I Touch the Future, I Teach.

4/17/97


Click here to start


Table of Contents

I Touch the Future, I Teach.

Computer Security

Objectives

Seven Basic Facts

FACT 1

FACT 2

FACT 3

FACT 4

FACT 5

FACT 6

FACT 7

YOUR ROLE?

Role of the Executive

Where Do You Fit?

Level 1 Executive

Level 2 Executive

Level 3 Executive

Statutory and Executive Baseline

Applicable Computer Security Statutes

Applicable Policy and Executive Orders

Guidelines, Standards and Regulations

Agency and System Documentation

Agency and System Documentation

Agency and System Documentation

Current Issues

Current Issues Confidentiality, Integrity, Availability

Current Issues Data Aggregation and Sensitivity

Current Issues Inter-connectivity

Current Issues Common Misconceptions

Developing Certification Package

EVALUATION

Risk Management

LIST OF POSSIBLE ASSETS

Risk Management

THREATS TO COMPUTER SYSTEMS

Risk Management

PC VULNERABILITIES

Risk Management

SECURITY SAFEGUARDS

When Is Risk Management Important?

Risk Management

Security Plan

Security Plan

Certification

Certification Package

Accreditation

DAA Accreditation Decision

Accreditation Process

Executive Action Items

Level 1 Executive Action Items

Level 2 Executive Action Items

Level 3 Executive Action Items

Computer Security

I Touch the Future, I Teach.

Author: Corey D. Schou, PhD

Email: Schou@mentor.net

Home Page: CIS.ISU.EDU