![]() |
CSRC Homepage Publications Homepage Special Publications page Table of Contents for Special Publication 800-12: Part I: Introduction & Overview Table of Contents Chapter 1 Introduction Chapter 2 Elements of Computer Security Chapter 3 Roles & Responsibilities Chapter 4 Common Threats: A Brief Overview Part II: Management Controls Chapter 5 Computer Security Policy Chapter 6 Computer Security Program Management Chapter 7 Computer Security Risk Management Chapter 8 Security & Planning in the Computer Security Life Cycle Chapter 9 Assurance Part III: Operational Controls Chapter 10 Personnel / User Issues Chapter 11 Preparing for Contingencies and Disasters Chapter 12 Computer Security Incident Handling Chapter 13 Awareness, Training and Education Chapter 14 Security Considerations in Computer Support and Operations Chapter 15 Physical and Environmental Security Part IV: Technical Controls Chapter 16 Identification and Authentication Chapter 17 Logical Access Control Chapter 18 Audit Trails Chapter 19 Cryptography Part V: Example Chapter 20 Assessing and Mitigating the Risks to a Hypothetical Computer System Interdependencies Cross Reference |
For
a printable copy of Chapter 1.
1.3 OrganizationThe first section of the handbook contains background and overview material, briefly discusses of threats, and explains the roles and responsibilities of individuals and organizations involved in computer security. It explains the executive principles of computer security that are used throughout the handbook. For example, one important principle that is repeatedly stressed is that only security measures that are cost-effective should be implemented. A familiarity with the principles is fundamental to understanding the handbook's philosophical approach to the issue of security. The next three major sections deal with security controls: Management Controls5(II), Operational Controls (III), and Technical Controls (IV). Most controls cross the boundaries between management, operational, and technical. Each chapter in the three sections provides a basic explanation of the control; approaches to implementing the control, some cost considerations in selecting, implementing, and using the control; and selected interdependencies that may exist with other controls. Each chapter in this portion of the handbook also provides references that may be useful in actual implementation.
Finally, an example is presented to aid the reader in correlating some of the major topics discussed in the handbook. It describes a hypothetical system and discusses some of the controls that have been implemented to protect it. This section helps the reader better understand the decisions that must be made in securing a system, and illustrates the interrelationships among controls. 1.4 Important Terminology
To understand the rest of the handbook, the reader must be familiar with the following key terms and definitions as used in this handbook. In the handbook, the terms computers and computer systems are used to refer to the entire spectrum of information technology, including application and support systems. Other key terms include: Computer Security: The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications). Integrity: In lay usage, information has integrity when it is timely, accurate, complete, and consistent. However, computers are unable to provide or protect all of these qualities. Therefore, in the computer security field, integrity is often discussed more narrowly as having two facets: data integrity and system integrity. "Data integrity is a requirement that information and programs are changed only in a specified and authorized manner."6 System integrity is a requirement that a system "performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system."7 The definition of integrity has been, and continues to be, the subject of much debate among computer security experts. Availability: A "requirement intended to assure that systems work promptly and service is not denied to authorized users."8 Confidentiality: A requirement that private or confidential information not be disclosed to unauthorized individuals.
1.5 Legal Foundation for Federal Computer Security ProgramsThe executive principles discussed in the next chapter explain the need for computer security. In addition, within the federal government, a number of laws and regulations mandate that agencies protect their computers, the information they process, and related technology resources (e.g., telecommunications).9The most important are listed below.
Note that many more specific requirements, many of which are agency specific, also exist. Federal managers are responsible for familiarity and compliance with applicable legal requirements. However, laws and regulations do not normally provide detailed instructions for protecting computer-related assets. Instead, they specify requirements -- such as restricting the availability of personal data to authorized users. This handbook aids the reader in developing an effective, overall security approach and in selecting cost-effective controls to meet such requirements. ReferencesAuerbach Publishers (a division of Warren Gorham & Lamont). Data Security Management. Boston, MA. 1995.British Standards Institute. A Code of Practice for Information Security Management, 1993. Caelli, William, Dennis Longley, and Michael Shain. Information Security Handbook. New York, NY: Stockton Press, 1991. Fites, P., and M. Kratz. Information Systems Security: A Practitioner's Reference. New York, NY: Van Nostrand Reinhold, 1993. Garfinkel, S., and G. Spafford. Practical UNIX Security. Sebastopol, CA: O'Reilly & Associates, Inc., 1991. Institute of Internal Auditors Research Foundation. System Auditability and Control Report. Altamonte Springs, FL: The Institute of Internal Auditors, 1991. National Research Council. Computers at Risk: Safe Computing in the Information Age. Washington, DC: National Academy Press, 1991. Pfleeger, Charles P. Security in Computing. Englewood Cliffs, NJ: Prentice Hall, 1989. Russell, Deborah, and G.T. Gangemi, Sr. Computer Security Basics. Sebastopol, CA: O'Reilly & Associates, Inc., 1991. Ruthberg, Z., and Tipton,
H., eds. Handbook of Information Security Management. Boston,
MA: Auerbach Press, 1993.
Footnotes: 1. It is recognized that the computer security field continues to evolve. To address changes and new issues, NIST's Computer Security Laboratory publishes the ITL Bulletin series. Those bulletins which deal with security issues can be thought of as supplements to this publication.2. Note that these requirements do not arise from this handbook, but from other sources, such as the Computer Security Act of 1987. 3. In the Computer Security Act of 1987, Congress assigned responsibility to NIST for the preparation of standards and guidelines for the security of sensitive federal systems, excluding classified and "Warner Amendment" systems (unclassified intelligence-related), as specified in 10 USC 2315 and 44 USC 3502(2). 4. As necessary, issues that are specific to the federal environment are noted as such. 5. the term management controls is used in a broad sense and encompasses areas that do not fit neatly into operational or technical controls. 6. National Research Council, Computers at Risk, (Washington, DC: National Academy Press, 1991), p. 54. 7. National Computer Security Center, Pub. NCSC-TG-004-88. 8. Computers at Risk p. 54 9. Although not listed, readers should be aware that laws also exist that may affect nongovernment organizations. |
|
Last
updated:
July 16, 2004
Disclaimer Notice & Privacy Policy Send comments or suggestions to CSRC Webmaster NIST is an Agency of the U.S. Commerce Department's Technology Administration |