AR 380-19 Information Systems Security


Index

This index is organized alphabetically by topic and by subtopic within topic. Topics and subtopics are identified by paragraph number.

Access control
Passwords for, 2-15
Physical security, 2-10
System, 2-3
Accountability
Media, 2-20
System, 2-3
Accreditation
Authorities for, 1-6, 2-1, 3-1, 3-8
Categories of, 2-2
General information on, 3-1
Generic, 3-2
Grouping computers for, 3-3
Operational, 3-3
Process of, 3-5
Protection or classification of, 3-5
Records of, 1-6, 3-7
Renewal of, 3-1, 3-6
Sample approval statement for, fig 3-1
Sample format for, app C
Automated Information Systems Security
Assessment Program, 1-17, 2-30
Army Information Systems Security
Program, 1-6
Automated Message Processing Exchange
System, 1-1
Audit trails, 2-3, 2-5

Battlefield automated systems, 2-26

Certification, 3-4
Clearing (AIS Media), 2-21
Communications security
Basic policy for, 3-1
Classified information, 4-2
Data Encryption Standard, 4-1
Protected distribution systems, 4-5
Radio, 4-4
Remote terminal, 2-24
Unclassified-sensitive information, 4-3
Configuration management, 2-4
Construction standards
Central computer facility, 2-11
Computer room, 2-12
Continuity of operations planning, 2-1, 2-23

Data availability, confidentiality, and
integrity, 1-5
Database management systems, 2-5
Declassifying (media). See media,
declassifying
Dedicated security mode. See security processing modes, dedicated
Degaussing, 2-21

Employee-owned computers, 2-25

Hardware security, 2-8, 2-9

Incidents (AIS), 2-28
Information Systems Security
Basic policy on, 1-6
Identifying requirements for, 1-7, 2-1
Information Systems Security Manager, 1-6
Information Systems Security Officer, 1-6
Information Systems Security Program Manager, 1-6
Intelligence information, 2-1, 3-9

Media
Clearing, 2-21
Declassifying, 2-21
Destruction of, 2-21
Marking, 2-20
Purging, 2-21
Multilevel security mode. See security processing modes, multilevel

Network security, 2-23
Network security officer, 1-6

Partitioned security mode. See security processing modes, partitioned
Passwords
Generation and control of, 2-15
Minimum length, 2-15
Personnel Security
Briefing, as part of, 2-16
Foreign nationals, 2-18
Maintenance personnel and, 2-9
Security clearance requirements for, 2-17
Training and awareness for, 2-16
Physical security, 2-10, 2-11, 2-12, 2-13
Procedural security, 2-14, 2-15

Reaccreditation, 3-6
Responsibilities
Army MACOM commanders, 1-4
Assistant Secretary of the Army for Research, Development and Acquisition, 1-4
Commanding General, United States Army Information Systems Command, 1-4
Commanding General, United States Army Intelligence and Security Command, 1-4
Commanding General, United States Army Materiel Command, 1-4
Commanding General, United States Army Training and Doctrine Command, 1-4
Deputy Chief of Staff for Intelligence, 1-4
Deputy Chief of Staff for Logistics, 1-4
Deputy Chief of Staff for Operations and Plans, 1-4
Director of Information Systems for Command, Control, Communications, and Computers, 1-4
Program Executive Officer, 1-4
Risk analysis management, 5-1

Security processing modes
Dedicated, 2-2
Multilevel, 2-2
Partitioned, 2-2
Systems High, 2-2
Sensitivity levels, 2-2
Separation of duties, 2-14
Single Integrated Operational Plan-Extremely Sensitive Information, 1-1
Software design and maintenance, 2-7
Software security
Design implications for, 2-7
General provisions for, 2-4
Public domain software and, 2-4
Security packages and, 2-4
Special access program information, 1-1
System high security mode, see security processing modes, systems high

Terminal area security officer, 1-6
Time-outs, 2-24
Training and awareness, 2-16

Unclassified-sensitive information
Accreditation of, 2-2
Communication security requirements for, 4-3
Definition and division into categories of, 1-5

Worldwide Military Command and Control Systems, 1-1