COMPUTER SECURITY OVERVIEW
CRITICAL TASK: NONE.
In this lesson, you will learn the fundamental theory underlying computer security.
TERMINAL LEARNING OBJECTIVE:
Identify and define the four sub-disciplines (sub-securities) included in Information
Systems Security, define sensitive defense information, and identify computer
security responsibilities and appointments
You will be given narrative information and extracts form AR 380-19.
You will be able to provide security advice and assistance for local units in
accordance with the provisions of AR 380-19.
The material contained in this lesson was derived from the following publications:
The Automated Systems Security Incident Support Team (ASSIST) of the Defense Information
Systems Agency (DISA) tested the vulnerability of 12,000 DOD host computers in the unclassified
domain. They found that 1-3% of the systems had exploitable front doors and that 88% could be
penetrated by network trust relationships. Only 4% of the penetrations were detected and, of those,
only 5% reported.