NRL IS Security Course and Handbook

Go to Introduction
What Role Does IS Security Play in the Overall Profile?
Why Do We Need Computer Security?
Control Measures to Reduce Potential Losses
How Our Current Program Evolved
Designated Approval Authority
What to Expect From Us
IS Security Program Compliance
Network Monitoring
Navy IS Quality Assurance Controls
What is Our IS Configuration Management Role?
Management Solutions
Specifics of the Risk Management Program
Accreditation
Typical NRL Procedures
IS System Accreditation Request Form
Interview Process
Interim Accreditation
Period of Validity
Physical Access Control (Area Control)
Classification Controls
Unclassified Processing
Classified Processing
Contingency Management
Formal Accreditation
Security Test and Evaluation (ST&E)
Computer Security Training and Awareness
User's Responsibilities
Network Vulnerabilities
External Network Protection
Firewalls
Internal Network Protection Techniques
Network Procedural Issues (Security Models & Controls)
Access Control & Password Management
Modes of Operation
IS/Network Audits
Audit Trails
Incidence/Emergency Response Activities
Database of Redundant Systems
Network Penetration Control
Virus Control
Virus Reporting
Data Remanence
Procedures to Control Remanence During Surplussing/Declassification of IS Assets
Software Piracy
Illegal Files
Inappropriate Use of Government Resources
Software Disk Protection
Waste, Fraud, Abuse
OPSEC
Key Individuals in NRL's Washington D.C. IS Security Office
Summary


Comments on this IS Security Training Handbook should be directed to:
training@hightop.nrl.navy.mil