Enterprise Security Management CIS 259



Similar documents
Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply

GUIDANCE FOR BUSINESS ASSOCIATES

ITIL V3 Planning, Protection and Optimization (PPO) Certification Program - 5 Days

How To Manage An Infrmatin Security Gvernance Prgram

ITIL Release Control & Validation (RCV) Certification Program - 5 Days

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

Session 9 : Information Security and Risk

Chapter 7 Business Continuity and Risk Management

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT

ITIL V3 Service Offerings and Agreements (SOA) Certification Program - 5 Days

GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

ITIL Service Offerings & Agreement (SOA) Certification Program - 5 Days

Required Articles Cervone, H. F. (2004). How not to run a digital library project. OCLC Systems & Services, OCLC Syst. Serv. (UK), 20(4),

ITIL Foundation Certification Course v3 Information Technology Service Management (MIE-ITIL-FDN, 3 days)

CSC 421 COURSE COMPACT

Basics of Supply Chain Management

VET395- HUMAN RESOURCES

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

POSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position

UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

Presentation: The Demise of SAS 70 - What s Next?

Revised October 27, 2011 Page 1 of 6

GENERAL EDUCATION. Communication: Students will effectively exchange ideas and information using multiple methods of communication.

Sources of Federal Government and Employee Information

VCU Payment Card Policy

Business Continuity Management Systems Foundation Training Course

Information for Components Beacon ESOL Program Courses. Table of Contents

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

HIPAA HITECH ACT Compliance, Review and Training Services

Christchurch Polytechnic Institute of Technology Access Control Security Standard

CDC UNIFIED PROCESS PRACTICES GUIDE

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

CHANGE MANAGEMENT STANDARD

ENTERPRISE RISK MANAGEMENT ENTERPRISE RISK MANAGEMENT POLICY

CDC UNIFIED PROCESS PRACTICES GUIDE

Help Desk Level Competencies

Key Steps for Organizations in Responding to Privacy Breaches

CE 566 Project Controls Planning and Scheduling

Online Learning Portal best practices guide

ODNI/NCIX SPECIAL SECURITY CENTER Security Education & Training Program Course Descriptions

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp

Professional Leaders/Specialists

To achieve these objectives we will use a combination of lectures, cases, class discussion, and exercises.

CIS 4360: INTRODUCTION TO COMPUTER SECURITY

PENETRATION TEST OF THE FOOD COMPUTER NETWORK

Independent Development Trust. 27 June 2016 POSITION: SENIOR SPECIALIST: SUPPLY CHAIN MANAGEMENT JOB LEVEL: 7

Nursing Jobs Description and Profile of a Health & Medical Assistant

MANITOBA SECURITIES COMMISSION STRATEGIC PLAN

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

COURSE PROFILE. Business Data Analysis IT431 Fall

Recognition of Prior Learning (RPL) TAE40110 Certificate IV in Training and Assessment

Incident Management-Roles and Responsibilities

Leading Edge Online and Blended Teacher Certification Course

How To Write An Ehsms Training, Awareness And Competency Procedure

Network Security Trends in the Era of Cloud and Mobile Computing

MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER

Community Support Programs N9 Organizational Internship Program

REHABILITATION INSTITUTE REHABILITATION COUNSELING and ADMINISTRATION

The Whole of Government Approach: Models and Tools for EGOV Strategy & Alignment

Army DCIPS Employee Self-Report of Accomplishments Overview Revised July 2012

Malpractice and Maladministration Policy

Course. Term Summer 2016 Instructors Chad R. Durham, MBA, PhD. Candidate, VSE Catalog Description.

CCHIIM ICD-10 Continuing Education Requirements for AHIMA Certified Professionals (& Frequently Asked Questions for Recertification)

Job Classification Details Department Job Function Job Family Job Title Job Code Salary Level

Transcription:

Enterprise Security Management CIS 259 Prerequisites CIS 175 Descriptin This curse is designed t cver the managerial aspects f cmputer security and risk management fr enterprises. The student will attain knwledge fr accreditatin, prcurement, extensin and peratin principles fr secure cmputing systems. This curse is ne f the required curses fr btaining the NSTISSI 4011 and CNSSI 4013 certificatins. CNSSI 4013 Curse Objectives CNSSI 4013 Mapping Details General Curse Objectives Textbk Whitman and Mattrd, Management f Infrmatin Security. Curse Technlgy, 2010, ISBN 10: 1-4354-8884-9. ISBN-13: 978-1-4354-8884-7. Other References Air Frce Instructin 33-203, Vlume 3, Emissin Security Cuntermeasures - AFI33-203V3, Nvember 2005. Department f Defense MANUALNUMBER 5205.02-M - DD OPSEC Manual, Nvember 2008. Department f Defense Directive 8500.01E, Octber, 2002 http://en.wikiversity.rg/wiki/intrductin_t_cmputers Infrmatin Systems Security: A Cmprehensive Mdel Annex - NSTISSI_4011 Key Management Using ANSI X9.17, U.S. Department f cmmerce, OMB Circular A-130 NIST Special Publicatin 800-12, An Intrductin t Cmputer Security, Octber 1995. NIST Special Publicatin 800-16, Infrmatin Technlgy Security Training Requirements: A Rle- and Perfrmance-Based Mdel, April 1998. NIST Special Publicatin 800-18, Guide fr Develping Security Plans fr Federal Infrmatin Systems, February 2006. 1

NIST Special Publicatin 800-26, Security Self-Assessment Guide fr Infrmatin Technlgy Systems, Nvember 2001. NIST Special Publicatin 800-30, Risk Management Guide fr Infrmatin Technlgy Systems, July 2002. NIST Special Publicatin 800-34, Cntingency Planning Guide fr Infrmatin Technlgy Systems, June 2002. NIST Special Publicatin 800-37, Guide fr the Security Certificatin and Accreditatin f Federal Infrmatin Systems, May 2004 NIST Special Publicatin 800-47, Security Guide fr Intercnnecting Infrmatin Technlgy Systems, September 2002. NIST Special Publicatin 800-50, Building an Infrmatin Technlgy Security Awareness and Training Prgram, Octber 2003. NIST Special Publicatin 800-53, Recmmended Security Cntrls fr Federal Infrmatin Systems, December 2006. NIST Special Publicatin 800-59, Guideline fr Identifying an Infrmatin System as a Natinal Security System, August 2003. NIST Special Publicatin 800-60, Guide fr Mapping Types f Infrmatin and Infrmatin Systems t Security Categries, June 2004. NIST Special Publicatin 800-61, Cmputer Security Incident Handling Guide, January 2004. NIST Special Publicatin 800-64, Security Cnsideratins in the Infrmatin System Develpment Life Cycle, Octber 2003. NIST Special Publicatin 800-83, Guide t Malware Incident Preventin and Handling, Nvember 2005. NIST Special Publicatin 800-88, Guidelines fr Media Sanitizatin, September 2006. NIST Special Publicatin 800-100, Infrmatin Security Handbk: A Guide fr Managers, Octber 2006. CNSS Plicy N. 6, Natinal Plicy n Certificatin and Accreditatin f Natinal Security Systems, Octber 2005. CNSS Instructin N. 4009: Natinal Infrmatin Assurance (IA) Glssary, April 2010 NSTISSAM COMPUSEC/1-99: NSTISSAM COMPUSEC/1-99, Advisry Memrandum n the Transitin frm the Trusted Cmputer System Evaluatin Criteria t the Internatinal Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin OMB Circular A-123, Management s Respnsibility fr Internal Cntrl http://www.niap-ccevs.rg/ web site cntains detailed infrmatin abut NSTISSP 11 and Cmmn Criteria Evaluatin and Validatin Scheme. Grading and Evaluatin Criteria 2

30% f the grade is based n quizzes. 70% f the grade will be based n in-class and take-hme labs Grading Scale A = 92-100 B = 83-91 C =75-82 D =70-74 F = 69 r belw Late Wrk Late lab assignments and quizzes will nt be accepted. Please be sure t keep up and pay very clse attentin t the due dates. Other Cmments Dishnesty will nt be tlerated. A final curse grade f F will be given t any student caught cheating. See the academic hnesty statement. Jacksn State will make reasnable accmmdatins fr persns with dcumented physical, mental r learning disabilities. Students shuld ntify their instructr and the Crdinatr f Disabled Student Services lcated in the Cunseling Office, Rm 12 f the Student Unin Building - f any special needs. Instructrs shuld be ntified the first week f class. All discussins remain cnfidential. N children allwed in the classrm. 3

Enterprise Security Management CIS 259 CNSSI 4013 Curse Objectives F1A1. Define and utline rganizatinal accuntability plicies, prcesses and prgrams F1A2. Define and Discuss emerging trends in the certificatin and accreditatin plicy f U.S. federal and ther rganizatin IT systems F1A3. Describe the dminant infrmatin security blueprints, framewrks, and infrmatin security management mdels, including U.S. gvernment sanctined mdels F1A4. Select an infrmatin security management mdel and custmize it t meet the needs f a particular rganizatin as it relates t a system security architecture study F1A5. Discuss and define hw assessments fr use during certificatin f infrmatin systems are prepared F1A6. Discuss NSTISSP 11 (Cmmn Criteria) plicies F1A7. Define and explain cnfiguratin cntrl (management) F1A8. Define defense in depth and give examples f defense in depth methds and plicy F1A9. Identify Department f Defense Directive 8500.1 plicies apprpriate civil agency guidance F1A10. Define and describe security dmains applicable t rganizatinal plicies F1A11. Define generally accepted security principles, gals, missin and bjectives f the rganizatin F1A12. Define and describe infrmatin assurance with regards t accreditatin, planning, design, implementatin and plicy develpment F1A13. Understand that a successful infrmatin security prgram is the respnsibility f bth an rganizatin s general management and IT management which includes infrmatin peratins and recrds retentin F1A14. Using examples, demnstrate hw t perfrm marking f sensitive infrmatin prcedures and discuss plicies relating t marking f classified, unclassified and sensitive infrmatin F1A15. Define magnetic media degaussing, marking, handling, string and destrying sensitive infrmatin and media, media management, identify infrmatin resurce wner and secure data deletin fr media reuse F1A16. Identify systems security standards plicies F1A17. Identify Infrmatin Technlgy Security Evaluatin Criteria (ITSEC) plices F1A18. Discuss the phases f the security systems develpment life cycle management, which includes requirements definitins, develpment, demnstratin and validatin, implementatin, peratins and testing and security with regards t certificatin and accreditatin F1A19. Describe wrkstatin security plicies F1B1 Describe the dminant infrmatin security blueprints, framewrks, and infrmatin security management mdels, including U.S. gvernment sanctined mdels F1B2 Explain why access cntrl is an essential element f infrmatin security management F1B3 Select an infrmatin security management mdel and custmize it t meet the needs f a particular rganizatin as it relates t a system security architecture study F1B4 Discuss hw assessments fr use during certificatin f infrmatin systems are prepared F1B5 Discuss NSTISSP 11 (Cmmn Criteria) plicies

Enterprise Security Management CIS 259 CNSSI 4013 Mapping Details (F1A) General Security Plicy (F1A1) Accuntability: OMB Circular A-123, Management s Respnsibility fr Internal Cntrl defines rganizatins accuntability plicies and utlines accuntability prcesses and prgrams. Curse bjective F1A1 (F1A2) Accreditatin: Curse textbk defines accreditatin. Curse bjective F1A2 (F1A3) Architecture: Curse textbk defines system security architectures, identifies apprpriate security architectures fr use in assigned IS, and address system security architecture study. Curse bjectives F1A3 and F1A4 (F1A4) Assessment: The NIST Handbk Special Publicatin 800-37, Guide fr Applying the Risk Management Framewrk fr Federal Infrmatin System: A Security Life Cycle Apprach - NIST 800-37.pdf Chapter 3 Defines assessments fr use during certificatin f infrmatin systems. Curse bjectives F1A5 and F1A6 (F1A5) Assurance: The NIST Handbk Special Publicatin 800-37, Guide fr Applying the Risk Management Framewrk fr Federal Infrmatin System: A Security Life Cycle Apprach - NIST 800-37.pdf Chapters 2 and 3 and the curse textbk define assurance. Curse bjective F1A12 (F1A6) Availability, Integrity, Cnfidentiality, Authenticatin and Nn-Repudiatin: Cvered in the CIS 156 curse. (F1A7) Certificatin: The NIST Handbk Special Publicatin 800-12 NIST 800-12.pdf Chapter 8 and the curse textbk defines certificatin plicies as related t rganizatinal requirements. Curse bjectives F1A2 (F1A8) NSTISSP 11, Natinal Plicy Gverning the Acquisitin f Infrmatin Assurance (IA) and IA Enabled Infrmatin Technlgy (IT) Prducts: http://www.niapccevs.rg/ web site cntains detailed infrmatin abut NSTISSP 11 and Cmmn Criteria Evaluatin and Validatin Scheme. The curse textbk als address Cmmn Criteria. Curse bjective F1A6 (F1A9) Cnfiguratin Cntrl: NIST Special Publicatin 800-53 Rev. A - Recmmended Security Cntrls fr Federal Infrmatin Systems and Organizatins explains cnfiguratin cntrl (management). Curse bjective F1A7 (F1A10) Custdian: Cvered in the CIS 156 curse. (F1A11) Defense in Depth: CNSS Instructin N. 4009: Natinal Infrmatin Assurance (IA) Glssary define defense in depth. Examples f defense in depth methds and plicy will be presented. Curse bjective F1A8 (F1A12) Dcument: Department f Defense Directive 8500.01E plicies are identified. Curse bjective F1A9 (F1A13) Dmains: Department f Defense Directive 8500.01E defines and describes security dmains applicable t rganizatinal plicies. Curse bjective F1A10 (F1A14) E-Mail: Cvered in the CIS 156 curse. (F1A15) Wireless Security : Cvered in the CIS 250 curse. (F1A16) EMSEC/TEMPEST (Emanatins Security/Shrt name referring t the investigatin, study, and cntrl f cmprmising emanatins frm IS equipment): Cvered in the CIS 250 curse. (F1A18) FAX: Cvered in the CIS 156 curse (F1A19) Generally Accepted Security Principles: The NIST Handbk Special Publicatin 800-12 NIST 800-12.pdf and the curse textbk define generally accepted security principles. Curse bjective F1A11 (F1A20) Gals/Missin/Objectives: The NIST Handbk Special Publicatin 800-12 NIST 800-12.pdf and the curse textbk define gals, missins and bjectives f the rganizatin. Curse bjective F1A11 (F1A21)Incident Respnse: Cvered in the CIS 156 curse

(F1A22) Infrmatin Assurance: The NIST Handbk Special Publicatin 800-37, Guide fr Applying the Risk Management Framewrk fr Federal Infrmatin System: A Security Life Cycle Apprach - NIST 800-37.pdf Chapters 2 and 3 and the curse textbk define rganizatinal infrmatin assurance plicies. Curse bjective F1A12 (F1A23) Infrmatin Operatins [DOD Organizatins Only]: The NIST Handbk Special Publicatin 800-12, Chapter 14 defines, describes and discusses hw t supprt infrmatin peratins. Curse bjective F1A13 (F1A24) Internet Security: Cvered in the CIS 156 curse. (F1A25) Law Enfrcement: Cvered in the CIS 156 curse. (F1A26) Marking: Cvered in the CIS 156 curse. (F1A27) Mnitring: Cvered in the CIS 156 curse. (F1A28) Multi-Level Security: Cvered in the CIS 156 curse. (F1A29) Netwrk: Cvered in the CIS 250 curse. (F1A30) Operating System: Cvered in the CIS 250 curse. (F1A32) Ownership: Cvered in the CIS 156 curse. (F1A33) Physical Security: Cvered in the CIS 250 curse. (F1A34) Recrds Management: Cvered in the CIS 156 curse. (F1A37) Security Tls: Cvered in the CIS 156 curse. (F1A38) Sensitivity: 32 CFR Parts 2001 and 2003 Classified Natinal Security Infrmatin defines, describes and explains infrmatin sensitivity in relatin t rganizatinal plicies. Curse bjectives F1A14 and F1A15 (F1A39) Separatin f Duties: Cvered in the CIS 156 curse. (F1A40) System Security: NIST Special Publicatin 800-16, Infrmatin Technlgy Security Training Requirements: A Rle- and Perfrmance-Based Mdel and CNSS Instructin N. 4009: Natinal Infrmatin Assurance (IA) Glssary identifies systems security standards plicies. Curse bjective F1A16 (F1A41) Infrmatin Technlgy Security Evaluatin Criteria (ITSEC): Infrmatin Technlgy Security Evaluatin Criteria (ITSEC) identifies Infrmatin Technlgy Security Evaluatin Criteria (ITSEC) plices. Curse bjective F1A17 (F1A42) Testing: Cvered in the CIS 156 curse. (F1A43) Validatin/Verificatin: The NIST Handbk Special Publicatin 800-12 NIST 800-12.pdf Chapter 8 defines and identifies validatin and verificatin prcess plicies. Curse bjective F1A18 (F1A44) Wrkstatin: The NIST Handbk Special Publicatin 800-12 NIST 800-12.pdf Chapter 15 describes wrkstatin security plicies. Curse bjective F1A19 (F1A45) Zne: Cvered in the CIS 250 curse (F1B) General Prcedures (F1B1) Netwrk Sftware: CIS 175 (F1B2) Aggregatin: CIS 156 (F1B3) Applicatin Vulnerabilities: CIS 156 (F1B4) Architecture: The curse textbk addresses system security architecture study. Curse bjectives F1B1, F1B3 (F1B5) Assessment: The NIST Handbk Special Publicatin 800-37, Guide fr Applying the Risk Management Framewrk fr Federal Infrmatin System: A Security Life Cycle Apprach - NIST 800-37.pdf Chapter 3 cvers assessments fr use during certificatin f infrmatin systems. Curse bjectives F1B4 F1B5

Enterprise Security Management CIS 259 General Curse Objectives 1. Assess risk based n the likelihd f adverse events and the effects n infrmatin assets when events ccur 2. Create a simple set f cntingency plans, using business impact analysis 3. Define and describe infrmatin assurance with regards t accreditatin, planning, design, implementatin and plicy develpment 4. Define and describe security dmains applicable t rganizatinal plicies 5. Define and Discuss emerging trends in the certificatin and accreditatin plicy f U.S. federal and ther rganizatin IT systems 6. Define and explain cnfiguratin cntrl (management) 7. Define and utline rganizatinal accuntability plicies, prcesses and prgrams 8. Define defense in depth and give examples f defense in depth methds and plicy 9. Define generally accepted security principles, gals, missin and bjectives f the rganizatin 10. Define infrmatin security plicy and understand its central rle in a successful infrmatin security prgram 11. Define magnetic media degaussing, marking, handling, string and destrying sensitive infrmatin and media, media management, identify infrmatin resurce wner and secure data deletin fr media reuse 12. Define risk management and its rle in the rganizatin 13. Describe the cmpnents f a security educatin, training, and awareness prgram and explain hw rganizatins create and manage these prgrams 14. Describe the dminant infrmatin security blueprints, framewrks, and infrmatin security management mdels, including U.S. gvernment sanctined mdels 15. Describe the ethical fundatins and appraches that underlie mdern cdes f ethics 16. Describe the imprtance f the manager s rle in securing an rganizatin s use f infrmatin technlgy and understand wh is respnsible fr prtecting an rganizatin s infrmatin assets 17. Describe the key cmpnents f a security metrics prgram 18. Describe the majr cmpnents f cntingency planning Describe the OCTAVE Methd and ther appraches t managing risk 19. Describe the rle f culture as it applies t ethics in infrmatin security 20. Describe the security practices used t cntrl emplyee behavir and prevent misuse f infrmatin 21. Describe the three majr types f infrmatin security plicy and explain what ges int each type 22. Describe the varius access cntrl appraches, including authenticatin, authrizatin, and bimetric access cntrls 23. Describe wrkstatin security plicies 24. Determine hw t plan and staff an rganizatin s infrmatin security prgram based n its size 25. Develp, implement, and maintain varius types f infrmatin security plicies 26. Differentiate between law and ethics 27. Differentiate between strategic rganizatin infrmatin security planning and specialized cntingency planning 28. Differentiate infrmatin security management frm general management 29. Discuss and define hw assessments fr use during certificatin f infrmatin systems are prepared 30. Discuss and implement infrmatin security cnstraints n the general hiring prcesses 31. Discuss emerging trends in the certificatin and accreditatin f U.S. federal IT systems 32. Discuss hw assessments fr use during certificatin f infrmatin systems are prepared 33. Discuss NSTISSP 11 (Cmmn Criteria) plicies 34. Discuss the phases f the security systems develpment life cycle management, which includes requirements definitins, develpment, demnstratin and validatin, implementatin, peratins and testing and security with regards t certificatin and accreditatin

35. Dcument the results f risk identificatin 36. Enumerate and define the key characteristics f leadership and management 37. Enumerate and discuss the current issues in dial-up access and prtectin 38. Enumerate and explain the unique cnsideratins and relatinships that exist amng the types f specialized cntingency planning IRP, DRP, and BCP 39. Evaluate risk cntrls and frmulate a cst-benefit analysis using existing cnceptual framewrks 40. Evaluate the internal and external factrs that influence the activities and rganizatin f an infrmatin security prgram 41. Explain cryptgraphy and the encryptin prcess, and cmpare and cntrast symmetric and asymmetric encryptin 42. Explain hw t maintain and perpetuate risk cntrls 43. Explain the rganizatinal appraches t infrmatin security 44. Explain the principal cmpnents f infrmatin security system implementatin planning in the rganizatinal planning scheme 45. Explain the rle f infrmatin security in emplyee terminatins 46. Explain the unified cntingency plan apprach 47. Explain why access cntrl is an essential element f infrmatin security management 48. Identify and describe the types f intrusin detectin systems and the tw strategies n which they are based 49. Identify and implement basic prject management practices and techniques 50. Identify current infrmatin n laws, regulatins, and relevant prfessinal rganizatins 51. Identify Department f Defense Directive 8500.1 plicies pr apprpriate civil agency guidance 52. Identify Infrmatin Technlgy Security Evaluatin Criteria (ITSEC) plices 53. Identify majr natinal and internatinal laws that relate t the practice f infrmatin security 54. Identify suitable strategies fr the implementatin f a security metrics prgram 55. Identify systems security standards plicies 56. Identify the rles in rganizatins that are active in the planning prcess 57. Identify the skills and requirements fr infrmatin security psitins 58. Identify the varius types f firewalls and the cmmn appraches t firewall implementatin 59. Implement the fundamental elements f key infrmatin security management practices 60. List and describe the functinal cmpnents f an infrmatin security prgram 61. List and describe the typical jb titles and functins perfrmed in the infrmatin security prgram 62. List the elements f key infrmatin security management practices 63. List the varius infrmatin security prfessinal certificatins, and identify which skills are encmpassed by each 64. Prepare and execute a test f cntingency plans 65. Recgnize and select frm the risk mitigatin strategy ptins used t cntrl risk 66. Recgnize the need fr cntingency planning 67. Select an infrmatin security management mdel and custmize it t meet the needs f a particular rganizatin as it relates t a system security architecture study 68. Understand that a successful infrmatin security prgram is the respnsibility f bth an rganizatin s general management and IT management which includes infrmatin peratins and recrds retentin 69. Use risk management techniques t identify and priritize risk factrs fr infrmatin assets 70. Using examples, demnstrate hw t perfrm marking f sensitive infrmatin prcedures and discuss plicies relating t marking f classified, unclassified and sensitive infrmatin