledge transfer for any interested in ISO/IEC 27002.
– Think about the kind of project structure that would be appropriate for your Information assurance project. should it be formal and complex, or can it be less formal and relatively simple?
– Are assumptions made in Information assurance stated explicitly?
ISO 17799 Critical Criteria:
Categorize ISO 17799 strategies and look at the big picture.
– Does our organization need more Information assurance education?
– How is the value delivered by Information assurance being measured?
– Why are Information assurance skills important?
ISO 9001 Critical Criteria:
Systematize ISO 9001 failures and forecast involvement of future ISO 9001 projects in development.
– Does a supplier having an ISO 9001 or AS9100 certification automatically satisfy this requirement?
– Meeting the challenge: are missed Information assurance opportunities costing us money?
– What are our Information assurance Processes?
IT risk Critical Criteria:
Reorganize IT risk failures and customize techniques for implementing IT risk controls.
– Do you standardize ITRM processes and clearly defined roles and responsibilities to improve efficiency, quality and reporting?
– By what percentage do you estimate your companys financial investment in ITRM activities will change in the next 12 months?
– Which factors posed a challenge to, or contributed to the success of, your companys ITRM initiatives in the past 12 months?
– Is there a need to use a formal planning processes including planning meetings in order to assess and manage the risk?
– Risk Documentation: What reporting formats and processes will be used for risk management activities?
– To what extent is your companys approach to ITRM aligned with the ERM strategies and frameworks?
– What best describes your establishment of a common process, risk and control library?
– Do you have an IT risk program framework aligned to IT strategy and enterprise risk?
– Could a system or security malfunction or unavailability result in injury or death?
– How does your company report on its information and technology risk assessment?
– Does the IT Risk Management framework align to a three lines of defense model?
– Do you have a common risk and control framework used across the company?
– Who performs your companys information and technology risk assessments?
– Does your IT risk program have GRC tools or other tools and technology?
– To what extent are you involved in IT Risk Management at your company?
– How important is the system to the user organizations mission?
– What is the purpose of the system in relation to the mission?
– What will we do if something does go wrong?
– Risk mitigation: how far?
– What could go wrong?
Information Assurance Advisory Council Critical Criteria:
Examine Information Assurance Advisory Council projects and work towards be a leading Information Assurance Advisory Council expert.
– How do we measure improved Information assurance service perception, and satisfaction?
– Can we do Information assurance without complex (expensive) analysis?
Information Assurance Collaboration Group Critical Criteria:
Be responsible for Information Assurance Collaboration Group engagements and differentiate in coordinating Information Assurance Collaboration Group.
– What are the usability implications of Information assurance actions?
– Is Supporting Information assurance documentation required?
– How do we go about Securing Information assurance?
Information Assurance Vulnerability Alert Critical Criteria:
Huddle over Information Assurance Vulnerability Alert planning and pay attention to the small things.
– Do we aggressively reward and promote the people who have the biggest impact on creating excellent Information assurance services/products?
– Have you identified your Information assurance key performance indicators?
– How much does Information assurance help?
Information security Critical Criteria:
Look at Information security tactics and figure out ways to motivate other Information security users.
– Does the information security function actively engage with other critical functions, such as it, Human Resources, legal, and the privacy officer, to develop and enforce compliance with information security and privacy policies and practices?
– Is the software and application development process based on an industry best practice and is information security included throughout the software development life cycle (sdlc) process?
– Do we maintain our own threat catalogue on the corporate intranet to remind employees of the wide range of issues of concern to Information Security and the business?
– Based on our information security Risk Management strategy, do we have official written information security and privacy policies, standards, or procedures?
– Do suitable policies for the information security exist for all critical assets of the value added chain (indication of completeness of policies, Ico )?
– Does this review include assessing opportunities for improvement, need for changes to the ISMS, review of information security policy & objectives?
– Do suitable policies for the information security exist for all critical assets of the value added chain (degree of completeness)?
– Are information security roles and responsibilities coordinated and aligned with internal roles and external partners?
– Is there an up-to-date information security awareness and training program in place for all system users?
– Have standards for information security across all entities been established or codified into law?
– Have standards for information security across all entities been established or codified into regulations?
– Ensure that the information security procedures support the business requirements?
– What is true about the trusted computing base in information security?
– What best describes the authorization process in information security?
– Is information security an it function within the company?
Management science Critical Criteria:
Differentiate Management science failures and differentiate in coordinating Management science.
– How do you determine the key elements that affect Information assurance workforce satisfaction? how are these elements determined for different workforce groups and segments?
– What are current Information assurance Paradigms?
– What is Effective Information assurance?
McCumber cube Critical Criteria:
Graph McCumber cube tactics and report on the economics of relationships managing McCumber cube and constraints.
– What are the barriers to increased Information assurance production?
Mission assurance Critical Criteria:
Revitalize Mission assurance issues and assess and formulate effective operational and Mission assurance strategies.
– Do Information assurance rules make a reasonable demand on a users capabilities?
PCI DSS Critical Criteria:
Generalize PCI DSS visions and point out PCI DSS tensions in leadership.
– What tools do you use once you have decided on a Information assurance strategy and more importantly how do you choose?
– What are our needs in relation to Information assurance skills, labor, equipment, and markets?
Regulatory compliance Critical Criteria:
Recall Regulatory compliance governance and oversee Regulatory compliance requirements.
– Does Information assurance include applications and information with regulatory compliance significance (or other contractual conditions that must be formally complied with) in a new or unique manner for which no approved security requirements, templates or design models exist?
– A compounding model resolution with available relevant data can often provide insight towards a solution methodology; which Information assurance models, tools and techniques are necessary?
– In the case of public clouds, will the hosting service provider meet their regulatory compliance requirements?
– Regulatory compliance: Is the cloud vendor willing to undergo external audits and/or security certifications?
– Have all basic functions of Information assurance been defined?
– What is Regulatory Compliance ?
Risk IT Critical Criteria:
Have a round table over Risk IT outcomes and check on ways to get started with Risk IT.
– What are the key elements of your Information assurance performance improvement system, including your evaluation, organizational learning, and innovation processes?
– Risk Probability and Impact: How will the probabilities and impacts of risk items be assessed?
Risk Management Plan Critical Criteria:
Look at Risk Management Plan visions and prioritize challenges of Risk Management Plan.
– Have you fully developed a Risk Management plan for any outsourcing agreement from inception to termination – for whatever reason?
– Has identifying and assessing security and privacy risks been incorporated into the overall Risk Management planning?
– Does Information assurance analysis show the relationships among important Information assurance factors?
– Has the risk management plan been significantly changed since last years version?
– Has the Risk Management Plan been significantly changed since last year?
– How do we Identify specific Information assurance investment and emerging trends?
– What can we expect from project Risk Management plans?
Risk assessment Critical Criteria:
Distinguish Risk assessment risks and grade techniques for implementing Risk assessment controls.
– what is the best design framework for Information assurance organization now that, in a post industrial-age if the top-down, command and control model is no longer relevant?
– Do we have a a cyber Risk Management tool for all levels of an organization in assessing risk and show how Cybersecurity factors into risk assessments?
– Are interdependent service providers (for example, fuel suppliers, telecommunications providers, meter data processors) included in risk assessments?
– Is the risk assessment approach defined and suited to the ISMS, identified business information security, legal and regulatory requirements?
– Does the risk assessment approach helps to develop the criteria for accepting risks and identify the acceptable level risk?
– Are standards for risk assessment methodology established, so risk information can be compared across entities?
– With Risk Assessments do we measure if Is there an impact to technical performance and to what level?
– What core IT system are you using? Does it have an ERM or risk assessment module; and if so, have you used it?
– How frequently, if at all, do we conduct a business impact analysis (bia) and risk assessment (ra)?
– Is the Information assurance organization completing tasks effectively and efficiently?
– How often are information and technology risk assessments performed?
– How are risk assessment and audit results communicated to executives?
– Are regular risk assessments executed across all entities?
– Are regular risk assessments executed across all entities?
– Who performs your companys IT risk assessments?
– Do you use any homegrown IT system for risk assessments?
– Are risk assessments at planned intervals reviewed?
Risk management Critical Criteria:
Be clear about Risk management management and look in other fields.
– Do we have a minimum baseline level of security that meets what we would consider good security hygiene?
– What information assets are most at risk to compromise or damage and what can happen to these assets?
– Do we leverage resources like the ESC2M2 or DOE Risk Management Process for Cybersecurity?
– Do we have sufficient processes in place to enforce security controls and standards?
– Does the addition of a new service add a professional liability exposure?
– Do governance and risk management processes address Cybersecurity risks?
– Do you adhere to, or apply, the ISO 31000 Risk Management standard?
– What high-level systems methods do we use in risk management?
– Does the board explore options before arriving at a decision?
– Is the Cybersecurity policy reviewed or audited?
– Are Cybersecurity responsibilities assigned?
– Vendor Risk Management, how much is enough?
– How do you justify a new firewall?
– Why do you want risk management?
– Do we have a back-up source?
– What s At Risk?
Security controls Critical Criteria:
Generalize Security controls decisions and inform on and uncover unspoken needs and breakthrough Security controls results.
– Are there multiple physical security controls (such as badges, escorts, or mantraps) in place that would prevent unauthorized individuals from gaining access to the facility?
– Does the cloud service agreement make its responsibilities clear and require specific security controls to be applied to the application?
– Are regular reviews of the effectiveness of the ISMS (including meeting of ISMS policy and objectives and review of security controls) undertaken?
– Do the security controls encompass not only the cloud services themselves, but also the management interfaces offered to customers?
– Can the cloud service provider demonstrate appropriate security controls applied to their physical infrastructure and facilities?
– Do we have policies and methodologies in place to ensure the appropriate security controls for each application?
– How do we make it meaningful in connecting Information assurance with what users do day-to-day?
– Is the measuring of the effectiveness of the selected security controls or group of controls defined?
– Does the cloud service provider have necessary security controls on their human resources?
– Have vendors documented and independently verified their Cybersecurity controls?
– Do we have sufficient processes in place to enforce security controls and standards?
– What are the known security controls?
Security engineering Critical Criteria:
Talk about Security engineering decisions and change contexts.
– What business benefits will Information assurance goals deliver if achieved?
Systems engineering Critical Criteria:
Co-operate on Systems engineering management and mentor Systems engineering customer orientation.
– When we try to quantify Systems Engineering in terms of capturing productivity (i.e., size/effort) data to incorporate into a parametric model, what size measure captures the amount of intellectual work performed by the systems engineer?
– What constraints apply, either in the nature and scope of our design effort (time, cost, funding, and other resources) or in the nature (size, cost, weight, etc.) of our solution?
– Regarding the way the system is formed and operates and the scale of interest; e.g., are we interested in complexity at the level of atoms or of cells or of organs?
– How do you know that your project team members are following the documented cm processes to establish the baseline and control changes to it?
– How much testing is necessary in order to expose all the potential failure modes and situations of highly integrated complex systems?
– What is the plan to align prime contractors systems engineering management plan (semp) with the Program Management office (pmo) sep?
– What approach will permit us to deal with the kind of unpredictable emergent behaviors that dynamic complexity can introduce?
– How will we know when our design effort has produced a solution which will satisfy the objectives within the constraints?
– Is the project using any technologies that have not been widely deployed or that the project team is unfamiliar with?
– Is sufficient schedule time allocated to allow for dependencies on commercial off-the-shelf cots product deliveries?
– What is the structure of the different information aspects on the interface?
– What will happen if there is a loss of key staff or contractor personnel?
– What is the sequence of activities that will be performed?
– What is the geographic and physical extent of the system?
– How do functions occur between parts of the system?
– Who are the stakeholders involved with the system?
– How will functionality be verified and validated?
– What are the flows between parts of the system?
– What parts are connected to each other?
– How much architecting is enough?
This quick readiness checklist is a selected resource to help you move forward. Learn more about how to achieve comprehensive insights with the Information assurance Self Assessment:
Author: Gerard Blokdijk
CEO at The Art of Service | http://theartofservice.com
Gerard is the CEO at The Art of Service. He has been providing information technology insights, talks, tools and products to organizations in a wide range of industries for over 25 years. Gerard is a widely recognized and respected information expert. Gerard founded The Art of Service consulting business in 2000. Gerard has authored numerous published books to date.
To address the criteria in this checklist, these selected resources are provided for sources of further research and information:
Information assurance External links:
Job Title: INFORMATION ASSURANCE SPECIALIST
Title Information Assurance Jobs, Employment | Indeed.com
Information Assurance Training Center
Anti-virus software External links:
Removing a Virus Without Using Any Anti-virus Software…
Sophos Anti-Virus Software | IT Connect
Business continuity External links:
What is business continuity? | The BCI
Login – Business Continuity Office
Business continuity planning External links:
Business Continuity Planning Flashcards | Quizlet
Business Continuity Planning – BCP
Online Business Continuity Planning – Wells Fargo …
Computer emergency response team External links:
Tz Cert – Tanzania Computer Emergency Response Team
CERT-GH – Ghana Computer Emergency Response Team
Computer science External links:
k12cs.org – K–12 Computer Science Framework
TEALS – Computer Science in Every High School
Computer Science and Engineering
Corporate governance External links:
Corporate Governance – About Us | Aetna
Weinberg Center for Corporate Governance
Corporate Governance – Investopedia
Data at rest External links:
What is data at rest? – Definition from WhatIs.com
What is data at rest? – Definition from WhatIs.com
Data in transit External links:
Physical Security for Data in Transit – TCDI
Disaster recovery External links:
SCDRO – South Carolina Disaster Recovery Office
National Disaster Recovery Framework | FEMA.gov
Recovers – Community-Powered Disaster Recovery
Factor Analysis of Information Risk External links:
FAIR means Factor Analysis of Information Risk – All …
ITSecurity Office: FAIR (Factor Analysis of Information Risk)
Factor Analysis of Information Risk | Bigueur’s Blogosphere
Fair information practice External links:
[PDF]1973: The Code of Fair Information Practices
[PDF]FIPPs Fair Information Practice Principles
Forensic science External links:
Forensic Science Program – Eastern Kentucky University
State of Delaware – Delaware Division of Forensic Science
ISO/IEC 27001 External links:
http://ISO/IEC 27001:2013 is an information security standard that was published on the 25th September 2013. It supersedes ISO/IEC 27001:2005, and is published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) under the joint ISO and IEC subcommittee, ISO/IEC JTC 1/SC 27.
ISO/IEC 27002 External links:
ISO/IEC 27002 code of practice
ISO/IEC 27002 – Key Benefits of MetricStream IT GRC …
http://ISO/IEC 27002 is an information security standard published by the International Organization for Standardization (ISO) and by the International Electrotechnical Commission (IEC), titled Information technology – Security techniques – Code of practice for information security management.
ISO 17799 External links:
What is ISO 17799? – ISO 17799 Implementation Portal
ISO 17799 Section 7: Physical and Environmental Security
ISO 9001 External links:
Home – ISO 9001 certified custom sheet extruder — Pacur
IT risk External links:
Magic Quadrant for IT Risk Management Solutions
Information Assurance Vulnerability Alert External links:
Information Assurance Vulnerability Alert – RMF for DoD IT
Information security External links:
Federal Information Security Management Act of 2002 – NIST
Title & Settlement Information Security
Management science External links:
Management Science and Engineering
Management Science – Official Site
Management science (Book, 1990) [WorldCat.org]
McCumber cube External links:
McCumber Cube Flashcards | Quizlet
Mccumber Cube – Term Paper
McCumber Cube: Key Aspects by Aaron Haglund on Prezi
Mission assurance External links:
[PDF]Department of Defense Mission Assurance Strategy
[PDF]About Us Mission Assurance – IMSolutions, LLC
Mission Assurance Jobs, Employment | Indeed.com
PCI DSS External links:
PCI Compliance Guide about PCI DSS | PCICompliance…
Regulatory compliance External links:
Regulatory Compliance Certification School | CUNA
Regulatory Compliance Association Reviews – …
Regulatory Compliance Consulting for Money Managers
Risk IT External links:
Risk It On Brisket Recipe – Allrecipes.com
Risk Management Plan External links:
How to Develop a Risk Management Plan | Chron.com
Risk Management Plan (RMP) Rule | US EPA
[PDF]Sample Risk Management Plan for a Community …
Risk assessment External links:
Risk Assessment | OEHHA
Risk Assessment : OSH Answers
[PDF]Deliberate Risk Assessment Worksheet – United …
Risk management External links:
Education Risk Management | Edu Risk Solutions
20 Best Title:(risk Management Manager) jobs (Hiring …
Celgene Risk Management
Security engineering External links:
Blockchain Protocol Analysis and Security Engineering …
Systems engineering External links:
Industrial & Systems Engineering | College of Engineering
Systems Engineering and Operations Research
Systems Engineering | IT Services Company | …