LESSON 6
MISCELLANEOUS COMPUTER SECURITY REQUIREMENTS
CRITICAL TASK: 301-348-6001
OVERVIEW
LESSON DESCRIPTION:
In this lesson you will learn computer security training requirements, PC security measures, the
requirements that must be met before using an employee-owned computer in an Army office,
measures designed to prevent software piracy, and protection against malicious software.
TERMINAL LEARNING OBJECTIVE:
ACTIONS:
Identify who is responsible for computer security training within each unit,
recognize the extra security measures that are required for personal computers
(PCs), advise personnel of the restrictions against the use of privately-owned
computers, guard against the illegal copying of government-owned software, and
recognize the problems associated with malicious software.
CONDITIONS:
You will be given narrative information and extracts from AR 25-1, AR 380-5 and
AR 380-19.
STANDARDS:
You will be able to advise unit commanders, security managers, and ISSOs/TASOs
on computer security training requirements outlined in AR 380-19, and provide
advice and assistance to units concerning the unique security problems
associated with small computers, the use of employee-owned computers,
software piracy; and malicious software (viruses).
REFERENCES:
The material contained in this lesson was derived from the following publications:
AR 25-1
AR 380-5
AR 380-19
DOD 5200.22-M
FM 19-30
Part A: Security Training and Awareness
"There is an explosive situation brewing. On the one hand, the press, television, and movies make
heroes of vandals (hackers) by calling them whiz kids. On the other hand, the acts performed by
these kids will soon be punishable by years in prison.
6-1
IT0772