World Library  

QR link for Protecting Sensitive Compartmented Information: Information Systems (Dcid 6/3)—Manual
Add to Book Shelf
Flag as Inappropriate
Email this Book

Protecting Sensitive Compartmented Information: Information Systems (Dcid 6/3)—Manual

Click here to view

Book Id: WPLBN0000125987
Format Type: PDF eBook
File Size: 0.5 MB
Reproduction Date: 2008
Full Text

Title: Protecting Sensitive Compartmented Information: Information Systems (Dcid 6/3)—Manual  
Author:
Volume:
Language: English
Subject: Government publications, Legislation., Government Printing Office (U.S.)
Collections: Government Library Collection
Historic
Publication Date:
Publisher: Government Printing Office

Citation

APA MLA Chicago

Protecting Sensitive Compartmented Information: Information Systems (Dcid 6/3)—Manual. (n.d.). Protecting Sensitive Compartmented Information: Information Systems (Dcid 6/3)—Manual. Retrieved from http://community.ebooklibrary.org/


Excerpt
Excerpt: Purpose and Content: This manual provides uniform policy guidance and requirements for ensuring adequate protection of certain categories of intelligence information (hereinafter intelligence information) that is stored or processed on an information system (IS). For purposes of this manual, intelligence information refers to Sensitive Compartmented Information and special access programs for intelligence under the purview of the DCI. An information system is defined as any telecommunications and/or computer related equipment or interconnected system or subsystems of equipment that is used in the acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of voice and/or data (digital or analog); it includes software, firmware, and hardware. The Director of Central Intelligence requires all United States Government departments and agencies, their contractors, and Allied governments processing intelligence information to establish, implement, maintain, and abide by the protection measures identified in this manual.

Table of Contents
TABLE OF CONTENTS 1 INTRODUCTION................................................................................................................... 1-1 1.A Purpose and Content ............................................................................................................. 1-1 1.B Applicability......................................................................................................................... 1-1 1.C Administration...................................................................................................................... 1-2 1.D Background ........................................................................................................................... 1-2 1.E System Information Collection.............................................................................................. 1-3 1.F How To Use This Manual...................................................................................................... 1-3 1.G Use of Cryptography............................................................................................................. 1-5 1.H General Notes........................................................................................................................ 1-5 2 ROLES AND RESPONSIBILITIES..................................................................................... 2-1 2.A Overview.............................................................................................................................. 2-1 2.A.1 Separation of Roles ............................................................................................................ 2-1 2.A.2 Applicability.. .................................................................................................................... 2-1 2.B Roles and Responsibilities .................................................................................................... 2-1 2.B.1 Special Provision for Waivers of Citizenship Requirements............................................. 2-1 2.B.2 Principal Accrediting Authority......................................................................................... 2-1 2.B.3 Data Owner ........................................................................................................................ 2-2 2.B.4 Designated Accrediting Authority ..................................................................................... 2-3 2.B.5 Designated Accrediting Authority Representative (DAA Rep)......................................... 2-5 2.B.6 Information System Security Manager (ISSM) ................................................................. 2-6 2.B.7 Information System Security Officer (ISSO)..................................................................... 2-7 2.B.8 Privileged Users ................................................................................................................. 2-8

 

Click To View

Additional Books


  • Overview of the Report 
  • Crs Report for Congress Received through... (by )
  • Los Alamos Scientific Laboratory (by )
  • Comments on the Georgetown Internet Priv... (by )
  • Subject: Administrative Procedures (by )
  • Joint Explanatory Statement of the Commi... 
  • Revision of the Nsf Cost Sharing Policy (by )
  • Position Title: Customer Services Busine... 
  • Image Intensifiers 
  • A National Integrated Telecommunication ... (by )
  • Nftc Notes for Pam Frazier 
  • Espionage against the United States by A... (by )
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from World eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.