![]() NSTSSI Security Education Standards |
10. Evaluate known vulnerabilities to ascertain if additional safeguards are needed (risk management) a. Threats E - define threats. (1) Human Threats E - describe how people can threaten a system's security; E - describe types of human threats to a system (insider, outsider, hacker, unauthorized user); I - identify suspicious activity on a system; A - proposes/develop countermeasures to identified threats; E - describe how industrial espionage can impact the security of an IS; and E - describe how international espionage can impact the security of an IS. (2) Environmental/Natural Threats E - describe the threat from electronic emanations; E - identify appropriate TEMPEST authorities; E - describe the threat from floods; I - identify flood countermeasures; E - describe the threat from fire; I - identify fire-related countermeasures; E - describe the threat from earthquake; I - identify earthquake-related countermeasures; E - describe the types of environmental controls (air conditioning, filtered power, etc.); and I - monitor the impact of environmental controls on systems operations. (3) Technological Threats (Commercial Off-The-Shelf (COTS), Development, Maintenance) E - define technological threats; I - identify the sources of technological threats: hardware, software (operating systems, applications, malicious code), firmware, networks (local area networks, wide area networks, metropolitan area networks, and direct connect); I - describe countermeasures to known threats/vulnerabilities; and I - propose new countermeasures to threats/vulnerabilities. (4) Security Reviews E - describe how security reviews can be used to identify threats to an IS. b. Vulnerability Analysis E - describe vulnerability analysis; E - assist in the performance of vulnerability analysis; I - conduct/perform vulnerability analysis; A - analyze the results of a vulnerability analysis; A - recommend fixes for deficiencies identified by the vulnerability analysis; and A - recommend approval/rejection to the DAA of a system based on vulnerability analysis. c. Countermeasures E - describe how countermeasures can reduce the impact of threats. (1) Evaluated Products E - define evaluated products/Evaluated Products List (EPL); E - know how to use evaluated products; I - integrate evaluated products into a system; and A - recommend evaluated products for use in a system. (2) Technical Surveillance Countermeasures E - describe technical surveillance countermeasures; I - monitor technical surveillance; A - recommend starting/stopping surveillance to the DAA; and A - develop procedures for performing surveillance. (3) Disaster Recovery E - define disaster recovery; E - describe the need for disaster recovery; I - review disaster recovery plans; and I - review results of annual tests of recovery plans. (4) Third Party Evaluation E - describe how third party evaluations can be used as a countermeasure; I - interpret results of third party evaluations; and A - recommend acceptance or rejection of system based on third party evaluation to the DAA. (5) Security Reviews E - discuss how security reviews can be used as a countermeasure; I - conduct annual security reviews; I - develop plans for annual security reviews; A - interpret results of annual security reviews; A - recommend changes to appropriate authorities; and A - develop policies for conducting security reviews. (6) Cost/Benefit Analysis E - define cost/benefit analysis; I - conduct cost/benefit analysis procedures; and A - recommend changes to the DAA based on results of a cost/benefit analysis. (7) Security Policies & Procedures E - describe how effective security policies and procedures can reduce threats to an IS; E - identify security policy-making bodies; I - write local guidance; and A - interpret policy and procedures. d. Risks E - define risk and residual risk (threat and vulnerability pairs). (1) Risk Assessment E - define risk assessment; and I - describe the risk assessment process to include: (a) risk assessment E - define information criticality; and I - estimate information criticality. (b) information states E - describe the three states of information. (c) information valuation E - define information valuation; and I - estimate information valuation. I - conduct risk assessments; I - write risk assessment reports; A - develop policy and procedures for conducting a risk assessment; A - coordinate resources to perform a risk assessment; and A - interpret results of a risk assessment. (2) Risk Acceptance E - define risk acceptance; I - describe the risk acceptance process; A - recommend actions to management based on risk acceptance; andA- recommend accreditation of a system to the DAA based on risk assessment.