Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
Beyond Top Secret

Beyond Top Secret

|Views: 26|Likes:
Published by Ecinas

More info:

Published by: Ecinas on May 30, 2012
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





How theCIA, NSA and DIA protect sensitive informationAnd how the same techniques can protect a corporation
Hal Walter Hwalter@email.uncc.edu Phone: (704) 687-4660
Ten years ago, the idea that a company would need security equal to that of the CentralIntelligence Agency, the National Security Agency or Defense Intelligence agencies might haveseemed alarmist. However, in today’s business environment, corporations often require anequivalent level of protection for critical and sensitive proprietary information. The goal of thisguide is to enable a CEO, CIO, CISO, or business owner to understand the risks and apply someof the same tools, concepts and practices to safe guard information and communications aboveand beyond the norm. A business needs a place, be it a room, a building or an entire plant whereextremely sensitive information may be discussed, managed, transmitted and stored withoutconcern for interception, misuse or unauthorized dissemination. This guide shows how thesehighly secretive agencies protect their most sensitive information and how that same level of  protection can be applied to the corporate environment.
This guide provides a step by step plan for developing, implementing and enforcing acomprehensive Information Security program for your organization. The guide is based uponcriteria established by the U.S. military for the security of strategic and tactical intelligence, theManual for Physical Security Standards for Sensitive Compartmented Information established bythe Central Intelligence Agency of the United States of America and the National SecurityAgency’s published standards for protecting the confidentiality, integrity and availability of Sensitive Compartmented Information.While it is generally neither necessary nor cost effective to apply all the standards of Sensitive Compartmented Information Facility design and control to a business setting,nonetheless, some degree of information security may be obtained by careful and thoughtfulapplication of the processes and practices used to protect the nation’s most closely held secrets.Understanding that security starts and ends not with technology but with people, it becomesincumbent upon business leaders to design, establish, implement and enforce a well consideredsecurity capability to protect sensitive corporate secrets.Information Security classifications within the federal government are generally of one of three well known types:
: Applied to information or material the unauthorized disclosure of whichcould reasonably be expected to cause damage to national security.

Activity (4)

You've already reviewed this. Edit your review.
1 hundred reads
zaheer786110 liked this
edmondo_257327474 liked this
jeffrocket liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->