LESSON 2
THE THREATS TO ARMY COMPUTERS AND SENSITIVITY DESIGNATIONS
CRITICAL TASK: NONE.
OVERVIEW
LESSON DESCRIPTION:
In this lesson you will learn the various threats to computers and the sensitivity designations assigned
to Army computers.
TERMINAL LEARNING OBJECTIVE:
ACTIONS:
Identify the three major types of threats to Army computers, define the threats to
Army computers, list and define the sensitivity designations, and assign a computer
to the correct sensitivity designation based on the information which will be
processed on it.
CONDITIONS:
You will be given narrative information and extracts from AR 380-19.
STANDARDS:
You will be able to provide advice and assistance to your commander and other
units in recognizing the threats to computer security and in assigning computers to
a sensitivity designation.
REFERENCES:
The material contained in this lesson was derived from the following publications:
AR 380-5
AR 380-19
AR 380-67
DOD 5200.22-M
FM 19-30
Part A: The Threats to Army Computers
Field Marshal A. V. Suvorov (1729-1800) said "we must know the enemy if we are to Protect ourselves
from him." If we are to protect our Army computers, we must know the threats to these computers. A
threat is any person, thing or event which can damage or destroy a computer or the information it
processes. There are three major types of threats to our computers, environmental, foreign
2-1
IT0772