Index
This index is organized alphabetically by topic and by subtopic within
topic. Topics and subtopics are identified by paragraph number.
- Access control
- Passwords for, 2-15
- Physical security, 2-10
- System, 2-3
- Accountability
- Media, 2-20
- System, 2-3
- Accreditation
- Authorities for, 1-6, 2-1, 3-1, 3-8
- Categories of, 2-2
- General information on, 3-1
- Generic, 3-2
- Grouping computers for, 3-3
- Operational, 3-3
- Process of, 3-5
- Protection or classification of, 3-5
- Records of, 1-6, 3-7
- Renewal of, 3-1, 3-6
- Sample approval statement for, fig 3-1
- Sample format for, app C
- Automated Information Systems Security
- Assessment Program, 1-17, 2-30
- Army Information Systems Security
- Program, 1-6
- Automated Message Processing Exchange
- System, 1-1
- Audit trails, 2-3, 2-5
- Battlefield automated systems, 2-26
- Certification, 3-4
- Clearing (AIS Media), 2-21
- Communications security
- Basic policy for, 3-1
- Classified information, 4-2
- Data Encryption Standard, 4-1
- Protected distribution systems, 4-5
- Radio, 4-4
- Remote terminal, 2-24
- Unclassified-sensitive information, 4-3
- Configuration management, 2-4
- Construction standards
- Central computer facility, 2-11
- Computer room, 2-12
- Continuity of operations planning, 2-1, 2-23
- Data availability, confidentiality, and
- integrity, 1-5
- Database management systems, 2-5
- Declassifying (media). See media,
- declassifying
- Dedicated security mode. See security processing modes, dedicated
- Degaussing, 2-21
- Employee-owned computers, 2-25
- Hardware security, 2-8, 2-9
- Incidents (AIS), 2-28
- Information Systems Security
- Basic policy on, 1-6
- Identifying requirements for, 1-7, 2-1
- Information Systems Security Manager, 1-6
- Information Systems Security Officer, 1-6
- Information Systems Security Program Manager, 1-6
- Intelligence information, 2-1, 3-9
- Media
- Clearing, 2-21
- Declassifying, 2-21
- Destruction of, 2-21
- Marking, 2-20
- Purging, 2-21
- Multilevel security mode. See security processing modes, multilevel
- Network security, 2-23
- Network security officer, 1-6
- Partitioned security mode. See security processing modes, partitioned
- Passwords
- Generation and control of, 2-15
- Minimum length, 2-15
- Personnel Security
- Briefing, as part of, 2-16
- Foreign nationals, 2-18
- Maintenance personnel and, 2-9
- Security clearance requirements for, 2-17
- Training and awareness for, 2-16
- Physical security, 2-10, 2-11, 2-12, 2-13
- Procedural security, 2-14, 2-15
- Reaccreditation, 3-6
- Responsibilities
- Army MACOM commanders, 1-4
- Assistant Secretary of the Army for Research, Development and Acquisition, 1-4
- Commanding General, United States Army Information Systems Command, 1-4
- Commanding General, United States Army Intelligence and Security Command, 1-4
- Commanding General, United States Army Materiel Command, 1-4
- Commanding General, United States Army Training and Doctrine Command, 1-4
- Deputy Chief of Staff for Intelligence, 1-4
- Deputy Chief of Staff for Logistics, 1-4
- Deputy Chief of Staff for Operations and Plans, 1-4
- Director of Information Systems for Command, Control, Communications, and Computers, 1-4
- Program Executive Officer, 1-4
- Risk analysis management, 5-1
- Security processing modes
- Dedicated, 2-2
- Multilevel, 2-2
- Partitioned, 2-2
- Systems High, 2-2
- Sensitivity levels, 2-2
- Separation of duties, 2-14
- Single Integrated Operational Plan-Extremely Sensitive Information, 1-1
- Software design and maintenance, 2-7
- Software security
- Design implications for, 2-7
- General provisions for, 2-4
- Public domain software and, 2-4
- Security packages and, 2-4
- Special access program information, 1-1
- System high security mode, see security processing modes, systems high
- Terminal area security officer, 1-6
- Time-outs, 2-24
- Training and awareness, 2-16
- Unclassified-sensitive information
- Accreditation of, 2-2
- Communication security requirements for, 4-3
- Definition and division into categories of, 1-5
- Worldwide Military Command and Control Systems, 1-1