Home
Download PDF
Order CD-ROM
Order in Print
Home
>
Intelligence Reference and Training Manuals
>
> US Army Intelligence Center
Lesson 1. Computer Security Overview Critical Task
Why Systems are Vulnerable
Part B: How does computer security involve you?
Part E: Information Systems Security
Part F: Major Security Objectives
Part G: Sensitive Defense Information
Part H: Responsibilities and Appointments
Part J: Security Officers
ISS Personnel Hierarchy
Lesson 1. Practice Exercise
Lesson 1. Practice Exercise Answer Key and Feedback
Lesson 2. The Threats to Army Computers and Sensitivity Designations Critical task
The Environmental Threat.
Part B: Methods of Attack.
Part C: Sensitivity Designations
Unclassified Sensitive One (US1)
Lesson 2. Practice Exercise
Lesson 2. Practice Exercise Answer Key and Feedback
Lesson 3. Security Processing Modes and Accrediation
Part C: The four security processing modes
Part E: Accreditation
Part H: Designated Accreditation Authorities
Part J. Classified Sensitive One (CS1)
Part N. Nonsensitive
Part P: Reaccreditation
Part Q: The Accreditation Statement
Figure 3-1, AR 380-19 Sample format of an accreditation statement
Part R: Accreditation Variations
Figure 3-2. Example Accreditation Statement Variation.
Part S: Interim Approval to Operate Before Accreditation
Part T: Accreditation Problems and Corrective Action
Part T: Accreditation Problems and Corrective Action - Continued
Figure 3-4. Accreditation Matrix
Lesson 3. Practice Exercise
Lesson 3. Practice Exercise Answer Key and feedback
Lesson 4. Protecting Computer Storage Media Critical Task
Part C: Hazards to Computer Storage Media
Part D: Damage to Computer Storage Media
Part G: Technologies of Computer Protection
Cryptography
Intrusion detection/monitoring
Lesson 4. Practice Exercise
Lesson 4. Practice Exercise Answer Key and Feedback
Lesson 5. Safeguarding Classified Information
Part B: Basic Safeguards for Classified Information
Part D: Marking Classified Storage Media
Making Floppy Disks
Part F: Disposing of Computer-Based Classified Information
Part J: Approved Methods for Purging Computer Media
Part K. Declassifying Computer Media
Part M: Destruction of Storage Media
Part N: Other Classified Material
Part O: Recommended Procedures for Processing Classified Information
Lesson 5. Practice Exercise
Lesson 5. Practice Exercise Answer Key Feedback
Lesson 6. Miscellaneous Computer Security Requirements
Part B: Who is Responsible?
Part E: Periodic Security Training
Part G: Physical Protection
Part H: Environmental Protection
Part J: Software Piracy
Software End-User License Agreement
Part K: Malicious Software
Part M: Infection Protection
Lesson 6. Practice Exercise
Lesson 6. Practice Exercise Answer and Feedback
US Army Intelligence Center