Assignment 4 Instructor: Dr E. Crowley Student: Victor Wong Date: 23 September, 2004.

Slides:



Advertisements
Similar presentations
2008 EPA and Partners Metadata Training Program: 2008 CAP Project Geospatial Metadata: Intermediate Course Module 3: Metadata Catalogs and Geospatial One.
Advertisements

June 27, 2005 Preparing your Implementation Plan.
Slide 1 FastFacts Feature Presentation December 8, 2009 We are using audio during this session, so please dial in to our conference line… Phone number:
Module N° 4 – ICAO SSP framework
1 Regulation. 2 Organisational separation 3 Functional Separation.
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Information Technology Management (ITM101) Week 01: Introduction Matthew W. Stephan: CISM, CISSP, CGEIT, CRISC, PMP.
Accountability Reporting Webinar: Parent/Guardian Communications, NCLB School Choice and SES August 23, :00 a.m. and 2:00 p.m. Kenneth Klau.
1 Dr. Ashraf El-Farghly SECC. 2 Level 3 focus on the organization - Best practices are gathered across the organization. - Processes are tailored depending.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
International Council on Archives Project Principles and Functional Requirements for Records in Electronic Office Environments Adrian Cunningham National.
Visual 3.1 Delegation of Authority & Management by Objectives Unit 3: Delegation of Authority & Management by Objectives.
System Testing 2  Effective March 3, 2014, new requirements for system testing were implemented  State Agencies are now required to provide to FNS:
USI Readiness – Streamlining Student Records for the Future Jason Coutts Information Infrastructure Branch Department of Industry 11 September
Federal and State Monitoring Title I Directors Conference September
Federal and State Monitoring Title I Directors Conference September
Institutional Insurance: Creating a Comprehensive Campus-wide IT Security Risk Management Program Brian Davis IT Security & Policy Office of Information.
Visual 7.1 Course Summary – Putting It All Together Unit 7: Course Summary – Putting It All Together.
Information Security Policy
Student Integrity and Misconduct Training and support for decision makers and Academic Integrity Officers.
Unit 1: Introductions and Course Overview Administrative Information  Daily schedule  Restroom locations  Breaks and lunch  Emergency exit routes 
Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
Security Controls – What Works
IT Security Essential Body of Knowledge (EBK): A Competency and Functional Framework for IT Security Workforce Development EDUCAUSE Live! November 14,
Information Systems Security Officer
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Overview CSE 465 Information Assurance
Stephen S. Yau 1CSE Fall 2006 IA Policies.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
How To Apply Quality Management
Test Organization and Management
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Just In Time Training (JITT): How Not to Jump from the Frying Pan into the Fire.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
CSCE 727 Information Warfare
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Unit 4 IT 484 Networking Security Course Name – IT Networking Security 1203C Term Instructor.
BACKNEXT Georgia State University --- Expenditure Review Executive Summary -- Online Training Online Training for Georgia State University Expenditure.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Note1 (Admi1) Overview of administering security.
State of e-Authentication in Higher Education August 20, 2004.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora.
TAX-AIDE CO1 District Coordinator Training & Orientation 1 October 7, 2015.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
©Dr. Respickius Casmir Network Security Best Practices – Session 2 By Dr. Respickius Casmir.
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
E-Authentication October Objectives Provide a flexible, easy to implement authentication system that meets the needs of AES and its clients. Ensure.
Federal Information Security Management Act (F.I.S.M.A.) [ Justin Killian ]
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Information Security Policy Development for Management By Peter McCarthy.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Grid Deployment Technical Working Groups: Middleware selection AAA,security Resource scheduling Operations User Support GDB Grid Deployment Resource planning,
CompTIA Security+ Certification Exam SY COMPTIA SECURITY+SY0-401 Q&A is a straight forward,efficient,and effective method of preparing for the new.
Personnel.
Team 4 – Mack, Josh, Felicia, Kevin and Walter
FAOSD Programme Administrative and Programme Participation Terms & Conditions Roles and Responsibilities.
Module 8: Securing Network Traffic by Using IPSec and Certificates
What You Will Learn Who must report and why What data we request
County HIPAA Review All Rights Reserved 2002.
Continuous Monitoring
UNM Information Assurance Scholarship for Service (SFS) Program
HIPAA Security Standards Final Rule
Module 8: Securing Network Traffic by Using IPSec and Certificates
UNM Information Assurance Scholarship for Service (SFS) Program
Overview of the recommendations on software updates
Computer System Validation
Multimedia Training Kit
Presentation transcript:

Assignment 4 Instructor: Dr E. Crowley Student: Victor Wong Date: 23 September, 2004

NSTISSC / CNSS National Security Telecommunications and Information Systems Security Committee (NSTISSC) Committee on National Security Systems (CNSS) Pre Sept 11 = NSTISSI Post Sept 11 = NCSSI Reference:

NSTISSI (CNSSI) Certification 4011, 4012, 4013, 4014, 4015, and – National Information Assurance Training Standard for System Administrators (SA) Reference:

CNSS President has renamed NSTISSC as CNSS under Executive Order (E.O.) on October 16, 2001 Provides a forum for discussion of policy issues, sets national policy, and promulgates directions, operational procedures, and guidance for the security of national security systems through CNSS Issuance System

CNSSI Certifications Goal Entry Level: Given various scenarios and typical situations containing ISS issues, the SA will be able to describe and apply the appropriate actions to manage and administer an IS in a secure manner. To be acceptable, the description & application must be IAW applicable IA regulations, policies, and guidelines. Intermediate Level: Given various…… SA will be able to explain and implement….. Advanced Level: Given various….. SA will be able to verify that appropriate actions are implemented ….. Reference:

CNSSI 4013 Job Functions Work closely with ISS Officer (ISSO) to ensure IS or network is used securely Participate in ISS incident reporting program. Maintain configuration control of system and application software. Advise security anomalies or integrity loopholes Administer User ID or authentication mechanism of IS or network.

Other References

THE END