The Security Plan: Effectively Teaching How To Write One
|
|
|
- Cory Woods
- 9 years ago
- Views:
Transcription
1 The Security Plan: Effectively Teaching How To Write One Paul C. Clark Naval Postgraduate School 833 Dyer Rd., Code CS/Cp Monterey, CA Abstract The United States government requires all federal systems to have a customized security plan. In addition, the National Training Standard for Information Systems Security (INFOSEC) Professionals requires programs that meet this standard to produce students capable of developing a security plan. The Naval Postgraduate School (NPS) teaches courses that comply with several CNSS standards, and therefore requires students to develop a security plan for a hypothetical scenario. Experience in these courses has shown that the same strategies for teaching high school students how to write a research report can successfully be used to teach university students how to write a security plan that is compliant with NIST guidelines. KEYWORDS: Education, Information assurance, Computer security, Security Plan Introduction The purpose of the security plan is to provide an overview of the security requirements of the system and describe the controls in place or planned for meeting those requirements. [1] In order to ensure security in Information Systems, the Office of Management and Budget (OMB) has declared that all United States (U.S.) federal agencies must incorporate a security plan that is consistent with NIST guidance on security planning. [2] To further emphasize its importance, the Computer Security Act of 1987 makes it a legal requirement for federal systems to have a security plan. [3] It would therefore be desirable for all college graduates with a desire to work in Information Assurance (IA) careers in the U.S. Government to be able to read, understand, and execute the policies and standards of a security plan. In addition, at some point, IA professionals may need to write or modify a security plan, so there is a benefit to teaching students how to formulate a security plan. Of course, this education would also benefit those who intend to work in the private sector, where security plans may not be required, but are considered a good foundation to an effective computer security program. In addition to the hard requirement to maintain a security plan, the Committee for National Security Systems (CNSS), formerly known as the National Security Telecommunications and Information Security Committee (NSTISSC), has issued educational standards for Information-Assurance-related positions, many of which require some level of ability 1
2 with respect to security plans. For example, Issuance No. 4011, National Training Standard for Information Systems Security (INFOSEC) Professionals, expects graduates of compliant courses to be able to build a security plan. [4] The Naval Postgraduate School (NPS) Center for Information Systems Security Studies and Research (CISR) supports the teaching of many courses in the Computer Science department that are dedicated to Information Assurance education. [5] One of these courses, Secure Management of Systems, is the capstone of a series of courses that meet the educational requirements of three CNSS training standards, including No Therefore, one of the projects in this course is the development of a security plan. This paper describes our experience and lessons learned from requiring students to write a security plan as part of Secure Management of Systems. Educational Expectations and Roadmap A project as big as a security plan should be started early in the term, which at NPS is a 12- week quarter. Starting such a project in the first or second week of class would not be possible if the students did not already have some IA education or background. For Secure Management of Systems, the following courses are prerequisites: Computer Architecture Computer Communications and Networks Introduction to Information Assurance The purpose, scope, and content of a security plan are covered in the first week of lecture. Several outlines for a security plan are shown from the following sources: OMB Circular A-130 [2] NIST Special Publication [1] Director of Central Intelligence Directive (DCID) 6/3 [6] This provides a framework for the remainder of the course. Lectures cover material not addressed in prerequisite courses, filling in the gaps not covered, such as contingency planning and physical security. The Scenario Secure Management of Systems has been taught for many years, but the security plan assignment has been in place since the Spring quarter of Over 200 students have completed the course since then, providing a wealth of experience, for both the students and their instructor. In order to write a security plan, one needs a site to study. This can be done at an operational facility close to the school, but this is difficult to manage when many students are enrolled in the course, and can be timeintensive for the employees of the site. There is also the site s concern about the compromise of real data, and the impact on its reputation if the site does not have very good security to begin with. Therefore, it is often easier to develop a hypothetical written scenario, or an anonymized written description of a real site. The current method of choice for the instructors at NPS is to use a hypothetical scenario. The students prefer the live site. Developing a hypothetical scenario is no small feat. It requires a written description that has sufficient detail to allow the students to analyze the security of the site without constantly sending the instructor questions via , or taking up too much time in class. The scenario minimally requires the following details: Agency name. 2
3 Agency mission. High-level network diagram. A description of hardware and software assets. A description of the physical and logical security currently in place. Floor diagram(s). Organization chart(s). Some recent bad experiences. The description that was used most recently at NPS was nearly 1,400 words long. It produced a manageable number of student questions during the quarter. It was written from the point of view that the student has been hired as a contractor to write the required security plan. For debugging purposes, it was helpful for the instructor to actually sketch out a security plan for the draft scenario to see where the holes were in the description that might prevent the student from completing each part of the plan. An unintended benefit of the scenario is the ability to reference the hypothetical site while discussing security topics throughout the quarter. Template The first time the security plan was assigned, no particular outline for the completed project was made mandatory. That was a mistake. First, some students could not handle that much leeway and required more guidance to get started. Second, it made grading much more difficult and time consuming because each plan was unique. For example, it was much harder to determine if all aspects of the security plan were covered adequately. The second time the security plan was assigned, a template was provided to the students. It contained a mandatory outline, constructed by the instructor, to be followed by all students. This resulted in a big improvement, but there were still too many questions from the students about details of the security plan s structure. For the fourth iteration of the assignment, the outline from the NIST Guide [1] was used as the mandatory format. This not only provided the students with a standard format that they may encounter in their careers, but it came with a textbook on what needed to go in each section. It still required some interpretation from time to time, but it allowed the students to work independently from the instructor, which reduced stress for both sides. However, to make sure that there was a consistent look and feel across all submissions, a template of the NIST outline was still provided by the instructor. Assignments Another lesson learned through the first two installments of the security plan assignment was that, left on their own, most students waited until the end of the quarter to do any significant work on the quarter-long project, despite constant urgings and warnings. This resulted in lower quality work from the students, and therefore lower grades than they were otherwise capable of earning. In addition, it lessened the learning experience. Therefore, in the fourth iteration, the project was divided into seven smaller units, with established due dates. This forced the procrastinators to work on the project throughout the quarter, and it gave them feedback as they were going. The drawback to the instructor was an increase in work that had to be graded, recorded and returned. However, this is an approach that is used to teach high school students how to write a research paper: it breaks down the problem until it is manageable, and requires intermediate work along the way. 3
4 With respect to grading, the intermediate assignments were not assigned large point values, nor were they heavily scrutinized. They were treated as low value homework assignments because, otherwise, the security plans would have been graded twice: once for each intermediate deliverable, and once for the final complete version. With a smaller number of students it might have been possible to assign grades to the intermediate work that were more indicative of the quality of work. With respect to the NIST Guide and the standard security plan outline, the following is a short description of the seven intermediate assignments: 1. Read the scenario description, look over the template, and read the Executive summary and Section 1 of the NIST Guide. The students were then required to turn in answers to several questions relative to the above reading. 2. Read Section 2 of the NIST Guide. Determine whether the system described in the scenario is a Major Application or a General Support System. How this question is answered determines which NIST outline is used. 3. Read Section 3 of the NIST Guide. Complete section 1 (System Identification) of the security plan. 4. Read Section 4 of the NIST Guide. While referring to appendix C of the Guide, complete the following sections of the security plan: 2.2, Review of Security Controls; 2.3, Rules of Behavior; and 2.5, Authorize Processing. 5. Read Sections 5 and 6 of the NIST Guide. For only those controls currently in place, complete the following sections of the security plan: Section 3, Operational Controls; 4.1, Identification and Authentication; and 4.2, Logical Access Controls. 6. Complete the following sections of the security plan: Section 2.1, Risk Assessment and Management; and 2.4, Planning for Security in the Life Cycle. 7. Complete any subsections that were not already assigned, and add in all other controls necessary for secure operation of the site. The 7 th assignment produces a completed security plan. For the students to be able to identify the controls that need to be added to the system in assignment 7, they need to be taught some kind of risk management methodology. The methodology used by the student to decide what controls to add, and what to leave out, is described in section 2.1 (assignment 6) of the security plan. One approach to use is a checklist-based method, such as that provided by the combination of Department of Defense Directive [7] and Department of Defense Instruction [8]. This is an easy approach for the students, but it does not require any real analysis or critical thinking on their part. The security plan may end up with all the controls the site might need, but it may not address current bad practices that need to be eliminated. The descriptions of the seven student assignments required some occasional interpretation of the NIST Guide, and other hints or requirements to help them succeed. 4
5 Summary The security plan has become a required and important part of the U.S. federal government toolset for improving security. Prospective IA professionals can be given a good education about how to write a security plan if they have the appropriate educational background. In addition, the learning experience can be improved with a little careful planning about how the security plan assignment is handled. NPS has had positive experiences, and the students have produced professional-quality security plans. By following the NIST Guide, the workload on the instructor is reduced, and the student is given additional tools for success. 7. Information Assurance (IA), Department of Defense Directive Number , October 24, Information Assurance (IA) Implementation, Department of Defense Instruction Number , February 6, References 1. Swanson, M., Guide for Developing Security Plans for Information Technology Systems, NIST Special Publication , December Circular No. A-130, Revised, Office of Management and Budget, November 28, th Congress, Computer Security Act, Public Law , National Training Standard for Information Systems Security (INFOSEC) Professionals, NSTISSI No. 4011, National Security Telecommunications and Information Security Committee, June 20, Irvine, C., Warren, D., Clark, P., The NPS CISR Graduate Program in INFOSEC: Six Years of Experience, National Information Systems Security Conference, NIST / NCSC, Volume 1, pp , October Protecting Sensitive Compartmented Information (SC) within Information Systems, Director of Central Intelligence Directive (DCID) 6/3. 5
Project Aim 2020. Appendix C - Project Plan, Gap Analysis, and Approach
Appendix C - Project Plan, Gap Analysis, and Approach In the fall of 2013 and spring of 2014, the senior leadership meetings created awareness among the leaders about necessary improvements in planning,
Distance Learning Master of Cost Estimation and Analysis Degree Program Assessment Plan
Distance Learning Master of Cost Estimation and Analysis Degree Program Assessment Plan The Distance Learning Master of Cost Estimation and Analysis (MCEA) Degree Program is a joint degree program, combining
Standardized Technology Evaluation Process (STEP) User s Guide and Methodology for Evaluation Teams. Sarah Brown May 2007
Standardized Technology Evaluation Process (STEP) User s Guide and Methodology for Evaluation Teams Sarah Brown May 2007 1 Table of Contents 1 Introduction 4 1.1 Purpose 4 1.2 Background 5 1.3 Intended
National Information Assurance Certification and Accreditation Process (NIACAP)
NSTISSI No. 1000 April 2000 National Information Assurance Certification and Accreditation Process (NIACAP) THIS DOCUMENT PROVIDES MINIMUM STANDARDS. FURTHER INFORMATION MAY BE REQUIRED BY YOUR DEPARTMENT
INTERVIEW QUESTIONS FOR TEACHERS
INTERVIEW QUESTIONS FOR TEACHERS The following questions are examples of questions frequently asked by school system recruiters. This list is certainly not all inclusive and should be used as a starting
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE LCDR Chris Eagle, and John L. Clark Naval Postgraduate School Abstract: Key words: In this paper, we describe the Capture-the-Flag (CTF) activity
Policy on Information Assurance Risk Management for National Security Systems
CNSSP No. 22 January 2012 Policy on Information Assurance Risk Management for National Security Systems THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION
Committee on National Security Systems
Committee on National Security Systems CNSS POLICY No.25 March 2009 NATIONAL POLICY FOR PUBLIC KEY INFRASTRUCTURE IN NATIONAL SECURITY SYSTEMS. 1 CHAIR FOREWORD 1. (U) The CNSS Subcommittee chartered a
University of Central Florida Department of Electrical Engineering & Computer Science EEL 4914C Spring 2014. Senior Design I
University of Central Florida EEL 4914C Spring 2014 Senior Design I Dr. S. M. Richie UCF, HEC 345E V:407-823-5765 e-mail: [email protected] Office Hours: TR 8:00 AM-8:50 AM, 10:30 AM-11:30 AM, 1:30 PM- 3:00PM
CIS490 Design in Software Engineering. Course Syllabus for the Virtual Class
CIS490 Design in Software Engineering Course Syllabus for the Virtual Class 1. Opening Note This section of CS490 is offered via "WebCt", an online conferencing system. The material covered will be the
Project Type Guide. Project Planning and Management (PPM) V2.0. Custom Development Version 1.1 January 2014. PPM Project Type Custom Development
Project Planning and Management (PPM) V2.0 Project Type Guide Custom Development Version 1.1 January 2014 Last Revision: 1/22/2014 Page 1 Project Type Guide Summary: Custom Development Custom software
Harvard University Graduate School of Design Department of Landscape Architecture LANDSCAPE ARCHITECTURE THESIS HANDBOOK 2014 2015
Harvard University Graduate School of Design Department of Landscape Architecture LANDSCAPE ARCHITECTURE THESIS HANDBOOK 2014 2015 INDEX 1. INTRODUCTION TO LANDSCAPE ARCHITECTURE THESIS a. Overview 2.
Compliance Risk Management IT Governance Assurance
Compliance Risk Management IT Governance Assurance Solutions That Matter Introduction to Federal Information Security Management Act (FISMA) Without proper safeguards, federal agencies computer systems
GET 114 Computer Programming Course Outline. Contact: [email protected] Office Hours: TBD 403.342.3415 (or by appointment)
GET 114 Computer Programming Course Outline Electrical Engineering Technology Fall 2015 Instructor: Craig West Office: 2915-11 Contact: [email protected] Office Hours: TBD 403.342.3415 (or by appointment)
DIACAP Presentation. Presented by: Dennis Bailey. Date: July, 2007
DIACAP Presentation Presented by: Dennis Bailey Date: July, 2007 Government C&A Models NIST SP 800-37 - Guide for the Security Certification and Accreditation of Federal Information Systems NIACAP - National
DEVELOPMENT OF PROJECT DOCUMENTATION: KEY INGREDIENT IN TEACHING SYSTEMS ANALYSIS AND DESIGN
DEVELOPMENT OF PROJECT DOCUMENTATION: KEY INGREDIENT IN TEACHING SYSTEMS ANALYSIS AND DESIGN Mohammad A. Rob, University of Houston Clear Lake, [email protected] ABSTRACT Systems Analysis and Design (SAD) is
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
MIS 424 COURSE OUTLINE
UNIVERSITY OF ALBERTA School of Business DEPARTMENT OF ACCOUNTING & MIS MIS 424 COURSE OUTLINE Course website: http://courses.bus.ualberta.ca/mis424-mullaly/ Instructor: Mark Mullaly Term II, 2004/2005
Life Cycle Product Management EGR 590-602 Special Topics in Engineering. Course Overview
Life Cycle Product Management EGR 590-602 Special Topics in Engineering Course Overview This course covers the management of complex technical products during all phases of the product life cycle. It is
MIDLAND COLLEGE Fall 2014. EDUC 1301.HY1 Course Syllabus Introduction to the Teaching Profession EDUC 1301:HY1 T/R 9:30 10:50 MH 114*
MIDLAND COLLEGE Fall 2014 EDUC 1301.HY1 Course Syllabus Introduction to the Teaching Profession EDUC 1301:HY1 T/R 9:30 10:50 MH 114* *subject to change Instructor: Denise McKown e mail: [email protected]
Minimum Security Requirements for Federal Information and Information Systems
FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory
How To Know If Online Courses Work For Middle And High School Students
Do Online Courses Work for Middle Grades and High School Students? Online Students Have Their Say William R. Thomas Can a middle grades or high school student really take a course for credit just by using
Master of Public Health
UNIVERSITY OF CALIFORNIA, IRVINE Master of Public Health Comprehensive Examination Guidelines 2010 PROGRAM IN PUBLIC HEALTH About this Document This manual is intended for consultation by students enrolled
CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS
CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS Prerequisites: CIS 175 Course Description This course is designed to give students a fundamental understanding of computer and network
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
Chapter 1 - From Beginning to End: An Overview of Systems Analysis and Design Lecture Notes
Systems Analysis and Design in a Changing World, sixth edition 1-1 Chapter 1 - From Beginning to End: An Overview of Systems Analysis and Design Lecture Notes Table of Contents Chapter Overview Learning
Value to the Mission. FEA Practice Guidance. Federal Enterprise Architecture Program Management Office, OMB
Value to the Mission FEA Practice Guidance Federal Enterprise Program Management Office, OMB November 2007 FEA Practice Guidance Table of Contents Section 1: Overview...1-1 About the FEA Practice Guidance...
Issues in Information Systems
STUDENT REFLECTION FROM AN IT PROJECT MANAGEMENT COURSE Shabnam Boparai, University of Houston-Clear Lake, [email protected] Shreeti Pandey, University of Houston-Clear Lake, [email protected] Sumeet
Parsons The New School for Design Communication Design. Interaction: Core Lab PUCD 2126 A / CRN: 6125 Fall 2015
Parsons The New School for Design Communication Design Interaction: Core Lab PUCD 2126 A / CRN: 6125 Fall 2015 Fridays, 3:50 6:30pm 63 Fifth Avenue, Room 204 Brendan Griffiths [email protected] Class
Undergraduate Minor in Transportation and Logistics
THE TRANSPORTATION CENTER NORTHWESTERN UNIVERSITY Undergraduate Minor in Transportation and Logistics An interdisciplinary program available to all Northwestern undergraduates from any undergraduate school.
To be used in conjunction with the Invitation to Tender for Consultancy template.
GUIDANCE NOTE Tendering for, choosing and managing a consultant Using this guidance This information is not intended to be prescriptive, but for guidance only. Appointing consultants for relatively small
FREQUENTLY ASKED QUESTIONS ABOUT ADVANCEC PLACEMENT AND PRE-AP
1. Is the AP Exam the same across the nation? Yes, AP exam for the particular courses are the same across the nation. The test dates are the same for everyone. 2. How is the AP score calculated? See the
US Department of Education Federal Student Aid Integration Leadership Support Contractor January 25, 2007
US Department of Education Federal Student Aid Integration Leadership Support Contractor January 25, 2007 Task 18 - Enterprise Data Management 18.002 Enterprise Data Management Concept of Operations i
Oracle Database: Develop PL/SQL Program Units
Oracle University Contact Us: 1.800.529.0165 Oracle Database: Develop PL/SQL Program Units Duration: 3 Days What you will learn This Oracle Database: Develop PL/SQL Program Units course is designed for
E2E Project Management Process Governance (Electric Capital)
Attachment AG-1-8-10 Page 1 of 10 E2E Project Management Process Governance (Electric Capital) Report No. 1332 Final Distribution Final Report Audit Team: Report Grading: Number of Findings: Date of issue
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
Implementation of the DoD Management Control Program for Navy Acquisition Category II and III Programs (D-2004-109)
August 17, 2004 Acquisition Implementation of the DoD Management Control Program for Navy Acquisition Category II and III Programs (D-2004-109) Department of Defense Office of the Inspector General Quality
NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/.
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE INSTRUCTION 30-1203 JANUARY 23, 2012 Maintenance, Logistics, and Facilities Configuration
National Information Assurance Education and Training Program
National Information Assurance Education and Training Program http://www.nsa.gov/isso/programs/nietp/index.htm Sherry Borror [email protected] INFOSEC Training and Education Documented Need Partnerships
Introducing Software Engineering to the Freshman Student
Introducing Software Engineering to the Freshman Student Yi Liu, Wei Wang and Onyeka Ezenwoye Department of Electrical Engineering and Computer Science South Dakota State University Brookings, SD 57007
Controlling Cheating in Online Courses: A Primer. How can you help your students decide not to cheat?
Controlling Cheating in Online Courses: A Primer 2013 Pearson This material was developed by Sarah Smith with help from the MyLabs and Mastering Group and with material from
PHASE 5: DESIGN PHASE
PHASE 5: DESIGN PHASE During the Design Phase, the system is designed to satisfy the requirements identified in the previous phases. The requirements identified in the Requirements Analysis Phase are transformed
Teaching Requirements through Interdisciplinary Projects
Teaching Requirements through Interdisciplinary Projects Deepti Suri, Eric Durant Department of Electrical Engineering and Computer Science Milwaukee School of Engineering 1025 North Broadway Milwaukee,
Department of Accounting, Finance, & Economics
Department of Accounting, Finance, & Economics Assessment Report 2010-2011 Mission/Purpose The mission of the Department of Accounting, Finance and Economics is to provide a quality education in accounting,
BUSINESS OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS BUSINESS PROJECT MANAGEMENT CERTIFICATE/DIPLOMA IN K/502/5459 LEVEL 3 UNIT 18
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN BUSINESS BUSINESS PROJECT MANAGEMENT K/502/5459 LEVEL 3 UNIT 18 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 BUSINESS PROJECT
Steve Sworder Mathematics Department Saddleback College Mission Viejo, CA 92692 [email protected]. August, 2007
Comparison of the Effectiveness of a Traditional Intermediate Algebra Course With That of a Less Rigorous Intermediate Algebra Course in Preparing Students for Success in a Subsequent Mathematics Course
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy
Object-oriented design methodologies
Object-oriented design methodologies An object-oriented methodology is defined as the system of principles and procedures applied to object-oriented software development. Five years ago, there was no standard
Review of the SEC s Systems Certification and Accreditation Process
Review of the SEC s Systems Certification and Accreditation Process March 27, 2013 Page i Should you have any questions regarding this report, please do not hesitate to contact me. We appreciate the courtesy
Multimedia & the World Wide Web
Multimedia & the World Wide Web Winter 2014 Quarter HCI 201 section 201 Class Meeting Times: Tuesdays, 1:00 PM to 2:30 PM Thursdays, 1:00 PM to 2:30 PM Instructor: Sal J. Barry Email: [email protected]
NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC
Committee on National Security Systems 1 CNSSD No. 507 January 2014 NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC
Cybersecurity and Oversight of Information System Security (CDSE ED 514)
Cybersecurity and Oversight of Information System Security (CDSE ED 514) Defense Security Service (DSS) Center for Development of Security Excellence (CDSE) Education Division SAMPLE COURSE SYLLABUS* 1
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 05-32 July 2005 PROCESSING CLASSIFIED
Federal Identity, Credential, and Access Management Trust Framework Solutions. Overview
Federal Identity, Credential, and Access Management Trust Framework Solutions Overview Version 1.0 02/07/2014 Questions? Contact the FICAM TFS Program Manager at [email protected] 1 Table of Contents 1.
Australian School of Business School of Accounting ACCT 5917 VALUE CREATION FROM THE OFFICE OF THE CFO
Australian School of Business School of Accounting ACCT 5917 VALUE CREATION FROM THE OFFICE OF THE CFO COURSE OUTLINE SEMESTER 1, 2010 TABLE OF CONTENTS 1. STAFF CONTACT DETAILS 1 2. COURSE DETAILS 1 2.1
Following is a discussion of the Hub s role within the health insurance exchanges, the results of our review, and concluding observations.
Testimony of: Kay Daly Assistant Inspector General for Audit Services Office of Inspector General, U.S. Department of Health and Human Services Hearing Title: The Threat to Americans Personal Information:
Main Author: Contributing Authors:
Main Author: Amy Roche, Instructional Designer Contributing Authors: Tricia Clark, Instructional Technologist Mary Ann Mengel, Multimedia Specialist John Shank, Director for the Center for Learning & Teaching
A Design Paradigm in Undergraduate Electrical Engineering Curriculum
A Design Paradigm in Undergraduate Electrical Engineering Curriculum Habib Rahman Saint Louis University Department of Electrical and Computer Engineering McDonnell Douglas Hall, 3450 Lindell Boulevard
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
EXECUTIVE SUMMARY. List all of the program s learning outcomes: (regardless of whether or not they are being assessed this year)
STUDENT LEARNING ASSESSMENT REPORT SUBMITTED BY: JOHN PATRICK MULLINS DATE: SEPTEMBER 2014 BRIEFLY DESCRIBE WHERE AND HOW ARE DATA AND DOCUMENTS USED TO GENERATE THIS REPORT BEING STORED: THE DATA ARE
DEPARTMENT AND PROGRAM MISSION, GOALS, AND ASSESSMENT
Department of Economics Cal State Univ., Hayward Phone 510 885 3275 OR 25800 Carlos Bee 510 885 3265 Hayward, CA 94542-3068 Fax 510 885 4796 DEPARTMENT AND PROGRAM MISSION, GOALS, AND ASSESSMENT A FOCUS
What is active learning?
ACTIVE LEARNING: AN INTRODUCTION * Richard M. Felder Hoechst Celanese Professor Emeritus of Chemical Engineering North Carolina State University Rebecca Brent President, Education Designs, Inc. Cary, North
Information Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. Accounting Systems and Software ACCT-225
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE Accounting Systems and Software ACCT-225 I. Basic Course Information A. Course Number and Title: Accounting Systems and Software B. New or Modified
The California Teaching Performance Assessment (CalTPA) Frequently Asked Questions
The California Teaching Performance Assessment (CalTPA) Frequently Asked Questions The information presented in this guide is meant to serve as introductory information. After reading this document, candidates
Arkansas State PIRC/ Center for Effective Parenting
Increasing Your Child s Motivation to Learn In order to be successful in school and to learn, students must stay involved in the learning process. This requires students to do many different activities
ATTACHMENT A STATEMENT OF WORK Request for Quotes (RFQ) Project Management Training Solicitation Number: 6100026692
ATTACHMENT A STATEMENT OF WORK Request for Quotes (RFQ) Project Management Training Solicitation Number: 6100026692 OBJECTIVE - The objective of this project is to conduct specific project management courses,
Data Analysis 1. SET08104 Database Systems. Copyright @ Napier University
Data Analysis 1 SET08104 Database Systems Copyright @ Napier University Entity Relationship Modelling Overview Database Analysis Life Cycle Components of an Entity Relationship Diagram What is a relationship?
Key components of a successful remedial/developmental education program include an effective organizational structure, mandatory assessment and
components of a successful remedial/developmental education program include an effective organizational structure, mandatory assessment and diagnostic testing, required orientation, a variety of instructional
WHEELOCK COLLEGE FACULTY DEVELOPMENT AND EVALUATION PROGRAM
WHEELOCK COLLEGE FACULTY DEVELOPMENT AND EVALUATION PROGRAM REVISED SPRING 2011 TABLE OF CONTENTS Development And Evaluation Process: Tenure Track Faculty... 4 Overview Of Mentoring And Evaluation Process
ÇANKAYA UNIVERSITY. BASIC AND ELECTIVE COURSES ENGLISH UNIT Course Definition Form. Number of. hours. Course Type Check all that are applicable
ÇANKAYA UNIVERSITY BASIC AND ELECTIVE COURSES ENGLISH UNIT Course Definition Form Part I. Basic Course Information Department Name Use capital letters only BASIC AND ELECTIVE COURSES/ENGLISH UNIT Dept.
Title: Enhancing Student Learning in Introduction to Sport Management. Author: Angela Lumpkin, Health, Sport, and Exercise Sciences
Title: Enhancing Student Learning in Introduction to Sport Management Author: Angela Lumpkin, Health, Sport, and Exercise Sciences Summary: In order to enhance and document students learning, a sports
The University of Texas at Austin School of Social Work SOCIAL WORK STATISTICS
1 The University of Texas at Austin School of Social Work SOCIAL WORK STATISTICS Course Number: SW 318 Instructor: Michael Bergman, Ph.D. Unique Number: 65190 Office Number: SSW 1.214 (IT Classroom) Semester:
How to Study Mathematics Written by Paul Dawkins
How to Study Mathematics Written by Paul Dawkins Before I get into the tips for how to study math let me first say that everyone studies differently and there is no one right way to study for a math class.
Business Intelligence Project Management 101
Business Intelligence Project Management 101 Managing BI Projects within the PMI Process Groups Too many times, Business Intelligence (BI) and Data Warehousing project managers are ill-equipped to handle
Identity, Credential, and Access Management. Open Solutions for Open Government
Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management www.idmanagement.gov Open Solutions for Open Government Judith Spencer Co-Chair, ICAM
Overview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION CONTRACTOR SECURITY OF THE SOCIAL SECURITY ADMINISTRATION S HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 12 CREDENTIALS June 2012 A-14-11-11106
2014 Audit of the Board s Information Security Program
O FFICE OF I NSPECTOR GENERAL Audit Report 2014-IT-B-019 2014 Audit of the Board s Information Security Program November 14, 2014 B OARD OF G OVERNORS OF THE F EDERAL R ESERVE S YSTEM C ONSUMER FINANCIAL
