Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
P. 1
NCSC-TG-027 a Guide to Understanding ISSO Responsibilites for Automated Information Systems

NCSC-TG-027 a Guide to Understanding ISSO Responsibilites for Automated Information Systems

Ratings: (0)|Views: 12|Likes:
Published by Robert Vale
NCSC Rainbow Series book
NCSC Rainbow Series book

More info:

Published by: Robert Vale on Aug 29, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

09/23/2013

pdf

text

original

 
NCSC-TG-027
 
VERSION-1
 
NATIONAL
 
COMPUTER
 
SECORITYf
 
^.CENTER
 
NATIONAL
 
COMPUTER
 
SECURITY
 
CENTER
 
A
 
GUIDE
 
TO
 
UNDERSTANDING
 
INFORMATION
 
SYSTEM
 
SECURITY
 
OFFICER
 
RESPONSIBILITIES
 
FOR
 
AUTOMATED
 
INFORMATION
 
SYSTEMS
 
19980309
 
256
 
MAY
 
1992
 
HOSE
 
«TURK
 
flfc
 
BMD
 
TECHNICAL
 
INFORMATION
 
ttNTf»
 
BALLISTIC
 
MISSILE
 
OEFENSE
 
ORGANIZATION
 
WASHINGTON)
 
Approved
 
for
 
Public
 
Release:
 
Distribution
 
Unlimited
 
U37^0
 
 
Accession
 
Number:
 
3720
 
Publication
 
Date:
 
May
 
01,
 
1992
 
Title:
 
Guide
 
to
 
Understanding
 
Information
 
System
 
Security
 
Officer
 
Responsibilities
 
for
 
Automated
 
Information
 
Systems
 
Corporate
 
Author
 
Or
 
Publisher:
 
National
 
Security
 
Agency,
 
9800
 
Savage
 
Road,
 
Fort
 
Meade,
 
MD
 
20755-6000
 
Report
 
Number:
 
NCSC-TG-027
 
Report
 
111-91
 
Report
 
Number
 
Assigned
 
by
 
Contract
 
Monitor:
 
Library
 
No.
 
S-238,461
 
Comments
 
on
 
Document:
 
Final
 
Report
 
Descriptors,
 
Keywords:
 
Mode
 
Operation
 
Physical
 
Security
 
Administrative
 
Configuration
 
Management
 
Access
 
Control
 
Risk
 
Audit
 
Pages:
 
00071
 
Cataloged
 
Date:
 
Aug
 
20,1992
 
Document
Type:
 
HC
 
Number
 
of
 
Copies
 
In
 
Library:
 
000001
 
Record
 
ID:
 
24623
 
 
NCSC-TG-027
 
Library
 
No.
 
S-238,461
 
Version-1
 
FOREWORD
 
The
 
ational
 
omputer
 
ecurity
 
enter
 
s
 
ssuing
 
uide
 
o
 
nderstanding
 
Information
 
ystem
 
ecurity
 
fficer
 
esponsibilities
 
or
 
utomated
 
nformation
 
Systems
 
s
 
art
 
f
 
he
 
Rainbow
 
Series"
 
f
 
ocuments
 
ur
 
Technical
 
Guidelines
 
Program
 
produces.
 
n
 
the
 
Rainbow
 
Series,
 
we
 
discuss
 
n
 
etail
 
the
 
eatures
 
f
 
the
 
Department
of
 Defense
 
Trusted
 
Computer
 
System
 
Evaluation
 
Criteria
 
(DOD
 
5200.28-
 
STD)
 
and
 
rovide
 
guidance
 
or
 
meeting
 
ach
 
equirement.
 
he
 
National
 
Computer
 
Security
 
enter,
 
hrough
 
ts
 
rusted
 
roduct
 
valuation
 
rogram,
 
valuates
 
he
 
security
 
eatures
 
f
 
ommercially-produced
 
omputer
 
ystems.
 
ogether,
 
hese
 
programs
 
nsure
 
hat
 
rganizations
 
re
 
apable
 
f
 
rotecting
 
heir
 
mportant
 
ata
 
with
 
trusted
 
computer
 
systems.
 
A
 
Guide
 
o
 
Understanding
 
nformation
 
ystem
 
Security
 
Officer
 
Responsibilities
 
for
 
utomated
 
nformation
 
ystems
 
elps
 
nformation
 
ystem
 
ecurity
 
fficers
 
(ISSOs)
 
understand
 
their
 
responsibilities
 
for
 
implementing
 
and
 
maintaining
 
security
 
in
 
a
 
ystem.
 
he
 
ystem
 
may
 
e
 
emote
 
ite
 
inked
 
o
 
etwork,
 
tand-alone
 
automated
 
nformation
 
ystem,
 
r
 
orkstations
 
nterconnected
 
ia
 
ocal
 
rea
 
network.
 
his
 
uideline
 
lso
 
iscusses
 
he
 
oles
 
nd
 
esponsibilities
 
f
 
ther
 
individuals
 
who
 
re
 
esponsible
 
or
 
ecurity
 
nd
 
heir
 
elationship
 
o
 
he
 
SSO,
 
s
 
defined
 
in
 
various
 
component
 
regulations
 
and
 
standards.
 
I
 
nvite
 
our
 
uggestions
 
or
 
evising
 
his
 
ocument.
 
e
 
lan
 
o
 
eview
 
his
 
document
 
as
 
the
 
need
 
arises.
 
Patrick
 
R.
 
Gadägher,
 
ÜZ^S
 
ay
 
1992
 
Director
 
National
 
Computer
 
Security
 
Center
 

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->