LESSON 1
COMPUTER SECURITY OVERVIEW
CRITICAL TASK: NONE.
OVERVIEW
LESSON DESCRIPTION:
In this lesson, you will learn the fundamental theory underlying computer security.
TERMINAL LEARNING OBJECTIVE:
ACTIONS:
Identify and define the four sub-disciplines (sub-securities) included in Information
Systems Security, define sensitive defense information, and identify computer
security responsibilities and appointments
CONDITIONS:
You will be given narrative information and extracts form AR 380-19.
STANDARDS:
You will be able to provide security advice and assistance for local units in
accordance with the provisions of AR 380-19.
REFERENCES:
The material contained in this lesson was derived from the following publications:
AR 380-5
AR 380-19
AR 380-67
AR 381-20
DOD 5200.224M
FM 19-30
FM 101-5
INTRODUCTION
The Automated Systems Security Incident Support Team (ASSIST) of the Defense Information
Systems Agency (DISA) tested the vulnerability of 12,000 DOD host computers in the unclassified
domain. They found that 1-3% of the systems had exploitable front doors and that 88% could be
penetrated by network trust relationships. Only 4% of the penetrations were detected and, of those,
only 5% reported.
1-1
IT0772