![]() NSTSSI Security Education Standards |
8. GENERAL
a. Introductory
(1) explain information security problems which may occur at an access node;
(2) explain the property of accountability to include: traceability of activities to individual users;
assigning responsibility for violations, attempted violations, and activities;
(3) explain the purpose for the Assessed Products List (APL);
(4) define the term "approved circuit";
(5) discuss why authentication is an important process in INFOSEC to include:
(a) positive validation for a claimed identity which may be: station, originator, individual,
transmission, message, user, device;
(b) positive validation may also be called: identification or verification; and
(c) protective measure used to deter fraudulent transmissions.
(6) identify who is involved in the Authorization process (the DAA, his/her designee(s), and the
extent of their authority) in your organization;
(7) describe the resources and methods of an automatic message processing system; and
(8) list general operations security (OPSEC) principles and sources of information.
b. DAA Authority
(1) explain the objectives of the information systems security program: availability, denial of servi$
confidentiality, integrity;
(2) outline the business aspects of information security;
(3) describe the components of a classified COMSEC program;
(4) explain why compartmentalization is an important aspect of INFOSEC;
(5) describe how connectivity impacts both your systems and external systems;
(6) define the term "critical processing";
(7) identify critical systems within your purview;
(8) describe how criticality is a parameter which indicates the degree of dependence of your
organization on an asset;
(9) explain the purposes for a computer security working group;
(10) define the term "data owner";
(11) explain the purpose for degaussing magnetic media;
(12) explain why the disposition of classified data is important for secure processing;
(13) demonstrate the differences between INFOSEC education, training, and awareness (ET&A);
(14) illustrate how electronic data interchange (EDI) is susceptible to security incidents;
(15) describe the contents of the Evaluated Products List (EPL);
(16) outline the principles of ethics as they apply to INFOSEC;
(17) identify the ISSO in your agency;
(18) define the term "INFOWAR";
(19) outline the INFOSEC dangers in the National Information Infrastructure;
(20) compare open system security and closed security;
(21) describe operating system security features;
(22) define the term "platform specific security;"
(23) list the importance of maintaining professional interfaces;
(24) identify professional interfaces;
(25) illustrate the importance of quality assurance to INFOSEC;
(26) explain the importance of security architecture in a distributed system;
(27) list the forms in which security products are available: hardware, firmware, software;
(28) identify sensitive systems for which you are responsible;
(29) outline the components of technical security as listed in NSD 42: equipment, components,
devices, associated documentation, media;
(30) define the term "trust" as it applies to INFOSEC;
(31) apply the term "warranties (assurance)" to the concept of INFOSEC; and
(32) explain the consequences of improper or damaged cabling.