Table of Contents
I Touch the Future, I Teach.
Computer Security
Objectives
Seven Basic Facts
FACT 1
FACT 2
FACT 3
FACT 4
FACT 5
FACT 6
FACT 7
YOUR ROLE?
Role of the Executive
Where Do You Fit?
Level 1 Executive
Level 2 Executive
Level 3 Executive
Statutory and Executive Baseline
Applicable Computer Security Statutes
Applicable Policy and Executive Orders
Guidelines, Standards and Regulations
Agency and System Documentation
Agency and System Documentation
Agency and System Documentation
Current Issues
Current IssuesConfidentiality, Integrity, Availability
Current IssuesData Aggregation and Sensitivity
Current IssuesInter-connectivity
Current IssuesCommon Misconceptions
Developing Certification Package
EVALUATION
Risk Management
LIST OF POSSIBLE ASSETS
Risk Management
THREATS TO COMPUTER SYSTEMS
Risk Management
PC VULNERABILITIES
Risk Management
SECURITY SAFEGUARDS
When Is Risk Management Important?
Risk Management
Security Plan
Security Plan
Certification
Certification Package
Accreditation
DAA Accreditation Decision
Accreditation Process
ExecutiveAction Items
Level 1 Executive Action Items
Level 2 Executive Action Items
Level 3 Executive Action Items
Computer Security
I Touch the Future, I Teach.