⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 computer security_2.txt

📁 黑客培训教程
💻 TXT
📖 第 1 页 / 共 4 页
字号:
                 GAO      General Accounting Office                 IMTEC    Information Management and Technology Division                 NIST     National Institute of Standards and Technology                 NSA      National Security Agency                 OMB      Office of Management and Budget                                         11                 APPENDIX I                                        APPENDIX I                             OBJECTIVES, SCOPE, AND METHODOLOGY                             ----------------------------------                 In response to a June 5, 1989, request of the Chairman,                 House Committee on Science, Space, and Technology, and                 subsequent agreements with his office, we assessed the                 impact of the computer security planning and review process                 required by the Computer Security Act of 1987.                 As agreed, we limited our review primarily to 10 civilian                 agencies in the Washington, D.C. area:  the Departments of                 Agriculture, Commerce, Energy, Health and Human Services,                 the Interior, Labor, Transportation, the Treasury, and                 Veterans Affairs and the General Services Administration.                 As agreed, the Department of Defense was excluded from our                 review because the plans it submitted differed                 substantially in format and content from the civilian plans.                 Specifically, we                 --assessed the computer security planning process and                 NIST/NSA review comments on the security plans developed as                 a result of the process,                 --determined the extent to which the 10 agencies implemented                 planned control measures reported in 22 selected plans, and                 --developed summary statistics using a NIST/NSA data base                 covering over 1,500 civilian computer security plans.                 To assess the impact of the planning and review process on                 agencies' security programs, we interviewed information                 resource management, computer security, and other officials                 from the 10  agencies listed above.  In addition, we                 interviewed officials from NIST, NSA, and OMB who were                 involved in the planning process, to gain their perspectives                 on the benefits and problems associated with the process.                 We analyzed 22 computer security plans developed by the 10                 agencies and the NIST/NSA review feedback relating to the                 plans.  Most plans addressed groups of systems.  (See app.                 II for a description of the systems.)  We selected the                 systems primarily on the basis of their sensitivity,                 significance, and prior GAO, President's Council on                 Integrity and Efficiency, and OMB reviews.  We also reviewed                 federal computer security planning and review guidance,                 department requests for agency component plans, and                 department and agency computer security policies.                                         12                 APPENDIX I                                        APPENDIX I                 To determine the extent to which planned computer security                 controls have been implemented, we reviewed the 22 plans and                 discussed with agency officials the status of these                 controls.  To develop security plan statistics, we used the                 NIST/NSA data base, which contains data on the status of                 controls for over 1,500 plans.  We did not verify the status                 of the planned controls as reported to us by agency                 officials, the accuracy of the plans, or the data in the                 NIST/NSA data base.                                         13                 APPENDIX II                                      APPENDIX II                                     PLANS GAO REVIEWED                                     ------------------                 Organization                     Plan                 ------------                     ----                 Farmers Home Administration      Automated Field Management                                                  System                                                  Accounting Systems                 Patent and Trademark Office      Patent and Trademark                                                  Automation Systems                 Social Security Administration   Benefit Payment System                                                  Social Security Number                                                  Assignment System                                                  Earnings Maintenance System                                                  Access Control Event                                                  Processor System                 Bureau of Labor Statistics       Economic Statistics System                 Employment Standards             Federal Employees'                 Administration                   Compensation System                                                  Level I                 U.S. Geological Survey           National Digital                                                  Cartographic Data Base                                                  National Earthquake                                                  Information Service                 Federal Aviation Administration  En Route and Terminal Air                                                  Traffic Control System                                                  Maintenance and Operations                                                  Support Systems                                                  Interfacility                                                  Communications System                                                  Ground-to-Air Systems                                                  Weather and Flight                                                  Services Systems                                         14                 APPENDIX II                                      APPENDIX II                 Organization                     Plan                 ------------                     ----                 Internal Revenue Service         Compliance Processing                                                  System                                                  Tax Processing System                 Customs Service                  Automated Commercial                                                  System                 Veterans Affairs Austin Data     Mainframe Equipment                 Processing Center                Configuration                 General Services Administration  FSS-19 Federal Supply                                                  System                 Department of Energy Strategic   Mainframe Computer and PC                 Petroleum Reserve Project        Sensitive Systems                 Management Office                 Note: Summary information describing each of the above                 systems has been omitted from this version of the report.                 Call GAO report distribution at 202-275-6241 to obtain a                 complete copy of this report.                                         15                 APPENDIX III                                    APPENDIX III                          COMPUTER SECURITY AND PRIVACY PLAN                          ----------------------------------          We developed this composite security plan to show what most          civilian plans contained, their format, and some common omissions.          Notes in parentheses show common deviations from the OMB guidance.                          Computer Security and Privacy Plan          1.   BASIC SYSTEM IDENTIFICATION               Reporting Department or Agency - Department of X               Organizational Subcomponent - Subagency  Y               Operating Organization - Organization Z               System Name/Title - Automated Report Management System (ARMS)               System Category               [X] Major Application               [ ] General-Purpose ADP Support System               Level of Aggregation               [X] Single Identifiable System               [ ] Group of Similar Systems               Operational Status               [X] Operational               [ ] Under Development               General Description/Purpose - The primary purpose of ARMS is               to retrieve, create, process, store, and distribute data.               (Note:  The description and purpose is incomplete.  OMB               Bulletin 88-16 required a one or two paragraph description of               the function and purpose of the system.)               System Environment and Special Considerations - System is               controlled by a ABC series computer which is stored in the               computer room.  (Note:  The environment is not adequately               described.  OMB Bulletin 88-16 requested a description of               system location, types of computer hardware and software               involved, types of users served, and other special               considerations.)               Information Contact - Security Officer, J. Doe, 202/275-xxxx                                         16                 APPENDIX III                                    APPENDIX III          2. SENSITIVITY OF INFORMATION               General Description of Information Sensitivity               The data ARMS maintains and uses are those required to provide               a total management information function.  (Note:  This               description is inadequate.  OMB Bulletin 88-16 requested that               the plans describe, in general terms, the nature of the system               and the need for protective measures.)               Applicable Laws or Regulations Affecting the System               5 U.S.C. 552a, "Privacy Act," c. 1974.               System Protection Requirements               The Protection Requirement is:                                    Primary  Secondary  Minimal/NA               [X] Confidentiality    [X]       [ ]         [ ]               [X] Integrity          [X]       [ ]         [ ]               [X] Availability       [ ]       [X]         [ ]          3.   SYSTEM SECURITY MEASURES               Risk Assessment - There currently exists no formal large scale               risk assessment covering ARMS.  We are scheduling a formal               risk analysis.               Applicable Guidance - FIPS PUBS No. 41, Computer Security               Guidelines for Implementing the Privacy Act of 1974;               FIPS PUB No. 83, Guidelines on User Authentication Techniques               for Computer Network Access Control.                                         17                 APPENDIX III                                    APPENDIX III                                   SECURITY MEASURES                                   -----------------               MANAGEMENT CONTROLS                                                            In Place                                     In Place    Planned    & Planned   N/A                                     --------    -------    ---------   ---               Assignment of Security               Responsibility            [X]         [ ]         [ ]     [ ]               Risk/Sensitivity               Assessment                [ ]         [ ]         [X]     [ ]               A formal risk analysis program will be used to update the               current assessment.  (Note:  An expected operational date is               not included.  OMB Bulletin 88-16 states that there should be               expected operational dates for controls that are planned or               in place and planned.)               Personnel Selection               Screening                 [ ]         [ ]         [X]     [ ]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -