Preview

Information

Powerful Essays
Open Document
Open Document
6019 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information
NSTISSI No. 4011 20 June 1994

NSTISS
NATIONAL SECURITY TELECOMMUNICATIONS AND INFORMATION SYSTEMS SECURITY

NATIONAL TRAINING STANDARD FOR INFORMATION SYSTEMS SECURITY (INFOSEC) PROFESSIONALS

NSTISS
NATIONAL SECURITY TELECOMMUNICATIONS AND INFORMATION SYSTEMS SECURITY

NATIONAL MANAGER

FOREWORD

1. This instruction provides the minimum course content for the training of information systems security (INFOSEC) professionals in the disciplines of telecommunications security and automated information systems (AIS) security. 2. Representatives of the National Security Telecommunications and Information Systems Security Committee may obtain additional copies of this instruction from: Executive Secretariat National Security Telecommunications and Information Systems Security Committee National Security Agency Fort George G. Meade, MD 20755-6000 3. U.S. Government contractors are to contact their appropriate government agency or Contracting Officer Representative regarding distribution of this document.

J. M. McCONNELL Vice Admiral, U.S. Navy

NSTISSI No. 4011

NATIONAL TRAINING STANDARD FOR INFORMATION SYSTEMS SECURITY (INFOSEC) PROFESSIONALS

PURPOSE . . . . . . . . SCOPE AND APPLICABILITY REFERENCES. . . . . . . RESPONSIBILITIES. . . . TRAINING STANDARD . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

SECTION I II III IV V

SECTION I - PURPOSE 1. This instruction establishes the minimum training standard for the training of information systems security (INFOSEC) professionals in the disciplines of telecommunications and automated information systems (AIS) security.

SECTION II - SCOPE AND APPLICABILITY 2. National Security Telecommunications and Information Systems Security Directive No. 501 establishes the requirement for federal departments and agencies to implement training programs for INFOSEC professionals. As defined in NSTISSD 501, an INFOSEC professional



References: [CHR90]Interview with Agent Jim Christy, Chief, Air Force Office of Special Investigations, Computer Crime Division, 26 March 1990. [DOD85]Department of Defense Trusted Computer System Evaluation Criteria, DoD 5200.28-STD, Department of Defense, Washington, DC, December 1985. [DOJ88]Basic Considerations in Investigating and Proving Computer-Related Federal Crimes, U.S. Department of Justice, Justice Management Division, Washington, DC, November 1988. [HIG89]Higgins, John C., Information Security as a Topic in Undergraduate Education of Computer Scientists, Proceedings of the 12th National Computer Security Conference, November 1989. [MAC89]Maconachy, W.V., Computer Security Education, Training, and Awareness: Turning a Philosophical Orientation into Practical Reality, Proceedings of the 12th National Computer Security Conference, November 1989. [OTA87]U.S. Congress, Office of Technology Assessment, Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information, OTA-CIT-310, Washington, DC, U.S. Government Printing Office, October 1987. [PFL89]Pfleeger, Charles P., Security in Computing, PrenticeHall, 1989. ANNEX TO NSTISSI No. 4011

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    CMGT582 Wk2 IA

    • 1133 Words
    • 4 Pages

    This instruction obligates that “all information assurance (IA) and IA-enabled IT products incorporated into DOD information systems shall be configured in accordance with DOD approved security configuration guidelines”. This mandate provides that recommendations delineated in STIG checklists, will ensure DOD environments address those security requirements.…

    • 1133 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    This course covers much material about information security in a few short weeks. Whereas the subject is much deeper than what is covered in the course material, you should obtain a useful overview of how important effective information security is, and some ways it can be effectively…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 7 Week 7

    • 594 Words
    • 3 Pages

    This concentration was developed in conjunction with the U.S. National Security Agency (NSA) providing an invaluable tool for any systems security engineering professional. CISSP-ISSEP is the guide for incorporating security into projects, applications, business processes, and all information systems. Security professionals are hungry for workable methodologies and best practices that can be used to integrate security into all facets of business operations(New Horizon,2016)…

    • 594 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    cu2963

    • 874 Words
    • 4 Pages

    This aim is to meet the new requirements of legislation and the objective is to ensure that all staff, services users understand and follow the guidance for their own safety.…

    • 874 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    . . . . . . . . . . . . . . . . . . . . . . . .…

    • 4797 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    ANNEX J – Information Assurance (All Users) J-1 BN COMSEC Procedures 1. References. a. USASOC Pam 25-1, Information Mission Area Procurement. b. USASOC Pam 25-2, Personal Use of Government-Owned IMA Resources Guide. c.…

    • 2469 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    The training objectives should be as follows: Should be able to establish supervisory skills, the computer skills required are spreadsheet applications and word processing. Should be able to correspond completely with others, conflict management, and solving problems. These objectives would be bound together due to trainees needing all these requirements to receive supervision, as well as the skill to supervise. The training would be to establish all of these skills.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ms Lucy Godfrey

    • 3239 Words
    • 13 Pages

    Each employee should be given such information, instruction and training as is necessary to enable the safe…

    • 3239 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Case 7.1 Anne Aylor

    • 1970 Words
    • 8 Pages

    . . . . . . . . . . . . . . . . . . . . . . .…

    • 1970 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Info

    • 352 Words
    • 2 Pages

    2. Create five questions in French to ask a partner. The questions should include asking your partner his or her name and questions about his or her likes and dislikes.…

    • 352 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    . . . . . . . . . . . . . . . . . . . . . . . .…

    • 7804 Words
    • 32 Pages
    Satisfactory Essays
  • Powerful Essays

    For use in Apprenticeships for Contact Centres, IT User, IT Services and Development and Communication Technology (Telecoms)…

    • 2167 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Diverse Workforce

    • 595 Words
    • 4 Pages

     the aim is to provide training to look more at what can be done and what should…

    • 595 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Question Bank On OHE 2

    • 24956 Words
    • 251 Pages

    subject for newly recruited technical staff and they are trained by various training institutes in…

    • 24956 Words
    • 251 Pages
    Good Essays