Qu¶n LÝ Cao CÊp

Home
Up

The INFOSEC functions of a DAA are:

  1. granting final approval to operate an IS or network in a specified security mode;

  2.    reviewing the accreditation documentation to confirm that the residual risk is within acceptable limits;

  3.  verifying that each Information System complies with the IS security requirements, as reported by the Information Systems Security Officer (ISSO);

  4.  ensuring the establishment, administration, and coordination of security for systems that agency, service, or command personnel or contractors operate;

  5.  ensuring that the Program Manager (PM) defines the system security requirements for acquisitions;

  6.  assigning INFOSEC responsibilities to the individuals reporting directly to the DAA;

  7. approving the classification level required for applications implemented in a network environment;

  8. approving additional security services necessary to interconnect to external systems (e.g., encryption and non-repudiation);

  9. reviewing the accreditation plan and sign the accreditation statement for the network and each IS;

  10. defining the criticality and sensitivity levels of each IS;

  11. reviewing the documentation to ensure each IS supports the security requirements as defined in the IS and network security programs;

  12. allocating resources to achieve an acceptable level of security and to remedy security deficiencies;

  13. establishing working groups, when necessary, to resolve issues regarding those systems requiring

  14. multiple or joint accreditation. This may require documentation of conditions or agreements in Memoranda of Agreement (MOA); and

  15. ensuring that when classified or sensitive but unclassified information is exchanged between logically connected components, the content of this communication is protected from unauthorized observation by acceptable means, such as cryptography, and Protected Distribution Systems (PDS).

Terminal Objective:

Given a final report requesting approval to operate a hypothetical information system at a specified level of trust, the DAA will analyze and judge the information for validity and reliability to ensure the hypothetical system will operate at the proposed level of trust. This judgment will be made based on system architecture, system security measures, system operations policy, system security management plan, and provisions for system operator and end user training.

List of performance items under competencies

In each of the competency areas listed below, the DAA shall perform the following functions:

 

1. LEGAL LIABILITIES ISSUES

a. Legal Issues
  1. 1)        explain the legal responsibilities of the DAA;

  2. 2)        discuss the Computer Fraud and Abuse Act, P.L. 99-474, 18 U.S. Code 1030;

  3. 3)        discuss Copyright Protection and License, Copyright Act of 1976, Title 17 U.S. Code, P.L. 102-307, amended the Copyright Act of 1976, 1990;

  4. 4)        discuss the Freedom of Information Act;

  5. 5)        discuss the purpose and history of NSD 42;

  6. 6)        discuss implications of the Privacy Act;

  7. 7)        list and discuss the issues of Computer Security Act of 1987     (P.L. 100-235); and

  8. 9)        list international legal issues which can affect INFOSEC.

b. Liabilities
  1. 1)        state the importance of annual loss expectancy;

  2. 2)        list the damage which can occur when anti-virus programs are not used;

  3. 3)        determine the responsibilities associated with the business aspects of INFOSEC; and

  4. 4)        explain the legal responsibilities of the data owner.

c. Crime
  1. 1)        explain how audit analysis tools can be useful in crime analysis;

  2. 2)        explain the importance of written procedures for evidence collection and preservation;

  3. 3)        illustrate the importance of written procedures for investigation of security breaches;

  4. 4)        describe how collection methods can affect evidence acceptability;

  5. 5)        list the ways logs/journals can be important evidence in a suspected criminal investigation; and

  6. 6)        describe the DAA role in witness interview and interrogation.

d. Issues
  1. 1)        explain the dangers of not using your agency’s Computer Emergency Response Team (CERT);

  2. 2)        discuss the effects of disregarding COMSEC policy and guidance;

  3. 3)        illustrate the ramifications of improper disposition of classified information;

  4. 4)        determine the effects of threats to electronic data interchange to systems in your agency;

  5. 5)        explain the consequences of damage occurring to electronic funds transfer to systems in your agency;

  6. 6)        explain how unauthorized modifications to electronic mail affect your agency;

  7. 7)        outline the vulnerabilities associated with electronic records management;

  8. 8)        describe the liabilities associated with electronic monitoring;

  9. 9)        illustrate how fraud, waste, and abuse of computer resources can affect your agency’s system security;

  10. 10)    define the term “Information Warfare" (INFOWAR);

  11. 11)    explain the DAA’s role in information warfare through the use of INFOSEC;

  12. 12)    describe ways in which connecting to the National Information Infrastructure can create risks to your systems;

  13. 13)    define the term “national security information";

  14. 14)    explain the DAA’s role in the security violations reporting process;

  15. 15)    discuss the importance of separation of duties;

  16. 16)    explain software piracy; and

  17. 17)    explain DAA responsibility for preventing unauthorized disclosure of information.

e. Contracts, Agreements, and Other Obligations
  1. 1)        define for the contractor the DAA involvement in the development of new systems;

  2. 2)        explain to the contractor the DAA involvement in maintenance agreements; and

  3. 3)        describe to the contractor the DAA involvement in classified systems.

2. POLICY

a. Computer Security Policy
  1. 1)        define the term “computer security policy"; and

  2. 2)        identify national security information using Executive Order 12958.

b. P. L. 100-235, Computer Security Act of 1987
  1. 1)        explain the purpose of P. L. 100-235; and

  2. 2)        outline the roles and responsibilities assigned by P. L. 100-235.

c. OPM 5 CFR 930, Training Requirements for the Computer Security Act
  1. 1)        explain the purpose of OPM 5 CFR 930; and

  2. 2)        describe responsibilities under OPM 5 CFR 930.

d. OMB Circular A-130, Management of Federal Information Resources, Appendix III, Security of Federal

Automated Information Systems

  1. 1)        evaluate the purpose of OMB Circular A-130; and

  2. 2)        summarize the responsibilities assigned by OMB Circular A-130.

e. Freedom of Information Act

discuss importance of the Freedom of Information Act.

f. National Security Directive (NSD) 42

explain the purpose and history of NSD 42.

g. Electronic Records Management
  1. 1)        identify public law related to electronic records management; and

  2. 2)        discuss the concept of electronic mail as an electronic record.

h. Other Federal Statutes

relate the following Federal Acts to INFOSEC:

Federal Managers Financial Integrity Act of 1982

Federal Property and Administration Service Act

Federal Records Act

National Archives and Records Act

Privacy Act of 1974 (P. L. 93-579, U.S. Code 532(a))

i. Copyright Protection and License
  1. 1)        acknowledge that copyright laws protect literary expression only if a copyright has been registered;

  2. 2)        distinguish between patent laws which protect products and contract laws which cover trade secrets;

  3. 3)        determine which protection (copyright, patent, or contract) applies to a computer applications program;

  4. 4)        identify basic concepts of software licensing;

  5. 5)        identify legal policy against software piracy; and

  6. 6)        discuss system software contracts.

j. Guiding Directives
  1. 1)        state the purpose of federal information processing standards;

  2. 2)        explain the purpose of National Security Telecommunications and Information Systems Security (NSTISS) publications;

  3. 3)        discuss the purpose of National Institute of Standards and Technology (NIST) publications;

  4. 4)        explain the DAA responsibilities assigned by the Department of Defense Trusted Computer System Evaluation Criteria (DOD 5200.28-STD), or Orange Book; and

  5. 5)        explain the content of the Rainbow Series of documents.

k. Access Control Policy
  1. 1)        define the DAA’s responsibility for security policy statements relating to access control;

  2. 2)        explain the general concept underlying access control models; and

  3. 3)        establish an access authorization process.

l. Sensitive Data
  1. 1)        define policy statements relating to accountability for sensitive data;

  2. 2)        use an approved method of providing individual accountability and access verification; and

  3. 3)        define process for designation of sensitive data, applications and systems and marking and

  4. 4)       handling of sensitive data.

m. Local Policy
  1. 1)        establish agency specific INFOSEC policy and procedure;

  2. 2)        identify command authority(s) relating to INFOSEC;

  3. 3)        identify INFOSEC roles and responsibilities by local policy; and

  4. 4)        determine policy for local storage area controls.

n. Accreditation
  1. 1)        define the term “accreditation authority";

  2. 2)        establish accreditation policy;

  3. 3)        identify the directive allowing delegation of authority;

  4. 4)        delegate responsibilities in the accreditation process, if permitted;

  5. 5)        establish policy for recertification; and

  6. 6)        define security requirements for accreditation.

o. Threats, Vulnerabilities, and Incidents
  1. 1)        identify policy which must be followed for handling computer security incidents;

  2. 2)        establish policy for handling computer security incidents;

  3. 3)        incorporate information from assistance programs into local policy as appropriate for the organization (e.g., the Computer Security Technical Vulnerability Reporting Program (CSTVRP), the Automated Information Systems Security Incident Support Team (ASSIST), The Computer Incident Advisory Capability (CIAC), and the CERT);

  4. 4)        identify legal investigative authorities by agency specific charter;

  5. 5)        identify requirements for the CERT; and

  6. 6)        identify requirements for vulnerability reporting to the CERT.

p. Documentation Policies
  1. 1)        state documentation policies to which the DAA must adhere;

  2. 2)        establish documentation policies as required; and

  3. 3)        establish change control policies.

q. Issues
  1. 1)        discuss the concept of common criteria;

  2. 2)        define computer matching responsibilities;

  3. 3)        define intellectual property rights;

  4. 4)        discuss legal liabilities issues;

  5. 5)        explain legal liability issues for maintenance procedures for contract employees;

  6. 6)        explain legal liability issues for maintenance procedures for local employees;

  7. 7)        discuss policy requiring separation of duties; and

  8. 8)        discuss local and national policy for national security systems monitoring.

3. THREATS AND INCIDENTS

a. Definitions

1)        define the term “adversary"; and

2)        define the term “threat.”

b. Compromise

1)        discuss the impact of a compromise by these definitions: the disclosure of classified data to an unauthorized person; an unauthorized disclosure, modification, destruction, or loss of sensitive information; disclosure of a password, or part of a password, to someone not authorized to know, have, or use the password; authorized disclosure or loss of sensitive data; and

2)        describe why the common thread among compromise definitions is “an unauthorized disclosure.”

c. Computer Crime

1)        summarize how computer crime can involve either the computer as a tool or the computer as a target; and

2)        outline the methods of computer crime: fraud, embezzlement, and unauthorized access.

d. Security Incident

3)       outline the categories of security incidents: compromise, possible compromise, inadvertent disclosure, deviation, and any adverse event associated with a computer system that is a failure to comply with departmental security regulations or directives.

e. Malicious Code

1)        define the term “malicious code”;

2)        define the term “malicious logic”; and

3)        give examples of effects of the following malicious code or logic: logic bomb, time bomb, trap door, trojan horse, virus, worm, back-door, maintenance hook, and spoofing.

f. Malicious Actions

give example of the effects of the following malicious actions: active attack, wire tapping, browsing,

covert channel, jamming, software piracy, passive attack, traffic analysis, and monitoring.

g. Non-Specific Concerns

discuss the following types of non-specific threats to systems and information: contamination, data

contamination, data corruption, and cascading.

h. Protection Techniques

discuss the effects of the following protection techniques: anti-virus program, audit analysis tools,

electronic monitoring, intrusion detection, monitoring (e.g., dataline, sniffer), and traffic analysis.

i. Incident Handling

1)        explain the role of the DAA in criminal prosecution;

2)        explain the importance of evidence acceptability in incident handling;

3)        explain the impact of evidence collection and preservation in incident handling;

4)        identify responsibilities associated with evidence collection and preservation in incident handling;

5)        discuss responsibilities for investigation of security breaches; and

6)        explain the DAA role in security violations reporting.

4. ACCESS

a. Access Concepts

1)        define the term “access";

2)        identify who can issue access authorization;

3)        discuss how access levels are determined;

4)        explain how privileges are derived from the risk management process;

5)        define the term “least privilege";

6)        explain the concept of discretionary access control; and

7)        explain the concept of mandatory access control.

b. Access Control Measures

1)        explain the purpose of access control rosters and list-based access controls as means of

2)       discretionary access control;

3)        discuss the function of access control software;

4)        discuss the purpose of role-based access controls; and

5)        state the criteria for rules-based access controls.

c. Access Tools

1)        explain how biometrics mediate access;

2)        compare the concept of access mode to attributes;

3)        determine responsibilities associated with password management;

4)        state the purpose of one-time passwords;

5)        explain the concept of single sign-on;

6)        discuss issues of smart card/token authentication;

7)        identify personnel responsible for clearance verification; and

8)        define the term “access period.”

5. ADMINISTRATIVE (DAA administrative responsibility)

a. Responsibilities for Account Administration

1)        specify local accreditation procedures;

2)        identify accreditation authority;

3)        state policy for ADP security documentation;

4)        identify ADP security staff personnel and their location;

5)        outline audit collection requirements;

6)        recognize importance of audit tools;

7)        describe business aspects of information systems security as they apply to proprietary information;

8)        state procedures for disseminating information from the Computer Emergency Response Team (CERT);

9)        state procedures for reporting to the CERT;

10)    outline procedures for providing information to or gathering information from the CSTVRP, the ASSIST, the CIAC, or the CERT, as appropriate for the organization;

11)    outline procedures for handling computer security incidents;

12)    discuss contractor security standards;

13)    outline procedures for contractor security safeguards under National Industrial Security Program Operations Manual (NISPOM);

14)    outline DAA responsibilities for contracts, agreements, and other obligations;

15)    discuss the importance of customer information technology security needs;

16)    describe the results of a customer service orientation and whether they support information systems security policy and procedures;

17)    outline policy for deletion of accounts;

18)    outline policy for required documentation;

19)    discuss the risks associated with electronic funds transfer; and

20)    discuss issues associated with electronic monitoring.

b. Administration

1)        discuss the risks associated with electronic records management;

2)        evaluate the significance of reliability testing;

3)        plan procedures which protect against remanence;

4)        discuss the purpose of security functional testing;

5)        outline security inspection procedures;

6)        describe the security product testing/evaluation process;

7)        describe DAA responsibilities for security staffing requirements;

8)        discuss the security principles related to separation of duties; and

9)        explain the concept of electronic digital signature.

6. COMSEC

a. General

1)        explain the impact of a COMSEC compromise;

2)        outline responsibilities for COMSEC accounting;

3)        identify the COMSEC custodian or COMSEC manager;

4)        explain how COMSEC material destruction and procedures can affect INFOSEC;

5)        describe methods of COMSEC material identification;

6)        identify responsibilities for COMSEC policy and guidance; and

7)        identify responsibilities associated with a controlling authority.

b. Technology

1)        identify cryptographic techniques;

2)        summarize the importance of the Electronic Key Management System to INFOSEC;

3)        evaluate encryption modes;

4)        define private key cryptography;

5)        define public key encryption;

6)        explain the concept of protective technology;

7)        discuss how the concept of two-person control may enhance information systems security; and

8)        associate voice communication security with INFOSEC.

7. TEMPEST

a. General

1)        identify the TEMPEST manager for your agency;

2)        list the responsibilities of the TEMPEST manager;

3)        identify the Certified TEMPEST Technical Authority (CTTA);

4)        list the responsibilities of the CTTA;

5)        discuss the principle of compromising emanations in relation to INFOSEC; and

6)        define the term “control zone.”

b. Technical

1)        discuss the principle of electromagnetic interference in relation to INFOSEC;

2)        explain the concept protected distribution system to include: approved telecommunications system for the transmission of unencrypted sensitive information; system must have safeguards: electromagnetic, physical, acoustical, electrical, and the transmission may be optical or electrical;

3)        discuss the red/black concept;

4)        define the term “shielded enclosures"; and

5)        compare a TEMPEST zone to a shielded enclosure.

8. GENERAL

a. Introductory

1)        explain information security problems which may occur at an access node;

2)        explain the property of accountability to include: traceability of activities to individual users; assigning responsibility for violations, attempted violations, and activities;

3)        explain the purpose for the Assessed Products List (APL);

4)        define the term “approved circuit";

5)        discuss why authentication is an important process in INFOSEC to include:

n         (a) positive validation for a claimed identity which may be: station, originator, individual, transmission, message, user, device;

n         (b) positive validation may also be called: identification or verification; and

n         (c) protective measure used to deter fraudulent transmissions.

6)        identify who is involved in the Authorization process (the DAA, his/her designee(s), and the A-8.ANNEX A to extent of their authority) in your organization;

7)        describe the resources and methods of an automatic message processing system; and

8)        list general operations security (OPSEC) principles and sources of information.

b. DAA Authority

1)        explain the objectives of the information systems security program: availability, denial of service, confidentiality, integrity;

2)        outline the business aspects of information security;

3)        describe the components of a classified COMSEC program;

4)        explain why compartmentalization is an important aspect of INFOSEC;

5)        describe how connectivity impacts both your systems and external systems;

6)        define the term “critical processing";

7)        identify critical systems within your purview;

8)        describe how criticality is a parameter which indicates the degree of dependence of your organization on an asset;

9)        explain the purposes for a computer security working group;

10)    define the term “data owner";

11)    explain the purpose for degaussing magnetic media;

12)    explain why the disposition of classified data is important for secure processing;

13)    demonstrate the differences between INFOSEC education, training, and awareness (ET&A);

14)    illustrate how electronic data interchange (EDI) is susceptible to security incidents;

15)    describe the contents of the Evaluated Products List (EPL);

16)    outline the principles of ethics as they apply to INFOSEC;

17)    identify the ISSO in your agency;

18)    define the term “INFOWAR";

19)    outline the INFOSEC dangers in the National Information Infrastructure;

20)    compare open system security and closed security;

21)    describe operating system security features;

22)    define the term “platform specific security;”

23)    list the importance of maintaining professional interfaces;

24)    identify professional interfaces;

25)    illustrate the importance of quality assurance to INFOSEC;

26)    explain the importance of security architecture in a distributed system;

27)    list the forms in which security products are available: hardware, firmware, software;

28)    identify sensitive systems for which you are responsible;

29)    outline the components of technical security as listed in NSD 42: equipment, components, devices, associated documentation, media;

30)    define the term “trust” as it applies to INFOSEC;

31)    apply the term “warranties (assurance)” to the concept of INFOSEC; and

32)    explain the consequences of improper or damaged cabling.

9. LIFE CYCLE MANAGEMENT

a. Role

1)        discuss the DAA role and responsibilities associated with life cycle management;

2)        discuss the DAA role and responsibility in acquisition;

3)        discuss the DAA role in development life cycle phase; and

4)        outline responsibilities for validation reporting.

b. Impact

1)       discuss the importance of an acceptance inspection;

2)       outline responsibilities associated with an acceptance test;

3)       discuss the impact of an acceptance trial;

4)       explain the impact of a critical design review (CDR);

5)       describe the value of a contract data requirements list (CDRL);

6)       recognize the importance of conformance testing;

7)       evaluate the significance of requirements traceability in INFOSEC; and

8)       compare a software architecture study and system security architecture study.

10. CONTINUITY OF OPERATIONS (COOP)

a. COOP Concepts

1)       explain how alternate routing can affect INFOSEC measures;

2)       compare PBX security and alternate routing;

3)       compare application development control to COOP;

4)       distinguish between backup, contingency, disaster, and recovery plans;

5)       discuss the importance of continuity of operations;

6)       define the elements of a continuity plan;

7)       outline the procedures for continuity planning;

8)       examine the relation of emergency destruction procedures to COOP;

9)       associate the risks associated with environmental/natural threats to COOP to include: wind, earth

10)   movement, fire, water, dust, temperature, humidity static, and power;

11)   recognize system fault tolerance limits;

12)   recommend basic recovery procedures;

13)   evaluate the importance of redundancy to COOP; and

14)   explain how the system testing & evaluation process relates to COOP.

b. Backup

1)       outline the responsibilities associated with a backup plan; and

2)       specify backup procedures.

c. Configuration Management

1)       discuss how change controls affect COOP;

2)       discuss the role of the Configuration Control Board;

3)       specify configuration controls;

4)       explain the purpose of configuration documentation maintenance; and

5)       discuss the role of the Configuration Review Board.

d. Contingency Management

1)       define contingency planning;

2)       specify the requirements within a contingency plan; and

3)       specify requirements for contingency plan testing.

e. Disaster Recovery

1)       discuss the actions required by disaster recovery planning; and

2)       clarify the importance of disaster recovery plan testing.

f. Storage Area Controls

1)        justify the importance of storage area controls;

2)        explain the contents of storage area controls;

n         (a) backup of data, information, software;

n         (b) protection of the original diskettes for software;

n         (c) protection of the storage media;

n         (d) storage area locale; and

n         (e) storage area access; and

1)        compare storage media protection and control to storage area controls.

11. RISK MANAGEMENT

a. General

illustrate the following in the risk acceptance process:

n         (a) differentiate between risk, threat, and vulnerability;

n         (b) explain the purpose of a risk assessmen;

n         (c) clarify the term “residual risk";

n         (d) outline the process of a risk analysis;

n         (e) identify the individual responsible for determining an acceptable level of risk;

n         (f) differentiate between a cost-benefit analysis and a cost-risk analysis for the purpose of risk management;

n         (g) identify the automated risk evaluation system used by system certifiers;

n         (h) explain the benefits of conducting a threat assessment;

n         (i) define the term “acceptance";

n         (j) determine what constitutes acceptance certification for the systems for which you are responsible; and

n         (k) describe the similarities and differences between the risk analysis process and the OPSEC process.

b. Responsibility

1)        assign responsibilities associated with accreditation for the systems for which you are responsible;

2)        identify vulnerabilities resulting from add-on security;

3)        identify vulnerabilities resulting from propagation of risk;

4)        describe when aggregation of data becomes a risk;

5)        describe how the OPSEC process is used to assess the risk posed by aggregated data acquired through the entire spectrum of intelligence collection systems of the threat;

6)        assign responsibilities for applications security;

7)        determine the procedures for granting approval to operate;

8)        outline the mechanisms which provide assurance;

9)        give an example of a breach;

10)    outline DAA responsibilities for a certification and accreditation program; and

11)    distinguish between certification as a process and as a decision.

c. Procedures & Techniques

1)        complete the following regarding media and memory:

n         (a) compare the processes of clearing, purging, and degaussing;

n         (b) explain why remanence is an important factor in risk management;

n         (c) contrast non-volatile memory with volatile memory;

n         (d) explain the importance for written procedures in the disposition of classified information recorded as media and data;

2)        describe common carrier security protection applicable to risk management;

3)        explain the requirements for each of the modes of operation:

n         A-11.compartmented/partitioned mode,

n         controlled security mode,

n         dedicated mode,

n         multilevel security mode,

n         system high security mode;

4)        determine policies related to decertification;

5)        describe the types of documentation which are important in the risk management process;

6)        define the term “environmental controls";

7)        define the term “evaluation";

8)        outline procedures for “generic accreditation";

9)        identify which identification and authentication techniques are implemented in the risk management process, and evaluate the merits of the techniques;

10)    explain the importance of information sensitivity in the risk management process;

11)    outline procedures for granting interim approval;

12)    explain how intrusion detection can be accomplished;

13)    describe the reasons for joint accreditation;

14)    explain the purpose of a maintenance hook;

15)    describe metrics used by the DAA in the risk management process;

16)    explain the purpose of monitoring (e.g., dataline, sniffer) in the assessment process;

17)    explain the DAA role in multiple accreditation;

18)    explain how firewalls form a protection technique;

19)    determine the procedures involved in an operational procedures review;

20)    illustrate the purpose of penetration testing;

21)    describe the concept of periods processing;

22)    define the term risk management;

23)    state the DAA’s responsibility in establishing security policy;

24)    describe the importance of separation of duties;

25)    outline the DAA’s responsibility for storage area controls;

26)    outline the DAA’s responsibility for storage media protection and control;

27)    identify vulnerabilities arising from system integration;

28)    discuss the concept of a trusted computing base; and

29)    explain the concept of a trusted path.