Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy CSC 382 Introduction to Information Assurance (Online) Online Comments This is an online course. The following information is very important. CSC 382 is the capstone course for CSC/CIS majors receiving CNSS 4011. It is also the prerequisite for students starting the CNSS 4012 course sequence. An awareness of the materials is the goal. You will be responsible for a number of readings and Cyber Security Training modules (see http://www.teexwmdcampus.com/index.k2?locRef=1) . The workload is reasonable but continuous. I will not accept any late submissions and you are expected to follow instructions. If you have questions, contact me at once (see contact information below). If you have trouble with BlackBoard or using the Hampton University intranet system, contact me immediately. Course Description An introduction to the various technical and administrative aspects of Information Security and Assurance. This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. The purpose of the course is to provide the student with an overview of the field of Information Security and Assurance. Students will be exposed to the spectrum of Security activities, methods, methodologies, and procedures. Coverage will include inspection and protection of information assets, detection of and reaction to threats to information assets, and examination of pre- and post-incident procedures, technical and managerial responses and an overview of the Information Security Planning and Staffing functions. INSTRUCTOR: Mr. Robert A. Willis Jr. Office: ST 120 Telephone: 757-727-5556 Office Hours: MWF 9:00 – 11:00 TR Contact: 11:00 – 1:00 E-Mail: robert.willis@hamptonu.edu Skype: rwjr1944 1 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy Twitter: rwjr1944 Course Objectives: After completing the course, students will be able to: Identify and prioritize information assets. Identify and prioritize threats to information assets. Define an information security strategy and architecture. Plan for and respond to intruders in an information system Describe legal and public relations implications of security and privacy issues. Present a disaster recovery plan for recovery of information assets after an incident. Minimum Competencies: Students meeting minimum competencies should expect to receive a grade between 74% and 77%. Minimum competencies for this course are as follows: Identify and prioritize information assets. Identify and prioritize threats to information assets. Define an information security strategy and architecture. Plan for and respond to intruders in an information system Describe legal and public relations implications of security and privacy issues. Course Topics: This course will cover most of the information assurance concepts including: Introduction to Information Security (3 hours) The Need for Security (3 hours) Legal, Ethical, and Professional Issues in Information Security (3 hours) Risk Management (3 hours) Planning for Security (3 hours) Technology: Firewalls, VPNs, IDS, and Access Control (3 hours) Cryptography (3 hours) Physical Security (3 hours) Implementing Security (3 hours) Security and Personnel (3 hours) Information Security Maintenance (3 hours) Supplement Materials (contents from the optional textbooks) (3 hours) Laboratory (9 hours) Mapping to CNSSI 4011 can be found here. Textbooks: 2 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy (required) Principle of Information Security, 3rd edition, Michael E. Whitman & Herbert J. Mattord, Thomson, 2009. (on reserve for required readings) The CISSP Prep Guide: Mastering the CISSP and ISSEP Exams, 2nd edition, Ronald L. Krutz and Russell Dean Vines, Wiley, 2004. (on reserve for required readings) Security in Computing, 3rd edition, C. P. Pfleeger, S. L. Pfleeger, Prentice Hall, 2003. Supplemental Materials (SM): Materials not available via the Internet are posted on BlackBoard (SM-1) Maconachy, Schou, Ragsdale and Welch, A Model for Information Assurance: An Integrated Approach, Proceedings of the 2001 IEEE Workshop on IAS, USMA, West Point, NY 56 June 2001. (required reading) (SM-2) NSTISSAM TEMPEST/1 & 2 - 95, December 1995 (some required readings) (SM-3) Operations Security (OPSEC), Joint Publication 3-13.3, 29 June, 2006 (some required readings). (SM-4) HUMINT, http://en.wikipedia.org/wiki/HUMINT (some required reading) (SM-5) Technical Surveillance Countermeasures Program, Department of Defense, Number 5240.05, Feb. 22, 2006 (some required reading) (SM-6) NASA COMSEC Procedures and Guidelines, NPG 1600.6A, Effective Date: March 2, 2000, Expiration Date: March 2, 2002 (some required reading) (SM-7) Automated Information Systems (AIS) Security, Department of Veterans Affairs, VHA Directive 6210, Transmittal Sheet, March 7, 2000 (some required reading) (SM-8) Automated Information Systems Security Policy, U.S. Customs Service, Office of Information and Technology (some required reading) (SM-9) Security Standard Operating Procedure No. 4, SSOP NO.4, NAVAL COMMAND, CONTROL, AND OCEAN SURVEILLANCE CENTER (some required reading) (SM-10) Personnel Security Standard, Virginia's Community College, http://system.vccs.edu/its/InformationSecurityProgram/PersonnelSecurityStandard.htm (some required reading) (SM-11) Personnel Security, University of Mary Washington, http://www.umw.edu/policies/itsecurityprogram/personnel_security/default.php (some required reading) (SM-12) Standard Practice Procedures for Security Service, George Mason University, http://www.gmu.edu/departments/universityoperations/SPP%20-%20REV%20Feb%202008.pdf (some required reading) (SM-13) Security Mechanism, RBC bank, http://www.rbcbankusa.com/privacy_security/cid101718.html (some required reading) 3 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy (SM-14) Software Security Policy, Purdue University, http://www.purdue.edu/securepurdue/standards/softwareSecurity.cfm (some required reading) (SM-15) Audit Trials, HP, http://docs.hp.com/en/5992-3387/ch10s05.html (some required reading) (SM-16) Audit Logging Security Standards, IRS, http://www.irs.gov/irm/part10/ch01s05.html (some required reading) (SM-17) Defending Medical Information Systems Against Malicious Software, Joint NEMA/COCIR/JIRA Security and Privacy Committee (SPC), http://www.himss.org/content/files/medical-defendingNEMAwhitepaper.pdf (some required reading) (SM-18) Declassification and Downgrading, Army Regulation 280-5, Chapter 3, http://www.fas.org/irp/doddir/army/ar380-5/iii.htm (some required reading) (SM-19) Using Context- and Content-Based Trust Policies on the Semantic Web, Christian Bizer & Radoslaw Oldakowski, In Proceeding of WWW2004, May 17-22, 2004, New York, NY, USA, www4.wiwiss.fu-berlin.de/bizer/SWTSGuide/p747-bizer.pdf (some required reading) (SM-20) Input Signal Rage Guidance, www.altra.com, http://www.altera.com/literature/wp/wp_edge_rate_guidance.pdf (some required reading) (SM-21) Design of an intelligent materials data base for the IFR, Transactions of the American Nuclear Society ; Vol/Issue: 65; American Nuclear Society annual meeting; 7-12 Jun 1992; Boston, MA (United States); DOE Project, http://www.osti.gov/energycitations/product.biblio.jsp?osti_id=7232432 (some required reading) (SM-22) An Introduction to Computer Security - The NIST Handbook, http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf (some required reading) Tentative Course Outline: Please note that this is an online course and that the schedule will be followed. You are expected to follow the schedule. Week Topics Text chapters Tests / Assignments 1 1. Introduction to Information Security Whitman Ch1 & HW1 1.1. The History of Information Security Krutz Ch11, 12 & 1.2. What is Security / Information Security? 1.3. Critical Characteristics of Information Security? 4 SM-1 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy 1.4. NSTISSC Security Model 1.5. Information Assurance Model (Maconachy, Schou, Ragsdale (MSR) Cube) (Supplemental Materials SM-1) 1.6. Components of an Information System 1.7. Securing Components 1.8. Balancing Information Security and Access 1.9. Approaches to Information Security Implementation 1.10. The Systems Development Life Cycle 1.11. The Security Systems Development Life Cycle 1.12. Systems Life Cycle Processes, Certification, and Accreditation (Krutz Ch11, Ch12) 1.13. Security Professionals and the Organization 1.14. Communities of Interest 1.15. Information Security: Is it an Art or a Science? 1.16. Information Security Terminology 2 2. The Need for Security Whitman Ch2 & 2.1. Business Needs First Krutz Ch6 & 2.2. Threats SM-3, SM-4, SM-13, 2.3. Attacks SM-14 2.4. OPSEC Process (Operations Security) (Krutz Ch6 & Supplemental Material SM- 5 HW2 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy 3) 2.5. OPSEC Surveys / OPSEC Planning (Operations Security) (Krutz Ch6 & Supplemental Material) 2.6. Unclassified Indicators (Operations Security) (Krutz Ch6 & Supplemental Material SM-3) 2.7. HUMINT (Krutz Ch6, Supplemental Materials SM-4) 2.8. Media Processes - Attribution, Destruction, Classification, Sanitization, Transportation, Inventory (Krutz Ch6) 2.9. Security Software Development (Whitman Ch2, Supplemental Materials SM-13, SM14) 3 3. Legal, Ethical, and Professional Issues in Information Security Whitman Ch3 & HW3 Krutz Ch9 3.1. Law and Ethics in Information Security 3.2. Types of Law 3.3. Relevant U.S. Laws 3.4. International Laws and Legal Bodies 3.5. Policy versus Laws 3.6. Ethics and Information Security 3.7. Codes of Ethics and Professional Organizations 3.8. evidence collection and preservation (Krutz Chapter 9) 4 Laboratory 1 Review TBA 6 Exam 1 TBA Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy 5 4. Risk Management Whitman Ch4 & 4.1. An Overview of Risk Management Krutz Ch1 4.2. Risk Identification 4.3. Risk Assessment 4.4. Risk Control Strategies 4.5. Selecting a Risk Control Strategy 4.6. Risk Management Discussion Points 4.7. Documenting Results 4.8. Recommended Practices in Controlling Risk 4.9. National Threats, Vulnerabilities, Countermeasures, Risk Management, and other facets of NSTISS (Krutz Ch1) 6 5. Planning for Security Whitman Ch5 & 5.1. Information Security Policy, Standards, and Practices Krutz Ch1, Ch3 & 5.2. Telecommunication Systems, Telecommunications Policies and Security, Contracts and Reference, Vulnerabilities, Threats, Countermeasures (Krutz Ch3) 5.3. Security Policies Implementation (Krutz Ch1) 5.4. The Information Security Blueprint 5.5. Security Education, Training, and Awareness Program 5.6. Continuity Strategies 5.7. AIS Security Policy (Supplemental 7 SM-6, SM-7, SM-8, SM-9 HW4 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy Materials SM-7 & SM-8) 5.8. Security Standard Operating Procedure (Supplemental Materials SM-9) 5.9. COMSEC (Supplemental Materials SM-6) 7 6. Security Technology Whitman Ch6, Ch7 & 6.1. Physical Design Pfleeger Ch3, Ch4, Ch5 6.2. Computer Security - Access Control, Audit, Identification and Authentication, operating system security, trusted operating system, and Object Reuse (Pfleeger Ch3, Ch4, Ch5) HW5 & SM-5 6.3. Firewalls 6.4. Protecting Remote Connection 6.5. Introduction Detection Systems 6.6. Honey Pots, Honey Nets, and Padded Cell Systems 6.7. Scanning and Analysis Tools 6.8. Access Control Devices 6.9. Technical Surveillance Countermeasures (Supplemental Materials SM-5) 8 7. Whitman Ch8 Cryptography 7.1. A Short History of Cryptology 7.2. Principles of Cryptography 7.3. Cryptography Tools 7.4. Protocols for Secure Communications 7.5. Attacks on Cryptosystems 8 Exam 2 – TBA Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy 9 8. Whitman Ch9 Physical Security 8.1. Physical Access Control HW7 Laboratory 2 8.2. Fire Security and Safety 8.3. Failure of Supporting Utilities and Structural Collapse 8.4. Interception of Data 8.5. Mobile and Portable Systems 8.6. Special Consideration for Physical Security Threats 10 9. Implementing Information Security Whitman Ch10 & 9.1. Project Management for Information Security Krutz Ch5, Ch6 HW8 9.2. Technical Topics of Implementation 9.3. Nontechnical Aspects of Implementation 9.4. Operations Security (Krutz Ch6) 9.5. Security Architectures and Design 11 Whitman Ch11 & 10. Security and Personnel 10.1. The Security Function Within an Organization's Structure Krutz Ch1, Ch6 & 10.2. Positioning and Staffing the Security Function 10.3. Credentials of Information Security Professionals 10.4. Employment Policies and Practices 10.5. Security Considerations for Nonemployees 10.6. Separation of Duties and Collusion (Krutz Ch1, Ch6) 9 SM-10, SM-11, SM-12 HW9 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy 10.7. Privacy and the Security of Personnel Data 10.8. Information Classification Roles (Krutz Ch1) 10.9. Personnel Security Standard (Supplemental Materials SM-10, SM-11, SM-12) 12 Whitman Ch12 Laboratory 3 11. Information Security Maintenance 11.1. Managing for Change 11.2. Security Management Models 11.3. The Maintenance Model Digital Forensics 13 12. TEMPEST Security (Supplemental Materials SM-2) SM-2 12.1. Introduction 12.2. Definition 12.3. RED/BLACK Installation Recommendation 12.4. Guidance for TEMPEST Integrity 12.5. Secure Voice Systems 12.6. Sensitive Compartment Information Important Dates: TBA The following information applies to all students in the School of Science: 10 HW10, Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy In addition to the minimum grade requirements established by Hampton University, all majors within the School of Science must pass all required courses offered within the School of Science with a grade of “C” or better in order to satisfy degree requirements. The minimum grade requirement is in effect for all science courses taken during Fall 2001 and beyond. Course Assignment and Calendar: Homework Assignments: There are two types of homework assignments: problems and projects. Both of them will be issued and specified with their due date in Blackboard. Problems will be used to evaluate the understanding of course materials and projects will be used to evaluate the complexity of algorithm studied in class. All of the projects must be implemented by Java in Unix/Linux environments (when appropriate). Late submissions will not be accepted and will be counted as zero. Final Exam The exam will be given on the date scheduled by the registrar. The exam will be comprehensive. There are no exemptions from the exam. TBA Attendance Hampton University’s attendance policy will be observed, which means that you are expected to attend all classes as scheduled. You are responsible for any assignments, deliveries, and class discussions at all times. I will take attendance at the beginning of each class period. If you are not present for the roll call, attendance points will be deducted from your grade. I will not tolerate habitual tardiness; it is disruptive and unfair to your fellow students. Writing-Across-The-Curriculum Hampton University adopts the policy in all courses of “writing across the curricula”. In this course, the objectives will be achieved by homework assignments, program comments, and various tests. The Ethics Paper: Details about the ethics paper will be provided at least one month prior to the due date. The ethics paper will be graded based on the criteria listed in “Hampton University Scoring Rubric”. Grades The final grade of this course will be determined by the combined weight of following components: 11 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy Examinations (2) 20 % Homework (10) 40 % Laboratory (3) 15% Ethics Paper 5% Final exam (Comprehensive) 20 % Course grades will follow the scale of the university grading system: A+ 98-100 A 94-97 A- 90-93 B+ 88-89 B 84-87 B- 80-83 C+ 78-79 C 74-77 C- 70-73 D+ 68-69 D 64-67 D- 60-63 12 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy F Below 60 Make-Up Policy: No make-up tests will be given without pervious arrangements, a written medical excuse, or an emergency approved by appropriate university official. Policy on Academic Dishonesty: Please see page 29 of the Student Handbook. Cheating: A student caught cheating on an examination or plagiarizing a paper which forms a part of a course grade shall be given an "F" in the course and will be subject to dismissal from the University, A student is considered to be cheating if, in the opinion of the person administering an examination (written or oral), the student gives, seeks, or receives aid during the process of the examination; the student buys, sells, steals, or otherwise possesses or transmits an examination without authorization; or, the student substitutes for another or permits substitution for himself/ herself during an examination. All cases of cheating shall be reported by the instructor to the chair of the department in which the cheating occurred, to the school dean/division director and to the Provost. No penalty shall be imposed until the student has been informed of the charge and of the evidence upon which it is based and has been given an opportunity to present his/her defense. If the faculty member and the student cannot agree on the facts pertaining to the charge, or if the student wishes to appeal a penalty, the issue may be taken to the department chair. Each party will present his/her case to the chair who shall then call a meeting of all involved parties. If the issue is not resolved at the departmental level, the dean shall conduct a hearing. If the issue is not resolved at the school level either party may appeal the decision at the school level to the Provost who shall convene the appropriate individuals and conduct a hearing in order to resolve the issue. Plagiarism: Plagiarism is defined as "taking and using as one's own the writing or ideas of another." All materials used to meet assigned written requirements of a course, from any source, must be given proper credit by citing the source. A student caught plagiarizing a paper which forms a part of a course grade shall be given an "F" in the course and will be subject to dismissal from the University. PENALTIES FOR ACADEMIC DISHONESTY Cases of academic dishonesty are initially investigated and reported by members of the instructional faculty to the chairperson of the department in which the cheating occurred, to the school dean, division director and to the Provost. Also, penalties for minor violations of academic dishonesty are to be recommended at the discretion of the instructor. The penalties for academic dishonesty on examinations and major course requirements may include one of the following: 1. A grade of "F" on the examination or project. 2. A grade of "F" on the examination or project and dismissal from the course. 13 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy 3. A grade of “F” on the examination or project, dismissal from the course and from the University. When dismissal from the University is the recommended penalty, the chairman of the department submits the details of the case to the Provost who schedules a hearing. ADMINISTRATIVE ACTION The Provost has the authority to dismiss or expel any student who fails to meet scholarship requirements or to abide by academic regulations. Dress Code: This code is based on the theory that learning to select attire appropriate to specific occasions and activities is a critical factor in the total educational process. Understanding and employing the Hampton University Dress Code will improve the quality of one’s life, contribute to optimum morale, and embellish the overall campus image. It also plays a major role in instilling a sense of integrity and an appreciation for values and ethics as students are propelled towards successful careers. Students will be denied admission to various functions if their manner of dress is inappropriate. On this premise students at Hampton University are expected to dress neatly at all times. The following are examples of appropriate dress for various occasions: 1. 2. 3. 4. 5. Classroom, Cafeteria, Student Union and University Offices – casual attire that is neat and modest. Formal programs in Ogden Hall, the Convocation Center, the Student Center Ballroom, the Little Theater and the Memorial Chapel – event appropriate attire as required by the event announcement. Interviews – Business attire. Social/Recreational activities, Residence hall lounges (during visitation hours) – casual attire that is neat and modest. Balls, Galas, and Cabarets – formal, semi-formal and after five attire, respectively. Examples of inappropriate dress and/or appearance include but not limited to: 1. 2. 3. 4. Do-rags, stocking caps, skullcaps and bandannas are prohibited at all times on the campus of Hampton University (except in the privacy of the student’s living quarters). Head coverings and hoods for men in any building. Baseball caps and hoods for women in any building. a. This policy item does not apply to headgear considered as a part of religious or cultural dress. Midriffs or halters, mesh, netted shirts, tube tops or cutoff tee shirts in classrooms, cafeteria, Student Union and offices; 14 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy 5. 6. 7. 8. 9. Bare feet; Short shirts; Shorts, all types of jeans at programs dictating professional or formal attire, such as Musical Arts, Fall Convocation, Founder’s Day, and Commencement; Clothing with derogatory, offensive and/or lewd message either in words or pictures; Men’s undershirts of any color worn outside of the private living quarters of the residence halls. However, sports jerseys may be worn over a conventional tee-shirt. Procedure for Cultural or Religious Coverings 1. 2. 3. Students seeking approval to wear headgear as an expression or religious or cultural dress may make a written request for a review through the Office of the Chaplain. The Chaplain will forward his recommendation the Dean of Students for final approval. Students that are approved will then have their new ID card picture taken by University Police with the headgear being worn. All administrative, faculty and support staff members will be expected to monitor student behavior applicable to this dress code and report any such disregard or violations to the Offices of the Dean or Men, or Dean of Women for the attention of the Dean of Students. CODE OF CONDUCT Joining the Hampton Family is an honor and requires each individual to uphold the policies, regulations, and guidelines established for students, faculty, administration, professional and other employees, and the laws of the Commonwealth of Virginia. Each member is required to adhere to and conform to the instructions and guidance of the leadership of his/her respective area. Therefore, the following are expected of each member of the Hampton Family: 1. To respect himself or herself. 2. To respect the dignity, feelings, worth, and values of others. 3. To respect the rights and property of others and to discourage vandalism and theft. 4. To prohibit discrimination, while striving to learn from differences in people, ideas, and opinions. 5. To practice personal, professional, and academic integrity, and to discourage all forms of dishonesty, plagiarism, deceit, and disloyalty to the Code of Conduct. 6. To foster a personal professional work ethic within the Hampton University Family. 7. To foster an open, fair, and caring environment. 15 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy 8. To be fully responsible for upholding the Hampton University Code. Students with disabilities which require accommodations should (1) register with the Office of Testing Services and 504 Compliance to provide documentation and (2) bring the necessary information indicating the need for accommodation and what type of accommodation is needed. This should be done during the first week of classes or as soon as the student receives the information. If the instructor is not notified in a timely manner, retroactive accommodations may not be provided. DISCLAIMER This syllabus is intended to give the student guidance in what may be covered during the semester and will be followed as closely as possible. However, the professor reserves the right to modify, supplement and make changes as course needs arise. 16 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy Hampton University Scoring Rubric The Hampton University Advisory Council of the Writing Program has approved and recommended the use of the scoring rubric as a guide for evaluating student-writing performance across the curriculum. 6 A paper in this category: States purpose (e.g., position or thesis) insightfully, clearly and effectively Provide thorough, significant development with substantial depth and persuasively marshals support for position Demonstrates a focused, coherent, and logical pattern of organization Displays a high level of audience awareness Use disciplinary facts critically and effectively Has support control of diction, sentence structure, and syntactic variety, but may have a few minor flaws in grammar, usage, punctuation, or spelling Documents sources consistently and correctly using a style appropriate to the discipline 5 A paper in this category: States purpose (e.g., position or thesis) clearly and effectively Provide development with some depth and complexity of thought and supports position convincingly Demonstrates effect pattern of organization Displays a clear sense of audience awareness Use disciplinary facts effectively Has good control of diction, sentence structure, and syntactic variety, but may have a few minor errors in grammar, usage, punctuation, or spelling Documents sources correctly using a style appropriate to the discipline 4 A paper in this category: States purpose (e.g., position or thesis) adequately Provides competent development with little evidence of complexity of thought Demonstrates an adequate pattern of organization Displays some degree of audience awareness Uses disciplinary facts adequately 17 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy Has adequate control of diction, sentence structure, and syntactic variety, but may have some error in grammar, usage, punctuation, or spelling Documents sources adequately using a style appropriate to the discipline 3 A paper in this category: States purpose (e.g., position or thesis) but with varying degree of clarity Provides some development for most ideas Demonstrates some pattern of organization, but with some lapses from the pattern Displays uneven audience awareness Uses some disciplinary facts Has some control of diction, sentence structure, and syntactic variety, but may have frequent error in grammar, usage punctuation, or spelling Documents sources using a style appropriate to the discipline, but may have errors. 2 A paper in this category: States purpose (e.g., position or thesis) unclearly Provides inadequate development of thesis Demonstrates inconsistent pattern of organization Displays very little audience awareness Uses disciplinary facts ineffectively Has little control of diction, sentence structure, and syntactic variety, and may have a pattern of errors in grammar, usage, punctuation, or spelling Acknowledges sources but does not document them using a style appropriate to the discipline 1 A paper in this category: Fails to state purpose (e.g., position or thesis) Fails to develop most ideas Lacks a pattern of organization Displays no audience awareness Use few or no disciplinary facts Lakes control of diction, sentence structure, and syntactic variety, with a pattern of errors in grammar, usage, punctuation, or spelling 18 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy Fails to document or acknowledge sources 19 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy Mapping to NSTISSI 4011 Standard C. Security Basics (Awareness Level) Instructional/Behavioral Content a Using the Comprehensive Model of Information Systems Security, introduce a comprehensive model of information systems security that addresses: * The student will list and describe the elements of AIS security. Topic 1.2-1.3 Pg. 8-9 Whitman * The student will summarize security disciplines used in protecting government automated information systems. Topic 1.2-1.7 Pg. 8-17 Whitman b critical characteristics of information information states, and security measures. * Student will give examples of determinants of critical information. Topic 1.2-1.8 Pg. 3-18 Whitman Topical Content a INFOSEC Overview: Chapter 2: The Need for Security Whitman * threats Topic 2.2, Chapter 2: Threats Pg. 38- 59 Whitman * vulnerabilities Topic 2.2, 2.3, 4.9, Whitman Chapter 2: Attacks Pg. 60-68 / Krutz Chapter1: Information Security and Risk Management Pg. 28 Whitman + Krutz 20 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy * critical information characteristics + Chapter 1: Introduction Whitman confidentiality Topic 1.2-1.5, Chapter 1: Confidentiality Pg. 10 Whitman + integrity Topic 1.2-1.5, Chapter 1: Integrity Pg. 12 Whitman + availability Topic 1.2-1.5, Chapter 1: Availability Pg. 10 Whitman * information states + transmission Topic 1.4-1.5, Chapter 1: NSTISSC Security Model Pg. 13 Whitman + storage Topic 1.4-1.5, Chapter 1: NSTISSC Security Model Pg. 13 Whitman + processing Topic 1.4-1.5, Chapter 1: NSTISSC Security Model Pg. 13 Whitman * security countermeasures + technology Topic 6.1-6.8 Chapter 6 & 7: Security Technology Pg. 243-282 Whitman + policy, procedures and practices Topic 1.4-1.5, 5.1,5.3,5.4, Chapter 1: Information Security Policy, Standards, and Practices Pg. 173-185 Whitman + education, training and awareness Topic 1.4-1.5, 5.6, Chapter 5: Security Education, Training, and Awareness Program Pg. 203-206 Whitman Whitman b Operations Security (OPSEC): * OPSEC process Topic 2.4, Krutz Chapter 6: Operations Security Pg. 339-358 / OPSEC (Supplemental materials SM-3) Krutz + Supplemental materials * INFOSEC and OPSEC interdependency Topic 2.4, Krutz Chapter 6: Operations Security Pg. 339-358 / OPSEC (Supplemental materials SM-3) Krutz + Supplemental materials 21 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy * unclassified indicators Topic 2.4, Krutz Chapter 6: Operations Security Pg. 339-358 / OPSEC (Supplemental materials SM-3) Krutz + Supplemental materials * OPSEC surveys/OPSEC planning Topic 2.4, Krutz Chapter 6: Operations Security Pg. 339-358 / OPSEC (Supplemental materials SM-3) Krutz + Supplemental materials c Information Security: * policy Topic 5.1, Chapter 5: Information Security Policy, Standards, and Practices Pg. 174 Whitman * roles and responsibilities Topic 10.2, Chapter 11: Positioning & Staffing the Security Function Pg. 473-479 Whitman * application dependent guidance Input Signal Rage Guidance (supplemental materials SM-20); Design of an intelligent materials data base for the IFR (supplemental materials SM-21) Supplemental materials d INFOSEC * cryptography + strength (e.g., complexity, secrecy, characteristics of the key) Topic 7.2 Chapter 8: Cryptographic algorithims. 354-375 Whitman + encryption (e.g., point-to-point, network, link) Topic 7.2 Chapter 8: Cryptographic algorithims. 354-375 Whitman + key management (to include electronic key) Topic 7.2 Chapter 8: Cryptographic algorithims. 354-375 Whitman * transmission security Topic 1.4-1.5 Whitman Chapter 1: NSTISSC Security Model Pg. 14 / Information Assurance Model (Maconachy, Schou, Ragsdale (MSR) Cube)(Supplemental materials SM-1) Whitman + Supplemental materials * emanations security Topic 12.1, 12.3, 12.4 12. TEMPEST Security (supplemental materials SM-2) Supplemental materials 22 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy * physical, personnel and administrative security * computer security Topic 8.1-8.6, 10.1-10.7 Chapter 9: Physical security Pg. 391-429. Chapter 11: Security and Personnel Pg. 469-502 Whitman + identification and authentication Topic 1.5, 6.2, 6.8, Pfleeger Chapter 2, 3, 5 / Whitman Chapter 7: Security Technology Pg. 338 / Information Assurance Model (Maconachy, Schou, Ragsdale (MSR) Cube)(Supplemental materials SM-1) Pfleger + Whitman + supplemental materials + access control Topic 6.2, 6.8, Pfleeger Chapter 2, 3, 5: Security Features of Trusted Operating Systems Pg. 208213 / Whitman Chapter 7: Security Technology Pg. 338 Pfleeger + Whitman + audit Topic 6.2, 11.1, Pfleeger Chapter 2, 3, 5: Security Features of Trusted Operating Systems Pg. 269-273 / Whitman Chapter 12: Information Security Maintenance Pg. 517 Pfleeger + Whitman + object reuse Topic 6.2, Chapter 5: Security Features of Trusted Operating Systems Pg. 270 Pfleeger D. NSTISS Basics (Awareness Level) Instructional/Behavioral Content a Describe components (with examples to include: national policy, threats and vulnerabilities, countermeasures, risk management, of organizational units, facets of NSTISS) 23 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy * Outline national NSTISS Policies. Topic 5.1, 5.3, Whitman Chapter 5: Information Security Policy, Standards, and Practices Pg. 172-186 / Krutz Chapter 1: Security Policy Implementation Pg. 20-24 Whitman + Krutz * Cite examples of threats and vulnerabilities of an AIS. Topic 2.2-2.3, 4.9, Whitman Chapter 2: Threats and Attacks Pg. 40-73 / Krutz Chapter 1: Information Security and Risk Management Pg. 28 Whitman + Krutz * Give examples of Agency implementation of NSTISS policy, practices and procedures. Topic 5.1-5.3, Whitman Chapter 5: Information Security Policy, Standards, and Practices Pg. 172-184 / Krutz Chapter 1: Security Policy Implementation 20-24 Whitman + Krutz Topical Content a National Policy and Guidance: * AIS security Topic 5.1, 5.3, Whitman Chapter 5: Information Security Policy, Standards, and Practices Pg. 172-186 / Krutz Chapter 1: Security Policy Implementation Pg. 20-24 Whitman + Krutz * communications security Topic 5.2, Chapter 3: Telecommunications and Network Security Pg. 95-96 Krutz * protection of information Topic 1.4-1.5, 5.5-5.6, Whitman Chapter 1: NSTISSC Security Model Pg. 13, Chapter 5: Planning for Security Pg. 186-208 / Information Assurance Model (Maconachy, Schou, Ragsdale (MSR) Cube)(Supplemental materials SM-1) Whitman + supplemental materials * employee accountability for agency information Topic 10.4 chapter 11: Privacy and the security of Personnel Data. Pg. 492-500 Whitman b Threats to and Vulnerabilities of Systems: * definition of terms (e.g., threats, vulnerabilities, risk) Topic 1.16 Chapter 1: Information Security Terminology. Pg. 30-31 Whitman 24 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy * major categories of threats (e.g., fraud, Hostile Intelligence Service (HOIS), malicious logic, hackers, environmental and technological hazards, disgruntled employees, careless employees, HUMINT, and monitoring) Topic 2.2 Chapter 2: Threats Pg. 40-63 Whitman * threat impact areas Topic 2.2 Chapter 2: Threats Pg. 40-63 Whitman c Legal Elements: * fraud, waste and abuse Topic 3.1-3.5 Chapter 3: Legal, Ethical, and Professional Issues Pg. 87-99 Whitman * criminal prosecution Topic 3.1-3.5 Chapter 3: Legal, Ethical, and Professional Issues Pg. 87-99 Whitman * evidence collection and preservation Topic 3.8, Chapter 9: Legal, Regulations, Compliance, and Inverstigation Pg. 497-498 Krutz * investigative authorities Topic 3.1-3.5 Chapter 3: Legal, Ethical, and Professional Issues Pg. 87-99 Whitman d Countermeasures: * cover and deception Topic 6.6, Chapter 7: Security Technology Pg. 320-321 Whitman * HUMINT Topic 2.7, Krutz Chapter 6: Operational E-mail Security Pg. 382-386 / HUMINT (supplemental materials SM-4) Krutz + supplemental materials * monitoring (e.g., data, line) Topic 6.5, 6.7, 6.8, Chapter 6: Security Technology Pg. 289-300 Whitman * technical surveillance countermeasures Topic 6.9, Technical Surveillance Countermeasures (supplemental materials SM-5) supplemental materials * education, training, and awareness Topic 5.5, Chapter 5: Security Education, Training, and Awareness Pg. 206-209 Whitman 25 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy * assessments (e.g., surveys, inspections) e Concepts of Risk Management: * Topic 6.1-6.8, Chapter 6 & 7: Security Technology Pg. 243-279, 287-342 Whitman threat and vulnerability assessment Topic 4.3, 4.9, Whitman Chapter 4: Risk Assessment Pg. 139-144 / Krutz Chapter 1: Risk Management and Assessment Pg. 26-30 Whitman + Krutz * cost/benefit analysis of controls Topic 4.4-4.5, Chapter 4: Risk Management Pg. 145-154 Whitman * implementation of cost-effective controls Topic 4.4-4.5, Chapter 4: Risk Management Pg. 145-154 Whitman * consequences (e.g., corrective action, risk assessment) Topic 4.4-4.5, Chapter 4: Risk Management Pg. 145-154 Whitman * monitoring the efficiency and effectiveness of controls (e.g., unauthorized or inadvertent disclosure of information) Topic 4.4-4.5, Chapter 4: Risk Management Pg. 145-154 Whitman f Concepts of System Life Cycle Management: * requirements definition (e.g., architecture) Topic 1.10-1.12,10.3, Whitman Chapter 1: Introduction to Information Security Pg. 20-28; Whitman Chapter 11: Security and Presonnel Pg. 479-491 / Krutz Chapter 11: Understanding Certification and Accredittion Pg. 559-578; Krutz Chapter 12: Initiation of System Authorization Process Pg. 585-610 Whitman + Krutz * development Topic 1.10-1.12,10.3, Whitman Chapter 1: Introduction to Information Security Pg. 20-28, Whitman Chapter 11: Security and Presonnel Pg. 479-491 / Krutz Chapter 11: Understanding Certification and Accredittion Pg. 559-578, Krutz Chapter 12: Initiation of System Authorization Process Pg. 585-610 Whitman + Krutz 26 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy * demonstration and validation (testing) Topic 1.10-1.12,10.3, Whitman Chapter 1: Introduction to Information Security Pg. 20-28, Whitman Chapter 11: Security and Presonnel Pg. 479-491 / Krutz Chapter 11: Understanding Certification and Accredittion Pg. 559-578, Krutz Chapter 12: Initiation of System Authorization Process Pg. 585-610 Whitman + Krutz * implementation Topic 1.10-1.12,10.3, Whitman Chapter 1: Introduction to Information Security Pg. 20-28; Whitman Chapter 11: Security and Presonnel Pg. 479-491 / Krutz Chapter 11: Understanding Certification and Accredittion Pg. 559-578; Krutz Chapter 12: Initiation of System Authorization Process Pg. 585-610 Whitman + Krutz * security (e.g., certification and accreditation) Topic 1.10-1.12,10.3, Whitman Chapter 1: Introduction to Information Security Pg. 20-28; Whitman Chapter 11: Security and Presonnel Pg. 479-491 / Krutz Chapter 11: Understanding Certification and Accredittion Pg. 559-578; Krutz Chapter 12: Initiation of System Authorization Process Pg. 585-610 Whitman + Krutz * operations and maintenance (e.g., configuration management) Topic 1.10-1.12,10.3, Whitman Chapter 1: Introduction to Information Security Pg. 20-28; Whitman Chapter 11: Security and Presonnel Pg. 479-491 / Krutz Chapter 11: Understanding Certification and Accredittion Pg. 559-578; Krutz Chapter 12: Initiation of System Authorization Process Pg. 585-610 Whitman + Krutz g Concepts of Trust: 27 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy * policy Topic 6.2, 9.4, Pfleeger Chapter 5: Designing Trusted Operating Systems Pg. 229-232 / Krutz Chapter 6: Operations Security Pg. 346-349 / Using Context- and Content-Based Trust Policies on the Semantic Web (supplemental materials SM-19) Pfleeger + Krutz + supplemental materials * mechanism Topic 6.2, 9.4, Pfleeger Chapter 5: Designing Trusted Operating Systems Pg. 229-232 / Krutz Chapter 6: Operations Security Pg. 346-349 / Using Context- and Content-Based Trust Policies on the Semantic Web (supplemental materials SM-19) Pfleeger + Krutz + supplemental materials * assurance Topic 2.9, 6.2, 9.5, Krutz Chapter 2: Secure Software Development, Pg. 73-74; Krutz Chapter 5: Security Architecture and Design Pg. 314-316 / Pfleeger Chapter 5: Designing Trusted Operating Systems Pg. 229-232 Krutz + Pfleeger h Modes of Operation: * dedicated Topic 9.4, Chapter 6: Operations Security Pg. 349-350 Krutz * system-high Topic 9.4, Chapter 6: Operations Security Pg. 349-350 Krutz * compartmented/partitioned Topic 9.4, Chapter 6: Operations Security Pg. 349-350 Krutz * multilevel Topic 9.4, Chapter 6: Operations Security Pg. 349-350 Krutz i Roles of Various Organizational Personnel * senior management Topic 10.1-10.4, 10.8 Whitman Chapter 11: Security and Personnel Pg. 471-479 / Krutz Chapter 1: Information Classification Roles Pg. 16-20 Whitman + Krutz 28 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy * program or functional managers Topic 10.1-10.4, 10.8 Whitman Chapter 11: Security and Personnel Pg. 471-479 / Krutz Chapter 1: Information Classification Roles Pg. 16-20 Whitman + Krutz * system manager and system staff Topic 10.1-10.4, 10.8 Whitman Chapter 11: Security and Personnel Pg. 471-479 / Krutz Chapter 1: Information Classification Roles Pg. 16-20 Whitman + Krutz * telecommunications office and staff Topic 10.1-10.4, 10.8 Whitman Chapter 11: Security and Personnel Pg. 471-479 / Krutz Chapter 1: Information Classification Roles Pg. 16-20 Whitman + Krutz * security office Topic 10.1-10.4, 10.8 Whitman Chapter 11: Security and Personnel Pg. 471-479 / Krutz Chapter 1: Information Classification Roles Pg. 16-20 Whitman + Krutz * COMSEC custodian Topic 10.1-10.4, 10.8 Whitman Chapter 11: Security and Personnel Pg. 471-479 / Krutz Chapter 1: Information Classification Roles Pg. 16-20 Whitman + Krutz * INFOSEC Officer Topic 10.1-10.4, 10.8 Whitman Chapter 11: Security and Personnel Pg. 471-479 / Krutz Chapter 1: Information Classification Roles Pg. 16-20 Whitman + Krutz * information resources management staff Topic 10.1-10.4, 10.8 Whitman Chapter 11: Security and Personnel Pg. 471-479 / Krutz Chapter 1: Information Classification Roles Pg. 16-20 Whitman + Krutz * audit office Topic 10.1-10.4, 10.8 Whitman Chapter 11: Security and Personnel Pg. 471-479 / Krutz Chapter 1: Information Classification Roles Pg. 16-20 Whitman + Krutz 29 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy * OPSEC managers Topic 10.1-10.4, 10.8 Whitman Chapter 11: Security and Personnel Pg. 471-479 / Krutz Chapter 1: Information Classification Roles Pg. 16-20 Whitman + Krutz * end users Topic 10.1-10.4, 10.8 Whitman Chapter 11: Security and Personnel Pg. 471-479 / Krutz Chapter 1: Information Classification Roles Pg. 16-20 Whitman + Krutz j Facets of NSTISS: * protection of areas Topic 8.1-8.6 Chapter 9: Physical Security Pg. 399-429 Whitman * protection of equipment Topic 8.1-8.6 Chapter 9: Physical Security Pg. 399-429 Whitman * protection of passwords Topic 6.8 Chapter 7: Security Technology Pg. 338-339 Whitman * protection of files and data Topic 6.5-6.8 Chapter 7: Security Technology Pg. 287-342 Whitman * protection against malicious logic Topic 2.9 Chapter 2: The Need For Security Pg. 73-80 Whitman * backup of data and files Topic 9.4 Chapter 6: Operation Security Pg. 378-382 Krutz * protection of magnetic storage media Topic 2.8 Chapter 6: Operation Security Pg. 362-364 Krutz * protection of voice communications Topic 5.2 Chapter 3: Telecommunications and Network Security Pg. 95 Krutz * protection of data communications Topic 5.2 Chapter 3: Telecommunications and Network Security Pg. 95 Krutz * protection of keying material Topic 7.2 Chapter 8: Cryptography Pg. 364-375 / NASA COMSEC Procedures and Guidelines (supplemental materials SM-6) Whitman + supplemental materials * application of cryptographic systems Topic 7.3 Chapter 8: Cryptography, Pg. 375-382 Whitman 30 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy * transmission security countermeasures (e.g., callsigns, frequency, and pattern forewarning protection) Topic 5.2 Chapter 3: Telecommunications and Network Security Pg. 95-221 Krutz * reporting security violations Topic 3.7, 11.3, Chapter 3: Legal and Professional Issues in Information Security 108111; Chapter 12: Information Security Maintenance Pg. 524-525 Whitman E. System Operating Environment (Awareness Level) Topic 5.1-5.3, 5,7, Whtiman Chapter 5: Information Security Policy, Standards, and Practices Pg. 172-186 / Krutz Chapter 1: Policies, Standards, Guidelines, and Procedure Pg. 20-26; Krutz Chapter 3: Telecommunications and Network Security Pg. 95-98 / AIS Security (Policy) (supplemental materials SM-7, SM-8) Whitman + Krutz + supplemental materials Instructional/Behavioral Content a Outline Agency specific AIS and telecommunications systems. * Summarize Agency AIS and telecommunications systems in operation. b Describe Agency "control points" for purchase and maintenance of Agency AIS and telecommunications systems 31 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy * Give examples of current Agency AIS/telecommunications systems and configurations. c Review Agency AIS and telecommunications security policies * * Topic 5.1-5.3, 5,7, Whtiman Chapter 5: Information Security Policy, Standards, and Practices Pg. 172-186 / Krutz Chapter 1: Policies, Standards, Guidelines, and Procedure Pg. 20-26; Krutz Chapter 3: Telecommunications and Network Security Pg. 95-98 / AIS Security (Policy) (supplemental materials SM-7, SM-8) Whitman + Krutz + supplemental materials List Agency-level contact points for AIS and telecommunications systems and maintenance. Topic 5.1-5.3, 5,7, Whtiman Chapter 5: Information Security Policy, Standards, and Practices Pg. 172-186 / Krutz Chapter 1: Policies, Standards, Guidelines, and Procedure Pg. 20-26; Krutz Chapter 3: Telecommunications and Network Security Pg. 95-98 / AIS Security (Policy) (supplemental materials SM-7, SM-8) Whitman + Krutz + supplemental materials Cite appropriate policy and guidance. Topic 5.1-5.3, 5,7, Whtiman Chapter 5: Information Security Policy, Standards, and Practices Pg. 172-186 / Krutz Chapter 1: Policies, Standards, Guidelines, and Procedure Pg. 20-26; Krutz Chapter 3: Telecommunications and Network Security Pg. 95-98 / AIS Security (Policy) (supplemental materials SM-7, SM-8) Whitman + Krutz + supplemental materials Topical Content c Agency Specific Security Policies: 32 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy * guidance Topic 5.1-5.3, 5,7, Whtiman Chapter 5: Information Security Policy, Standards, and Practices Pg. 172-186 / Krutz Chapter 1: Policies, Standards, Guidelines, and Procedure Pg. 20-26; Krutz Chapter 3: Telecommunications and Network Security Pg. 95-98 / AIS Security (Policy) (supplemental materials SM-7, SM-8) Whitman + Krutz + supplemental materials * roles and responsibilities Topic 5.1-5.3, 5,7, Whtiman Chapter 5: Information Security Policy, Standards, and Practices Pg. 172-186 / Krutz Chapter 1: Policies, Standards, Guidelines, and Procedure Pg. 20-26; Krutz Chapter 3: Telecommunications and Network Security Pg. 95-98 / AIS Security (Policy) (supplemental materials SM-7, SM-8) Whitman + Krutz + supplemental materials * points of contact Topic 5.1-5.3, 5,7, Whtiman Chapter 5: Information Security Policy, Standards, and Practices Pg. 172-186 / Krutz Chapter 1: Policies, Standards, Guidelines, and Procedure Pg. 20-26; Krutz Chapter 3: Telecommunications and Network Security Pg. 95-98 / AIS Security (Policy) (supplemental materials SM-7, SM-8) Whitman + Krutz + supplemental materials d Agency specific AIS and telecommunications policies * points of contact Topic 5.1-5.3, 5,7, Whtiman Chapter 5: Information Security Policy, Standards, and Practices Pg. 172-186 / Krutz Chapter 1: Policies, Standards, Guidelines, and Procedure Pg. 20-26; Krutz Chapter 3: Telecommunications and Network Security Pg. 95-98 / AIS Security (Policy) (supplemental materials SM-7, SM-8) Whitman + Krutz + supplemental materials 33 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy * references F. NSTISS Planning and Management (Performance Level) Topic 5.1-5.3, 5,7, Whtiman Chapter 5: Information Security Policy, Standards, and Practices Pg. 172-186 / Krutz Chapter 1: Policies, Standards, Guidelines, and Procedure Pg. 20-26; Krutz Chapter 3: Telecommunications and Network Security Pg. 95-98 / AIS Security (Policy) (supplemental materials SM-7, SM-8) Whitman + Krutz + supplemental materials Instructional/Behavioral Content a Discuss practical performance measures employed in designing security measures and programs * Builds a security plan that encompasses NSTISS components in designing protection/security for an instructor-supplied description of an AIS telecommunications system. Topic 5.4, Chapter 5: The Information Security Bluepint, Pg. 186-201 Whitman b Introduce generic security planning guidelines/documents Topic 5.1-5.4, Whtiman Chapter 5: Information Security Policy, Standards, and Practices Pg. 172-201 / Krutz Chapter 1: Policies, Standards, Guidelines, and Procedure Pg. 20-26; Krutz Chapter 3: Telecommunications and Network Security Pg. 95-98 Whitman + Krutz Topical Content 34 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy a Security Planning * directives and procedures for NSTISS policy Topic 1.4, 5.3, Whitman Chapter 1: NSTISSC Security Model Pg. 13-14 / Krutz Chapter 1: Security Policy Implementation Pg. 20-26 Whitman + Krutz * NSTISS program budget Topic 1.4, 5.3, Whitman Chapter 1: NSTISSC Security Model Pg. 13-14 / Krutz Chapter 1: Security Policy Implementation Pg. 20-26 Whitman + Krutz * NSTISS program evaluation Topic 1.4, 5.3, Whitman Chapter 1: NSTISSC Security Model Pg. 13-14 / Krutz Chapter 1: Security Policy Implementation Pg. 20-26 Whitman + Krutz * NSTISS training (content and audience definition) Topic 1.4, 5.3, Whitman Chapter 1: NSTISSC Security Model Pg. 13-14 / Krutz Chapter 1: Security Policy Implementation Pg. 20-26 Whitman + Krutz b Risk Management * information identification Topic 4.1-4.2, Chapter 4: Risk Management Pg. 115-138 Whitman * roles and responsibilities of all the players in the risk analysis process Topic 4.1-4.2, Chapter 4: Risk Management Pg. 115-138 Whitman * risk analysis and/or vulnerability assessment components Topic 4.1-4.2, Chapter 4: Risk Management Pg. 115-138 Whitman * risk analysis results evaluation Topic 4.1-4.2, Chapter 4: Risk Management Pg. 115-138 Whitman * corrective actions Topic 4.1-4.2, Chapter 4: Risk Management Pg. 115-138 Whitman * acceptance of risk (accreditation) Topic 4.1-4.2, Chapter 4: Risk Management Pg. 115-138 Whitman c Systems Life Cycle Management 35 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy * management control process (ensure that appropriate administrative, physical,and technical safeguards are incorporated into all new applications and into significant modifications to existing applications) Topic 1.1, 9.4, Whitman Chapter 1: Introduction to Information Security Pg. 25-28 / Krutz Chapter 6: Operations Security Pg. 339-387 Whitman + Krutz * evaluation of sensitivity of the application based upon risk analysis - determination of security specifications Topic 1.11, 4.1-4.2, Chapter 1: Introduction to Information Security Pg. 25-28; Chapter 4: Risk Management Pg. 115-138 Whitman * design review and systems test performance (ensure required safeguards are operationally adequate) Topic 1.11, Chapter 1: Introduction to Information Security Pg. 25-28 Whitman * systems certification and accreditation process Topic 1.12, Chapter 11: Understanding Ceertification and Accrediation Pg. 559-578; Chapter 12: Initiation of the System Authorization Process Pg. 586-610 Krutz * acquisition Topic 1.11, 11.4, Chapter 1: Introduction to Information Security Pg. 25-28; Chapter 12: Information Security Maintenance Pg. 550 Whitman d Contingency Planning/Disaster Recovery * contingency plan components Topic 5.6, Chapter 5: Planning for Security, Pg. 210 Whitman * agency response procedures and continuity of operations Topic 5.6 Chapter 5: Planning for Security, Pg. 215-230 Whitman * team member responsibilities in responding to an emergency situation Topic 5.6 Chapter 5: Planning for Security, Pg. 215-230 Whitman * guidelines for determining critical and essential workload Topic 5.4, 5.6, Chapter 5: Planning for Security, Pg. 186-201, 209-233 Whitman * determination of backup Topic 5.6 Chapter 5: Planning for Security, Pg. Whitman 36 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy requirements 225-228 * development of procedures for offsite processing Topic 5.6 Chapter 5: Planning for Security, Pg. 230-230 Whitman * development of plans for recovery actions after a disruptive event Topic 5.6 Chapter 5: Planning for Security, Pg. 228-232 Whitman * emergency destruction procedures Topic 5.8, Security Standard Operating Procedure No.4 (supplemental materials SM-9) supplemental materials G. NSTISS Policies and Procedures (Performance Level) Instructional/Behavioral Content a List and describe: specific technological, policy, and educational solutions for NSTISS. * Playing the role of either a system penetrator or system protector, the student will discover points of exploitation and apply appropriate and countermeasures in an instructor-supplied description of an Agency AIS/telecommunications system. Topic 5.1-5.2, Whitman Chapter 5: Planning for Security Pg. 172-186 / Krutz Chapters 3: Telecommunications and Network Security Pg. 95-98 Whitman + Krutz b List and describe: elements of vulnerability threat that exist in an AIS/ telecommunications system corresponding protection measures. Topic 2.2-2.3, 5.2, Whitman Chapter 2: The Need for Security Pg. 40-73 / Krutz Chapters 3: Telecommunication and Network Security Pg. 95-98 Whitman + Krutz 37 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy Topical Content a Physical Security Measures: * building construction Topic 8.1-8.6 chapter 9: Physical Security Pg. 399-430 Whitman * alarms Topic 8.1-8.6 chapter 9: Physical Security Pg. 399-430 Whitman * information systems centers Topic 8.1-8.6 chapter 9: Physical Security Pg. 399-430 Whitman * communications centers Topic 8.1-8.6 chapter 9: Physical Security Pg. 399-430 Whitman * shielding Topic 8.1-8.6 chapter 9: Physical Security Pg. 399-430 Whitman * cabling Topic 8.1-8.6 chapter 9: Physical Security Pg. 399-430 Whitman * filtered power Topic 8.1-8.6 chapter 9: Physical Security Pg. 399-430 Whitman * physical access control systems (key cards, locks and alarms) Topic 8.1-8.6 chapter 9: Physical Security Pg. 399-430 Whitman * stand-alone systems and peripherals Topic 8.1-8.6 chapter 9: Physical Security Pg. 399-430 Whitman * environmental controls (humidity and air conditioning) Topic 8.1-8.6 chapter 9: Physical Security Pg. 399-430 Whitman * fire safety controls Topic 8.1-8.6 chapter 9: Physical Security Pg. 399-430 Whitman * storage area controls Topic 8.1-8.6 chapter 9: Physical Security Pg. 399-430 Whitman * power controls (regulator, uninterrupted power service (UPS), and emergency poweroff switch) Topic 8.1-8.6 chapter 9: Physical Security Pg. 399-430 Whitman 38 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy * protected distributed systems b Personnel Security Practices and Procedures: * Topic 8.1-8.6 chapter 9: Physical Security Pg. 399-430 Whitman position sensitivity Topic 10.4, 10.9, Whitman Chapter 11: Security and Personnel, Pg. 492-496 / Personnel Security Standard (Supplemental Materials SM-10, SM11, SM-12) Whitman + supplemental materials * employee clearances Topic 10.4, 10.9, Whitman Chapter 11: Security and Personnel, Pg. 492-496 / Personnel Security Standard (Supplemental Materials SM-10, SM11, SM-12) Whitman + supplemental materials * access authorization/verification (need-to-know) Topic 5.5, 10.6, 10.9, Whitman Chapter 5, Planning for Security Pg. 206-208 / Krutz Chapter 1: Information Security and Risk Management Pg. 25-26 / Personnel Security Standard (Supplemental Materials SM-10, SM11, SM-12) Whitman + Krutz + supplemental materials * security training and awareness (initial and refresher) Topic 5.5, 10.6, 10.9, Whitman Chapter 5, Planning for Security Pg. 206-208 / Krutz Chapter 1: Information Security and Risk Management Pg. 25-26 / Personnel Security Standard (Supplemental Materials SM-10, SM11, SM-12) Whitman + Krutz + supplemental materials * systems maintenance personnel contractors Topic 10.2, 10.9, Whitman Chapter 11: Security and Personnel Pg. 471-473 / Personnel Security Standard (Supplemental Materials SM-10, SM11, SM-12) Whitman + Krutz + supplemental materials c Software Security: * configuration management Topic 1.10, 5.4, 9.4, 11.1, Whitman Chapter 1: The System Development Life Cycle Pg. 20-25; Whitman Chapter 5: The Information Security Blueprint Pg. 186-201; Whitman Chapter 12: Managing for Change Pg. 514 / Krutz Chapter 6: Operations Security Pg. 351-358 Whitman + Krutz 39 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy * programming standards and controls Topic 1.10, 5.4, 9.4, 11.1, Whitman Chapter 1: The System Development Life Cycle Pg. 20-25; Whitman Chapter 5: The Information Security Blueprint Pg. 186-201; Whitman Chapter 12: Managing for Change Pg. 514 / Krutz Chapter 6: Operations Security Pg. 351-358 Whitman + Krutz * documentation Topic 1.10, 5.4, 9.4, 11.1, Whitman Chapter 1: The System Development Life Cycle Pg. 20-25; Whitman Chapter 5: The Information Security Blueprint Pg. 186-201; Whitman Chapter 12: Managing for Change Pg. 514 / Krutz Chapter 6: Operations Security Pg. 351-358 Whitman + Krutz * change controls Topic 1.10, 5.4, 9.4, 11.1, Whitman Chapter 1: The System Development Life Cycle Pg. 20-25; Whitman Chapter 5: The Information Security Blueprint Pg. 186-201; Whitman Chapter 12: Managing for Change Pg. 514 / Krutz Chapter 6: Operations Security Pg. 351-358 Whitman + Krutz * software security mechanisms to protect information Topic 2.9, Security Mechanism / Security Software Policy (supplemental materials SM-13, SM-14) supplemental materials * segregation of duties Topic 10.6, Krutz Chapter 1: Information Security and Risk Management Pg. 25-26; Chapter 6: Operations Security Pg. 346-347 Krutz * concept of least privilege Topic 9.4, Chapter 6: Operations Security Pg. 355-356 Krutz * application security features Topic 1.6, 1.7, 2.9, Chapter 1: Introduction to Information Security Pg. 14-16; Chapter 2: Secure Software Development Pg. 73-74 Whitman * audit trails and logging Topic 11.2 Whitman Chapter 12: Information Security Maintenance Pg. 517-518 / Audit Trails (supplemental materials SM-15, SM-16) Whitman + supplemental materials 40 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy * operating systems security features Topic 6.2, Pfleeger Chapter 5: Designing Trusted Operating Systems, Pg. 229-230 Pfleeger * need-to-know controls Topic 9.4, Chapter 6: Operations Security Pg. 360-361 Krutz * malicious logic protection Topic 2.9, Whitman Chapter 2: Secure Software Development, Pg. 75-80 / Defending Medical Information Systems Against Malicious Software (supplemental materials SM-17) Whitman + supplemental materials * assurance Topic 2.9, 9.5, Chapter 2: Secure Software Development, Pg. 73-74; Chapter 5: Security Architecture and Design Pg. 314-316 Whitman e Administrative Security Procedural Controls: * external marking of media Topic 2.8, Chapter 6: Operations Security Pg. 362-364 Krutz * destruction of media Topic 2.8, Chapter 6: Operations Security Pg. 363 Krutz * sanitization of media - construction, changing, issuing and deleting passwords Topic 2.8, Chapter 6: Operations Security Pg. 362 Krutz * transportation of media Topic 2.8, Chapter 6: Operations Security Pg. 362-364 Krutz * reporting of computer misuse or abuse Topic 3.7, 11.3, Chapter 3: Legal and Professional Issues in Information Security 108111; Chapter 12: Information Security Maintenance Pg. 524-525 Whitman * preparation of security plans Topic 5.4, Whitman Chapter 5: Planning for Security, Pg. 186-201 Whitman * emergency destruction Topic 2.8, 5.8, Whitman Chapter 6: Operations Security Pg. 363 / Security Standard Operating Procedure No.4 (supplemental materials SM-9) Krutz + supplemental materials 41 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy * media downgrade and declassification Topic 2.8, Chapter 6: Operations Security Pg. 362-364 / Declassification and Downgrading, AR 380-5 Chapter III (supplemental materials SM-18) Krutz + supplemental materials * attribution Topic 2.8, Chapter 6: Operations Security Pg. 362-364 / An Introduction to Computre Security The NIST Handbook (supplemental Materials SM-22) Krutz + supplemental materials * repudiation Topic 2.8, Chapter 6: Operations Security Pg. 362-364 / An Introduction to Computre Security The NIST Handbook (supplemental Materials SM-22) Krutz + supplemental materials f Auditing and Monitoring: * effectiveness of security programs Topic 9.4, 11.2 Krutz Chapter 6: Operations Security Pg. 365-372 / Whitman Chapter 12: Information Security Maintenance Pg. 519-544 Whitman + Krutz * conducting security reviews Topic 9.4, 11.2 Krutz Chapter 6: Operations Security Pg. 365-372 / Whitman Chapter 12: Information Security Maintenance Pg. 519-544 Whitman + Krutz * verification, validation, testing, and evaluation processes Topic 1.11, 9.4, Whitman Chapter 1: Introduction to Information Security pg 23-25 / Krutz Chapter 6: Operations Security Pg. 365372 Whitman + Krutz * monitoring systems for accuracy and abnormalities Topic 9.4, 11.2 Krutz Chapter 6: Operations Security Pg. 365-372 / Whitman Chapter 12: Information Security Maintenance Pg. 519-544 Whitman + Krutz * investigation of security breaches Topic 1.10, 5.6, Chapter 1: Introduction to Information Security Pg. 21; Chapter 6: Planing for Security Pg. 209-235 Whitman * review of audit trails and logs Topic 11.2 Whitman Chapter 12: Information Security Maintenance Pg. 517-518 / Audit Trails (supplemental materials SM-15, SM-16) Whitman + supplemental materials * review of software design standards Topic 2.9 Chapter 2: Secure Software Whitman 42 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy Development pg 73-74 * review of accountability controls Topic 11.2, Chapter 12: Information Security Maintenance Pg. 519-544 Whitman * privacy Topic 3.3, 10.7, Chapter 3: Relevant U.S. Law Pg. 91; Chapter 11: Security and Personnel Pg. 502 Whitman g Cryptosecurity: * encryption/decryption method, procedure, algorithm Topic 7.2 Chapter 8: Principles of Cryptography Pg. 346-348 Whitman * cryptovariable or key Topic 7.2 Chapter 8: Principles of Cryptography Pg.361-366 Whitman * electronic key management system Topic 7.2 Chapter 8: Principles of Cryptography Pg. 366 Whitman h Key Management: * identify and inventory COMSEC material Topic 5.9, COMSEC (supplemental materials SM-6) supplemental materials * report COMSEC incidents Topic 5.9, COMSEC (supplemental materials SM-6) supplemental materials * destruction procedures for COMSEC material Topic 5.9, COMSEC (supplemental materials SM-6) supplemental materials * key management protocols (bundling, electronic key, over-theair rekeying) Topic 5.9, COMSEC (supplemental materials SM-6) supplemental materials j TEMPEST Security: * shielding Topic 12.4 NSTISSAM TEMPEST (supplemental materials SM-2) supplemental materials * grounding Topic 12.4 NSTISSAM TEMPEST (supplemental materials SM-2) supplemental materials * attenuation Topic 12.3-12.4 NSTISSAM TEMPEST (supplemental materials SM-2) supplemental materials 43 Quality Enhancement Plan (QEP): From These Roots … A Foundation for Life: Mathematics and Financial Literacy * banding Topic 12.4 NSTISSAM TEMPEST (supplemental materials SM-2) supplemental materials * filtered power Topic 12.4 NSTISSAM TEMPEST (supplemental materials SM-2) supplemental materials * cabling Topic 12.4 NSTISSAM TEMPEST (supplemental materials SM-2) supplemental materials * zone of control/zoning Topic 12.3-12.4 NSTISSAM TEMPEST (supplemental materials SM-2) supplemental materials * TEMPEST separation Topic 12.4 NSTISSAM TEMPEST (supplemental materials SM-2) supplemental materials 44