Sample records for defense information security

  1. Information Resource Management Planning in the Office of the Under Secretary of Defense (Acquisition)

    DTIC Science & Technology

    1989-08-01

    Include in this plan the role of the Defense Technical Information Center (DTIC), the Defense Technology Security Administration ( DTSA ), and ODDR&E’s...DTIC = Defense Technical Information Center DTSA = Defense Technology Security Administration DUSD = Deputy Under Secretary of Defense Gloss. 2 DUSD...technologically sensitive requests. The Defense Technology Security Administi ation ( DTSA ) is developing a large system to track foreign military sales

  2. 32 CFR Appendix F to Part 286 - DoD Freedom of Information Act Program Components

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Defense Information Systems Agency Defense Contract Audit Agency Defense Intelligence Agency Defense Security Service Defense Logistics Agency National Imagery and Mapping Agency Defense Special Weapons Agency National Security Agency Office of the Inspector General, Department of Defense Defense Finance...

  3. 32 CFR 154.42 - Evaluation of personnel security information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Evaluation of personnel security information... SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Adjudication § 154.42 Evaluation of personnel security information. (a) The criteria and adjudicative policy to be used in applying the...

  4. 32 CFR 154.42 - Evaluation of personnel security information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Evaluation of personnel security information... SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Adjudication § 154.42 Evaluation of personnel security information. (a) The criteria and adjudicative policy to be used in applying the...

  5. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically accessed...

  6. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically accessed...

  7. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically accessed...

  8. 32 CFR 2001.1 - Purpose and scope.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...

  9. 32 CFR 2001.1 - Purpose and scope.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...

  10. 32 CFR 2001.1 - Purpose and scope.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...

  11. 32 CFR 2001.1 - Purpose and scope.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...

  12. 32 CFR 2001.1 - Purpose and scope.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...

  13. 32 CFR 321.3 - Information and procedures for requesting notification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.3 Information and... mail to the Defense Security Service, Office of FOI and Privacy, 1340 Braddock Place, Alexandria, VA... 32 National Defense 2 2014-07-01 2014-07-01 false Information and procedures for requesting...

  14. 32 CFR 321.3 - Information and procedures for requesting notification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.3 Information and... mail to the Defense Security Service, Office of FOI and Privacy, 1340 Braddock Place, Alexandria, VA... 32 National Defense 2 2013-07-01 2013-07-01 false Information and procedures for requesting...

  15. 32 CFR 321.3 - Information and procedures for requesting notification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.3 Information and... mail to the Defense Security Service, Office of FOI and Privacy, 1340 Braddock Place, Alexandria, VA... 32 National Defense 2 2011-07-01 2011-07-01 false Information and procedures for requesting...

  16. 32 CFR 321.3 - Information and procedures for requesting notification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.3 Information and... mail to the Defense Security Service, Office of FOI and Privacy, 1340 Braddock Place, Alexandria, VA... 32 National Defense 2 2012-07-01 2012-07-01 false Information and procedures for requesting...

  17. 32 CFR 321.3 - Information and procedures for requesting notification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.3 Information and... mail to the Defense Security Service, Office of FOI and Privacy, 1340 Braddock Place, Alexandria, VA... 32 National Defense 2 2010-07-01 2010-07-01 false Information and procedures for requesting...

  18. 32 CFR 2001.80 - Prescribed standard forms.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... when their use will enhance the protection of national security information and/or will reduce the....80 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Standard...

  19. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  20. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  1. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  2. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  3. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  4. 32 CFR 2004.21 - Protection of Classified Information [201(e)].

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Protection of Classified Information [201(e)]. 2004.21 Section 2004.21 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY...

  5. 32 CFR 2004.10 - Responsibilities of the Director, Information Security Oversight Office (ISOO) [102(b)]. 1

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS... Responsibilities of the Director, Information Security Oversight Office (ISOO) [102(b)]. 1 1 Bracketed references... 32 National Defense 6 2011-07-01 2011-07-01 false Responsibilities of the Director, Information...

  6. 32 CFR 2004.10 - Responsibilities of the Director, Information Security Oversight Office (ISOO) [102(b)]. 1

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS... Responsibilities of the Director, Information Security Oversight Office (ISOO) [102(b)]. 1 1 Bracketed references... 32 National Defense 6 2010-07-01 2010-07-01 false Responsibilities of the Director, Information...

  7. 32 CFR 2001.22 - Derivative classification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Derivative classification. 2001.22 Section 2001.22 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION...

  8. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Telecommunications automated information systems and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National... network security. Each agency head shall ensure that classified information electronically accessed...

  9. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Telecommunications automated information systems and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National... network security. Each agency head shall ensure that classified information electronically accessed...

  10. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  11. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  12. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  13. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  14. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  15. 75 FR 2053 - Establishment of the Council of Governors

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-14

    ... with the Secretary of Defense; the Secretary of Homeland Security; the Assistant to the President for... Public Engagement; the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs... by the Secretary of Defense or the Secretary of Homeland Security. Such views, information, or advice...

  16. 32 CFR 2001.60 - General.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false General. 2001.60 Section 2001.60 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Self-Inspections § 2001.60...

  17. 32 CFR 2001.60 - General.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false General. 2001.60 Section 2001.60 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Self-Inspections § 2001.60...

  18. 32 CFR 2001.60 - General.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false General. 2001.60 Section 2001.60 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Self-Inspections § 2001.60...

  19. 32 CFR 2001.60 - General.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false General. 2001.60 Section 2001.60 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Self-Inspections § 2001.60...

  20. 22 CFR 125.9 - Filing of licenses and other authorizations for exports of classified technical data and...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Defense Trade Controls to the Defense Security Service of the Department of Defense in accordance with the provisions of the Department of Defense National Industrial Security Program Operating Manual (unless such... a copy of the license to the applicant for the applicant's information. The Defense Security Service...

  1. 32 CFR 2001.52 - Emergency authority.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001... dissemination, transmission, safeguarding, and destruction of classified information during certain emergency...

  2. Looming Discontinuities in U.S. Military Strategy and Defense Planning: Colliding RMAs Necessitate a New Strategy

    DTIC Science & Technology

    2011-01-01

    CARE INFRASTRUCTURE AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND...research was conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute, a federally funded...Marine Corps, the defense agencies, and the defense Intelligence Community. For more information on the International Security and Defense Policy

  3. 32 CFR 2001.40 - General.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... crucial nature of the information; analysis of known and anticipated threats; vulnerability; and... Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.40 General...

  4. 32 CFR 2001.40 - General.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... crucial nature of the information; analysis of known and anticipated threats; vulnerability; and... Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.40 General...

  5. 32 CFR 2001.40 - General.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... crucial nature of the information; analysis of known and anticipated threats; vulnerability; and... Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.40 General...

  6. 32 CFR 2001.40 - General.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... crucial nature of the information; analysis of known and anticipated threats; vulnerability; and... Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.40 General...

  7. 32 CFR 2001.40 - General.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... crucial nature of the information; analysis of known and anticipated threats; vulnerability; and... Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.40 General...

  8. 32 CFR 2001.37 - Assistance to the Department of State.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Assistance to the Department of State. 2001.37 Section 2001.37 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION...

  9. 32 CFR 154.65 - General.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY... privacy, it is Department of Defense policy that such personal information shall be handled with the... personnel, contractor employees, and other persons affiliated with the Department of Defense, for access to...

  10. 32 CFR 2700.42 - Responsibility for safeguarding classified information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... information. 2700.42 Section 2700.42 National Defense Other Regulations Relating to National Defense OFFICE FOR MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Safeguarding § 2700.42... maintenance of the security of classified information rest with each person having knowledge or physical...

  11. A Study of Security Awareness Information Delivery within the Defense Intelligence Community

    ERIC Educational Resources Information Center

    Krasley, Paul F.

    2011-01-01

    Due to limited resources and inconsistent guidance from the U.S. Federal Government, Department of Defense, and multiple environments within the intelligence community, the defense intelligence agencies each developed their own methods to deliver security awareness information. These multiple delivery methods may be providing different levels of…

  12. Functions of the Department of Defense and Its Major Components

    DTIC Science & Technology

    2010-12-21

    Information Center (DTIC),” August 19, 2005 (ax) DoD Directive 5105.72, “Defense Technology Security Administration ( DTSA ),” July 28, 2005 (ay) DoD...Information Center (DTIC). See DoDD 5105.73 (Reference (aw)). (4) Defense Technology Security Administration ( DTSA ). See DoDD 5105.72

  13. Defense Security Enterprise Architecture (DSEA) Product Reference Guide. Revision 1.0

    DTIC Science & Technology

    2016-06-01

    research and development efforts and functional requirements to provide an information sharing capability across all defense security domains. The...Office of the Secretary of Defense (OSD) Research and Development (RDT&E) initiative addressing vertical and horizontal information sharing across the...legal responsibilities to ensure data received by analysts meets user- specified criteria. This advancement in information sharing is made

  14. 32 CFR 2700.11 - Basic policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... government information with the need to protect certain national security information from disclosure, these... Defense Other Regulations Relating to National Defense OFFICE FOR MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Original Classification § 2700.11 Basic policy. (a) General. It is the policy of OMSN...

  15. 2011 Defense Industrial Base Critical Infrastructure Protection Conference (DIBCIP)

    DTIC Science & Technology

    2011-08-25

    Office of the Program Manager, Information Sharing Environment u Mr. Vince Jarvie , Vice President, Corporate Security, L-3 Communications...National Defense University IRM College and in 2008 he obtained the Certified Information System Security Professional certificate. MR. VINCE JARVIE ...Vice President, Corporate Security, L-3 Communciations Corporation Mr. Vincent (Vince) Jarvie is the Vice President, Corporate Security for L-3

  16. 32 CFR 2700.51 - Information Security Oversight Committee.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Information Security Oversight Committee. 2700... MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Implementation and Review § 2700.51 Information Security Oversight Committee. The OMSN Information Security Oversight Committee shall be chaired...

  17. 32 CFR 2700.51 - Information Security Oversight Committee.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Oversight Committee. 2700... MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Implementation and Review § 2700.51 Information Security Oversight Committee. The OMSN Information Security Oversight Committee shall be chaired...

  18. 32 CFR 2001.34 - Referrals.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... actions and decisions in a manner that facilitates archival processing for public access. Central agency... Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Declassification § 2001.34...

  19. 32 CFR 2001.90 - Agency annual reporting requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Agency annual reporting requirements. 2001.90 Section 2001.90 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY... Defense, acting as the executive agent for the National Industrial Security Program under E.O.12829, as...

  20. 32 CFR 2001.90 - Agency annual reporting requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Agency annual reporting requirements. 2001.90 Section 2001.90 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY... Defense, acting as the executive agent for the National Industrial Security Program under E.O.12829, as...

  1. 32 CFR 2001.90 - Agency annual reporting requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Agency annual reporting requirements. 2001.90 Section 2001.90 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY... Defense, acting as the executive agent for the National Industrial Security Program under E.O.12829, as...

  2. 32 CFR 2001.90 - Agency annual reporting requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Agency annual reporting requirements. 2001.90 Section 2001.90 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY... Defense, acting as the executive agent for the National Industrial Security Program under E.O.12829, as...

  3. 32 CFR 2001.90 - Agency annual reporting requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Agency annual reporting requirements. 2001.90 Section 2001.90 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY... Defense, acting as the executive agent for the National Industrial Security Program under E.O.12829, as...

  4. 32 CFR 2400.44 - Custodians.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.44 Custodians...

  5. 32 CFR 2400.40 - Responsibility.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.40 Responsibility...

  6. 32 CFR 2400.44 - Custodians.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.44 Custodians...

  7. 32 CFR 2400.40 - Responsibility.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.40 Responsibility...

  8. 32 CFR 2400.40 - Responsibility.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.40 Responsibility...

  9. 32 CFR 2400.44 - Custodians.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.44 Custodians...

  10. 32 CFR 2400.40 - Responsibility.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.40 Responsibility...

  11. 32 CFR 2400.40 - Responsibility.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.40 Responsibility...

  12. 32 CFR 2400.44 - Custodians.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.44 Custodians...

  13. 32 CFR 2400.44 - Custodians.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.44 Custodians...

  14. 32 CFR 2700.3 - Applicability.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE FOR MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Introduction § 2700.3 Applicability. This Regulation supplements E.O. 12065 within OMSN with regard to National Security Information. In consonance with the authorities listed in § 2700...

  15. The Department of Defense Information Security Process: A Study of Change Acceptance and Past-Performance-Based Outsourcing

    ERIC Educational Resources Information Center

    Hackney, Dennis W. G.

    2011-01-01

    Subchapter III of Chapter 35 of Title 44, United States Code, Federal Information Security Management Act of 2002; Department of Defense (DoD) Directive 8500.01E, Information Assurance, October 24, 2002; DoD Directive 8100.1, Global Information Grid Overarching Policy, September 19, 2002; and DoD Instruction 8500.2, Information Assurance…

  16. 32 CFR 2400.43 - Heads of offices.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.43 Heads of...

  17. 32 CFR 2400.41 - Office Review Committee.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.41 Office Review...

  18. 32 CFR 2400.41 - Office Review Committee.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.41 Office Review...

  19. 32 CFR 2400.41 - Office Review Committee.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.41 Office Review...

  20. 32 CFR 2400.43 - Heads of offices.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.43 Heads of...

  1. 32 CFR 2400.41 - Office Review Committee.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.41 Office Review...

  2. 32 CFR 2400.43 - Heads of offices.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.43 Heads of...

  3. 32 CFR 2400.43 - Heads of offices.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.43 Heads of...

  4. 32 CFR 2400.43 - Heads of offices.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.43 Heads of...

  5. 32 CFR 2400.41 - Office Review Committee.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.41 Office Review...

  6. 32 CFR 2103.51 - Information Security Oversight Committee.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Information Security Oversight Committee. 2103... BE DECLASSIFIED Implementation and Review § 2103.51 Information Security Oversight Committee. The NCS Information Security Oversight Committee shall be chaired by the Staff Counsel of the National Security...

  7. 32 CFR 2103.51 - Information Security Oversight Committee.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Oversight Committee. 2103... BE DECLASSIFIED Implementation and Review § 2103.51 Information Security Oversight Committee. The NCS Information Security Oversight Committee shall be chaired by the Staff Counsel of the National Security...

  8. 32 CFR 236.4 - Procedures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... DEFENSE (DoD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... a recurring basis, and to the greatest extent possible, cyber security information relating to... Office is the overall point of contact for the program. The DoD Cyber Crime Center's DoD-DIB...

  9. 32 CFR 236.4 - Procedures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... a recurring basis, and to the greatest extent possible, cyber security information relating to... Office is the overall point of contact for the program. The DoD Cyber Crime Center's DoD-DIB...

  10. 32 CFR 236.4 - Procedures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... a recurring basis, and to the greatest extent possible, cyber security information relating to... Office is the overall point of contact for the program. The DoD Cyber Crime Center's DoD-DIB...

  11. 48 CFR 504.402 - General.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) Implements the requirements of the Department of Defense's Industrial Security Regulation (ISR) and Industrial Security Manual for Safeguarding Classified Information (ISM). By agreement, the Department of Defense (DOD) will act for, and on behalf of, GSA in rendering security services required for safeguarding...

  12. 32 CFR 2003.1 - Purpose (Article I).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Purpose (Article I). 2003.1 Section 2003.1 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE...) BYLAWS, RULES, AND APPEAL PROCEDURES Bylaws § 2003.1 Purpose (Article I). The Interagency Security...

  13. 32 CFR 2003.1 - Purpose (Article I).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Purpose (Article I). 2003.1 Section 2003.1 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE...) BYLAWS, RULES, AND APPEAL PROCEDURES Bylaws § 2003.1 Purpose (Article I). The Interagency Security...

  14. 78 FR 9405 - Agency Information Collection Activities: Request for Expressions of Interest (EOI) To Perform a...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-08

    ..., 1601-- NEW. SUMMARY: The Department of Homeland Security, Office of Health Affairs Chemical Defense... DEPARTMENT OF HOMELAND SECURITY Agency Information Collection Activities: Request for Expressions of Interest (EOI) To Perform a Chemical Defense Demonstration Project AGENCY: Office of Health...

  15. 77 FR 29616 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-18

    .... DCIO 01 System name: Defense Industrial Base (DIB) Cyber Security/Information Assurance Records. System location: Director, Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program, 1235 South Clark Street, Suite 1500, Arlington, VA 22202. DoD Cyber Crime Center, 911 Elkridge Landing...

  16. 32 CFR 2102.1 - Introduction.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Other Regulations Relating to National Defense NATIONAL SECURITY COUNCIL RULES AND REGULATIONS TO.... 552a) applies to the National Security Council (hereafter NSC), it provides the American public with... identifiable records and information from the National Security Council. (b) The NSC Staff, in addition to...

  17. 32 CFR 2102.1 - Introduction.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Other Regulations Relating to National Defense NATIONAL SECURITY COUNCIL RULES AND REGULATIONS TO.... 552a) applies to the National Security Council (hereafter NSC), it provides the American public with... identifiable records and information from the National Security Council. (b) The NSC Staff, in addition to...

  18. 32 CFR 2102.1 - Introduction.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Defense Other Regulations Relating to National Defense NATIONAL SECURITY COUNCIL RULES AND REGULATIONS TO.... 552a) applies to the National Security Council (hereafter NSC), it provides the American public with... identifiable records and information from the National Security Council. (b) The NSC Staff, in addition to...

  19. 32 CFR 2102.1 - Introduction.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense Other Regulations Relating to National Defense NATIONAL SECURITY COUNCIL RULES AND REGULATIONS TO.... 552a) applies to the National Security Council (hereafter NSC), it provides the American public with... identifiable records and information from the National Security Council. (b) The NSC Staff, in addition to...

  20. 32 CFR 2102.1 - Introduction.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Other Regulations Relating to National Defense NATIONAL SECURITY COUNCIL RULES AND REGULATIONS TO.... 552a) applies to the National Security Council (hereafter NSC), it provides the American public with... identifiable records and information from the National Security Council. (b) The NSC Staff, in addition to...

  1. 75 FR 57740 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-22

    ... Committee on Oversight and Government Reform, the Senate Committee on Homeland Security and Governmental... OSD Federal Register Liaison Officer, Department of Defense. K890.13 System Name: Security Container... Security Officer, Headquarters, Defense Information Systems Agency-Europe, APO AE 09131-4103. Headquarters...

  2. 32 CFR 2004.12 - Reviews by ISOO [102(b)(4)].

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Reviews by ISOO [102(b)(4)]. 2004.12 Section 2004.12 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1...

  3. Technologies for distributed defense

    NASA Astrophysics Data System (ADS)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  4. A Delicate Balance: National Security vs. Public Access

    ERIC Educational Resources Information Center

    Klein, Bonnie; Schwalb, Sandy

    2005-01-01

    Sometimes people want to see data that the government thinks should be kept under wraps. How does the Department of Defense balance the scales of justice while still ensuring information security? In the aftermath of September 11, 2001, the Defense Technical Information Center (DTIC) found itself in the spotlight as journalists, academics, and…

  5. 32 CFR 1633.5 - Securing information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Securing information. 1633.5 Section 1633.5... CLASSIFICATION § 1633.5 Securing information. The classifying authority is authorized to request and receive information whenever such information will assist in determining the proper classification of a registrant. ...

  6. 77 FR 38274 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-27

    .... SUPPLEMENTARY INFORMATION: The Defense Security Service systems of records notices subject to the Privacy Act of... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2012-OS-0077] Privacy Act of 1974; System of Records AGENCY: Defense Security Service, DoD. ACTION: Notice to Delete Four Systems of Records...

  7. Ethical Hacking in Information Security Curricula

    ERIC Educational Resources Information Center

    Trabelsi, Zouheir; McCoey, Margaret

    2016-01-01

    Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…

  8. CIOs Uncensored: Security Smarts.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  9. 32 CFR 236.2 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE... defense information. (e) Cyber incident means actions taken through the use of computer networks that... residing therein. (f) Cyber intrusion damage assessment means a managed, coordinated process to determine...

  10. 32 CFR 236.2 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE... defense information. (e) Cyber incident means actions taken through the use of computer networks that... residing therein. (f) Cyber intrusion damage assessment means a managed, coordinated process to determine...

  11. Sandia National Laboratories: National Security Missions: International

    Science.gov Websites

    ; Security Weapons Science & Technology Defense Systems & Assessments About Defense Systems & ; Development Technology Deployment Centers Working With Sandia Working With Sandia Prospective Suppliers What Information Construction & Facilities Contract Audit Sandia's Economic Impact Licensing & Technology

  12. 32 CFR 236.1 - Purpose.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA) ACTIVITIES § 236.1 Purpose. Cyber threats to DIB unclassified information systems represent an unacceptable...

  13. 32 CFR 236.1 - Purpose.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA) ACTIVITIES § 236.1 Purpose. Cyber threats to DIB unclassified information systems represent an unacceptable...

  14. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  15. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  16. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  17. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  18. 32 CFR 236.1 - Purpose.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... DEFENSE (DoD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA) ACTIVITIES § 236.1 Purpose. Cyber threats to DIB unclassified information systems represent an unacceptable...

  19. 32 CFR 236.6 - General provisions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false General provisions. 236.6 Section 236.6 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS DEPARTMENT OF DEFENSE (DoD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE...

  20. 32 CFR 236.6 - General provisions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false General provisions. 236.6 Section 236.6 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE...

  1. 32 CFR 236.6 - General provisions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false General provisions. 236.6 Section 236.6 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE...

  2. 75 FR 37253 - Classified National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-28

    ..., Intelligence, National defense, National security information, Presidential documents, Security information... reveal the identity of a confidential human source or a human intelligence source or key design concepts... or a human intelligence source, the duration shall be up to 75 years and shall be designated with the...

  3. How secure is your information system? An investigation into actual healthcare worker password practices.

    PubMed

    Cazier, Joseph A; Medlin, B Dawn

    2006-09-27

    For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed.

  4. How Secure Is Your Information System? An Investigation into Actual Healthcare Worker Password Practices

    PubMed Central

    Cazier, Joseph A; Medlin, B. Dawn

    2006-01-01

    For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed. PMID:18066366

  5. Exploring Effects of Organizational Culture upon Implementation of Information Security Awareness and Training Programs within the Defense Industry Located in the Tennessee Valley Region

    ERIC Educational Resources Information Center

    Grant, Robert Luther

    2017-01-01

    Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…

  6. 75 FR 32639 - Defense Federal Acquisition Regulation Supplement; Limitations on Procurements With Non-Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-08

    ... elements of the Department of Homeland Security concerned with the analysis of intelligence information... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 217 RIN 0750-AG67 Defense Federal Acquisition Regulation Supplement; Limitations on Procurements With Non-Defense Agencies (DFARS...

  7. Agencies Should Assess Vulnerabilities and Improve Guidance for Protecting Export-Controlled Information at Companies

    DTIC Science & Technology

    2006-12-01

    Supplement DOD Department of Defense DOL Department of Labor DTSA Defense Technology Security Administration EAR Export Administration Regulations...and outreach to companies on the export regulations. DOD: The Defense Technology Security Administration ( DTSA ) represents DOD on export control...and technologies, which DOD oversees. DTSA serves an advisory role in State’s and Commerce’s export license review processes and offers technical

  8. A Learning-Based Approach to Reactive Security

    NASA Astrophysics Data System (ADS)

    Barth, Adam; Rubinstein, Benjamin I. P.; Sundararajan, Mukund; Mitchell, John C.; Song, Dawn; Bartlett, Peter L.

    Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the reactive defender learns from past attacks instead of myopically overreacting to the last attack. Our game-theoretic model follows common practice in the security literature by making worst-case assumptions about the attacker: we grant the attacker complete knowledge of the defender's strategy and do not require the attacker to act rationally. In this model, we bound the competitive ratio between a reactive defense algorithm (which is inspired by online learning theory) and the best fixed proactive defense. Additionally, we show that, unlike proactive defenses, this reactive strategy is robust to a lack of information about the attacker's incentives and knowledge.

  9. 48 CFR 239.7102-1 - General.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-1 General. (a) Agencies shall ensure that information assurance is... include— (1) The National Security Act; (2) The Clinger-Cohen Act; (3) National Security...

  10. 48 CFR 239.7102-1 - General.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-1 General. (a) Agencies shall ensure that information assurance is... include— (1) The National Security Act; (2) The Clinger-Cohen Act; (3) National Security...

  11. 48 CFR 239.7102-1 - General.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-1 General. (a) Agencies shall ensure that information assurance is... include— (1) The National Security Act; (2) The Clinger-Cohen Act; (3) National Security...

  12. 48 CFR 239.7102-1 - General.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-1 General. (a) Agencies shall ensure that information assurance is... include— (1) The National Security Act; (2) The Clinger-Cohen Act; (3) National Security...

  13. 48 CFR 239.7102-1 - General.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-1 General. (a) Agencies shall ensure that information assurance is... include— (1) The National Security Act; (2) The Clinger-Cohen Act; (3) National Security...

  14. 32 CFR 154.6 - Standards for access to classified information or assignment to sensitive duties.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION... person's loyalty, reliability, and trustworthiness are such that entrusting the person with classified... reasonable basis for doubting the person's loyalty to the Government of the United States. ...

  15. Secured network sensor-based defense system

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Shen, Dan; Ge, Linqiang; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    Network sensor-based defense (NSD) systems have been widely used to defend against cyber threats. Nonetheless, if the adversary finds ways to identify the location of monitor sensors, the effectiveness of NSD systems can be reduced. In this paper, we propose both temporal and spatial perturbation based defense mechanisms to secure NSD systems and make the monitor sensor invisible to the adversary. The temporal-perturbation based defense manipulates the timing information of published data so that the probability of successfully recognizing monitor sensors can be reduced. The spatial-perturbation based defense dynamically redeploys monitor sensors in the network so that the adversary cannot obtain the complete information to recognize all of the monitor sensors. We carried out experiments using real-world traffic traces to evaluate the effectiveness of our proposed defense mechanisms. Our data shows that our proposed defense mechanisms can reduce the attack accuracy of recognizing detection sensors.

  16. Security Assistance: DOD’s Ongoing Reforms Address Some Challenges, but Additional Information Is Needed to Further Enhance Program Management

    DTIC Science & Technology

    2012-11-01

    Abbreviations BPC building partner capacity DOD Department of Defense DSCA Defense Security Cooperation Agency EFTS Enhanced Freight Tracking System...SCOs are ready to receive a planned delivery. For both FMS and pseudo-FMS processes, DOD uses the Enhanced Freight Tracking System ( EFTS ), a secure...providing data for this system. The Security Assistance Management Manual recommends that SCOs use the EFTS to maintain awareness of incoming shipments

  17. 76 FR 43993 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-22

    ...; System of Records AGENCY: National Security Agency/Central Security Service, Department of Defense. ACTION: Notice to Delete a System of Records. SUMMARY: The National Security Agency/Central Security.... FOR FURTHER INFORMATION CONTACT: Ms. Anne Hill, National Security Agency/Central Security Service...

  18. 32 CFR 298.3 - Records maintained by DIS.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... industrial security records. (c) Publications referenced in “DIS Directives Listing” (DIS 00-1-L). A copy of..., covering criminal, fraud, counterintelligence, and personnel security information. This index also includes security clearance determinations made by the various components of the Department of Defense. Information...

  19. 32 CFR 700.1121 - Disclosure, publication and security of official information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... information. 700.1121 Section 700.1121 National Defense Department of Defense (Continued) DEPARTMENT OF THE... information. (a) No person in the Department of the Navy shall convey or disclose by oral or written communications, publication, graphic (including photographic) or other means, any classified information except...

  20. 32 CFR 700.1121 - Disclosure, publication and security of official information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... information. 700.1121 Section 700.1121 National Defense Department of Defense (Continued) DEPARTMENT OF THE... information. (a) No person in the Department of the Navy shall convey or disclose by oral or written communications, publication, graphic (including photographic) or other means, any classified information except...

  1. 32 CFR 700.1121 - Disclosure, publication and security of official information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... information. 700.1121 Section 700.1121 National Defense Department of Defense (Continued) DEPARTMENT OF THE... information. (a) No person in the Department of the Navy shall convey or disclose by oral or written communications, publication, graphic (including photographic) or other means, any classified information except...

  2. 32 CFR 700.1121 - Disclosure, publication and security of official information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... information. 700.1121 Section 700.1121 National Defense Department of Defense (Continued) DEPARTMENT OF THE... information. (a) No person in the Department of the Navy shall convey or disclose by oral or written communications, publication, graphic (including photographic) or other means, any classified information except...

  3. 32 CFR 700.1121 - Disclosure, publication and security of official information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... information. 700.1121 Section 700.1121 National Defense Department of Defense (Continued) DEPARTMENT OF THE... information. (a) No person in the Department of the Navy shall convey or disclose by oral or written communications, publication, graphic (including photographic) or other means, any classified information except...

  4. Integrating Programming Language and Operating System Information Security Mechanisms

    DTIC Science & Technology

    2016-08-31

    suggestions for reducing the burden, to the Department of Defense, Executive Service Directorate (0704-0188). Respondents should be aware that...improve the precision of security enforcement, and to provide greater assurance of information security. This grant focuses on two key projects: language...based control of authority; and formal guarantees for the correctness of audit information. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17

  5. Domestic Trends in the United States, China, and Iran. Implications for U.S. Navy Strategic Planning

    DTIC Science & Technology

    2008-01-01

    ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE The RAND Corporation is a nonprofit research...Marine Corps, the defense agencies, and the defense Intelligence Community under Contract W74V8H-06-C-0002. iii Preface This book examines the future... Intelligence Community. For more information on RAND’s International Security and Defense Policy Center, contact the Director, James Dobbins. He can be

  6. Research on information security in big data era

    NASA Astrophysics Data System (ADS)

    Zhou, Linqi; Gu, Weihong; Huang, Cheng; Huang, Aijun; Bai, Yongbin

    2018-05-01

    Big data is becoming another hotspot in the field of information technology after the cloud computing and the Internet of Things. However, the existing information security methods can no longer meet the information security requirements in the era of big data. This paper analyzes the challenges and a cause of data security brought by big data, discusses the development trend of network attacks under the background of big data, and puts forward my own opinions on the development of security defense in technology, strategy and product.

  7. Interdependent Risk and Cyber Security: An Analysis of Security Investment and Cyber Insurance

    ERIC Educational Resources Information Center

    Shim, Woohyun

    2010-01-01

    An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…

  8. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.19...

  9. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.19...

  10. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.19...

  11. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.19...

  12. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.19...

  13. 78 FR 34112 - Agency Information Collection Activities: Request for Expressions of Interest (EOI) To Perform a...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-06

    ..., 1601-- NEW SUMMARY: The Department of Homeland Security, Office of Health Affairs, Chemical Defense... DEPARTMENT OF HOMELAND SECURITY Agency Information Collection Activities: Request for Expressions... and Budget. Comments should be addressed to OMB Desk Officer, Department of Homeland Security and sent...

  14. Automated Data Processing Support of Investigation and Security Missions at the Defense Investigative Service

    DTIC Science & Technology

    1990-03-29

    This is our final report on the Audit of Automated Data Processing Support of Investigative and Security Missions at the Defense Investigative...Service for your information and use. Comments on a draft of this report were considered in preparing the final report. The audit was made from May through...October 1989. The objectives of the audit were to determine if the Defense Investigative Service (DIS) was effectively managing automated data

  15. 76 FR 58786 - Privacy Act of 1974; Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-22

    ... National Security Agency/Central Security System systems of records notices subject to the Privacy Act of... inquiries to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; Systems of Records AGENCY: National Security Agency/Central Security Service, Department of Defense (DoD...

  16. 32 CFR 2700.44 - Administrative sanctions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Administrative sanctions. 2700.44 Section 2700.44 National Defense Other Regulations Relating to National Defense OFFICE FOR MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Safeguarding § 2700.44 Administrative sanctions. Officers and...

  17. 76 FR 23971 - Proposed Information Collection; Comment Request; Competitive Enhancement Needs Assessment Survey...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-29

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment Request; Competitive Enhancement Needs Assessment Survey Program AGENCY: Bureau of Industry and Security... their abilities to meet defense program needs. The information collected from voluntary surveys will be...

  18. 32 CFR 2400.5 - Basic policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM... basis for classifying information. The policy of the Office of Science and Technology Policy is to make...

  19. 32 CFR 2400.5 - Basic policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM... basis for classifying information. The policy of the Office of Science and Technology Policy is to make...

  20. 32 CFR 2400.5 - Basic policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM... basis for classifying information. The policy of the Office of Science and Technology Policy is to make...

  1. 32 CFR 2400.5 - Basic policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM... basis for classifying information. The policy of the Office of Science and Technology Policy is to make...

  2. 32 CFR 2400.5 - Basic policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM... basis for classifying information. The policy of the Office of Science and Technology Policy is to make...

  3. 32 CFR 236.2 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... DEPARTMENT OF DEFENSE (DoD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE... information. (e) Cyber incident means actions taken through the use of computer networks that result in an...) Cyber intrusion damage assessment means a managed, coordinated process to determine the effect on...

  4. A Reading Preference and Risk Taxonomy for Printed Proprietary Information Compromise in the Aerospace and Defense Industry

    ERIC Educational Resources Information Center

    Stalker, Joshua Dylan

    2012-01-01

    The protection of proprietary information that users print from their information systems is a significant and relevant concern in the field of information security to both researchers and practitioners. Information security researchers have repeatedly indicated that human behaviors and perception are important factors influencing the information…

  5. 32 CFR 236.3 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... systems. (b) Increase the Government and DIB situational awareness of the extent and severity of cyber...

  6. 32 CFR 236.3 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... systems. (b) Increase the Government and DIB situational awareness of the extent and severity of cyber...

  7. 10 CFR 110.121 - Security clearances and access to classified information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... be granted unless required security clearances have been obtained. (h) For good cause, the Commission... the common defense and security; and (2) Which it has received from another Government agency, without...

  8. How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains

    NASA Astrophysics Data System (ADS)

    Perry, William G.

    2006-04-01

    One goal of database mining is to draw unique and valid perspectives from multiple data sources. Insights that are fashioned from closely-held data stores are likely to possess a high degree of reliability. The degree of information assurance comes into question, however, when external databases are accessed, combined and analyzed to form new perspectives. ISO/IEC 17799, Information technology-Security techniques-Code of practice for information security management, can be used to establish a higher level of information assurance among disparate entities using data mining in the defense, homeland security, commercial and other civilian/commercial domains. Organizations that meet ISO/IEC information security standards have identified and assessed risks, threats and vulnerabilities and have taken significant proactive steps to meet their unique security requirements. The ISO standards address twelve domains: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management and business continuity management and compliance. Analysts can be relatively confident that if organizations are ISO 17799 compliant, a high degree of information assurance is likely to be a characteristic of the data sets being used. The reverse may be true. Extracting, fusing and drawing conclusions based upon databases with a low degree of information assurance may be wrought with all of the hazards that come from knowingly using bad data to make decisions. Using ISO/IEC 17799 as a baseline for information assurance can help mitigate these risks.

  9. Crosstalk: The Journal of Defense Software Engineering. Volume 22, Number 3

    DTIC Science & Technology

    2009-04-01

    international standard for information security management systems like ISO /IEC 27001 :2005 [1] existed. Since that time, the organization has developed control...of ISO /IEC 27001 and the desire to make decisions based on business value and risk has prompted Ford’s IT Security and Controls organi- zation to begin...their conventional application security operation.u References 1. ISO /IEC 27001 :2005. “Information Technology – Security Techniques – Information

  10. 32 CFR 236.3 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... DEFENSE (DoD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... systems. (b) Increase the Government and DIB situational awareness of the extent and severity of cyber...

  11. 32 CFR 1902.13 - Declassification and downgrading policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Declassification and downgrading policy. 1902.13 Section 1902.13 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY INFORMATION SECURITY REGULATIONS Declassification and Downgrading § 1902.13 Declassification and...

  12. 32 CFR 1902.13 - Declassification and downgrading policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Declassification and downgrading policy. 1902.13 Section 1902.13 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY INFORMATION SECURITY REGULATIONS Declassification and Downgrading § 1902.13 Declassification and...

  13. 32 CFR 2400.36 - Declassification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Declassification. 2400.36 Section 2400.36 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  14. 32 CFR 2400.36 - Declassification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Declassification. 2400.36 Section 2400.36 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  15. 32 CFR 2400.24 - Downgrading.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Downgrading. 2400.24 Section 2400.24 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  16. 32 CFR 2400.24 - Downgrading.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Downgrading. 2400.24 Section 2400.24 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  17. 32 CFR 2400.24 - Downgrading.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Downgrading. 2400.24 Section 2400.24 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  18. 32 CFR 2400.36 - Declassification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Declassification. 2400.36 Section 2400.36 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  19. 32 CFR 2400.36 - Declassification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Declassification. 2400.36 Section 2400.36 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  20. 32 CFR 2400.24 - Downgrading.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Downgrading. 2400.24 Section 2400.24 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  1. 32 CFR 2400.24 - Downgrading.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Downgrading. 2400.24 Section 2400.24 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  2. 32 CFR 2400.36 - Declassification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Declassification. 2400.36 Section 2400.36 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  3. 32 CFR 2700.13 - Duration of original classification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Duration of original classification. 2700.13 Section 2700.13 National Defense Other Regulations Relating to National Defense OFFICE FOR MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Original Classification § 2700.13 Duration of...

  4. From the Weakest Link to the Best Defense: Exploring the Factors That Affect Employee Intention to Comply with Information Security Policies

    ERIC Educational Resources Information Center

    Aurigemma, Salvatore

    2013-01-01

    Information and information systems have become embedded in the fabric of contemporary organizations throughout the world. As the reliance on information technology has increased, so too have the threats and costs associated with protecting organizational information resources. To combat potential information security threats, organizations rely…

  5. 32 CFR 223.4 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... dissemination of unclassified information pertaining to security measures, including security plans, procedures... security by significantly increasing the likelihood of the illegal production of nuclear weapons or the... the public or the common defense and security. (d) This part and title 10 of the Code of Federal...

  6. 32 CFR 223.4 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... dissemination of unclassified information pertaining to security measures, including security plans, procedures... security by significantly increasing the likelihood of the illegal production of nuclear weapons or the... the public or the common defense and security. (d) This part and title 10 of the Code of Federal...

  7. 22 CFR 126.1 - Prohibited exports, imports, and sales to or from certain countries.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... other approvals for exports and imports of defense articles and defense services destined for or... in furtherance of world peace and the security and foreign policy of the United States. Information... a U.S. Government department or agency, do not apply with respect to defense articles or defense...

  8. 22 CFR 126.1 - Prohibited exports, imports, and sales to or from certain countries.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... other approvals for exports and imports of defense articles and defense services, destined for or... in furtherance of world peace and the security and foreign policy of the United States. Information... a U.S. Government department or agency, do not apply with respect to defense articles or defense...

  9. 36 CFR 1260.32 - How is the NDC administered?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., Defense, Energy, and Homeland Security, the Attorney General, and the Director of National Intelligence... ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION The National Declassification...

  10. 36 CFR 1260.32 - How is the NDC administered?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., Defense, Energy, and Homeland Security, the Attorney General, and the Director of National Intelligence... ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION The National Declassification...

  11. 46 CFR 503.51 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security Program...) National security means the national defense or foreign relations of the United States. (m) Need to know... new form into a new document. (s) Unauthorized disclosure means a communication or physical transfer...

  12. 32 CFR 2003.4 - Membership (Article IV).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Membership (Article IV). 2003.4 Section 2003.4 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE...) BYLAWS, RULES, AND APPEAL PROCEDURES Bylaws § 2003.4 Membership (Article IV). (a) Member organizations...

  13. 32 CFR 2003.4 - Membership (Article IV).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Membership (Article IV). 2003.4 Section 2003.4 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE...) BYLAWS, RULES, AND APPEAL PROCEDURES Bylaws § 2003.4 Membership (Article IV). (a) Member organizations...

  14. 32 CFR 2400.6 - Classification levels.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Classification levels. 2400.6 Section 2400.6 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  15. 32 CFR 2400.15 - Classification guides.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Classification guides. 2400.15 Section 2400.15 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  16. 32 CFR 2400.6 - Classification levels.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Classification levels. 2400.6 Section 2400.6 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  17. 32 CFR 2400.1 - Authority.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Authority. 2400.1 Section 2400.1 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM General...

  18. 32 CFR 2400.34 - Classification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Classification. 2400.34 Section 2400.34 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Foreign...

  19. 32 CFR 2400.1 - Authority.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Authority. 2400.1 Section 2400.1 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM General...

  20. 32 CFR 2400.37 - Mandatory review.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Mandatory review. 2400.37 Section 2400.37 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  1. 32 CFR 2400.34 - Classification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Classification. 2400.34 Section 2400.34 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Foreign...

  2. 32 CFR 2400.1 - Authority.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Authority. 2400.1 Section 2400.1 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM General...

  3. 32 CFR 2400.34 - Classification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Classification. 2400.34 Section 2400.34 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Foreign...

  4. 32 CFR 2400.6 - Classification levels.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Classification levels. 2400.6 Section 2400.6 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  5. 32 CFR 2400.37 - Mandatory review.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Mandatory review. 2400.37 Section 2400.37 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  6. 32 CFR 2400.1 - Authority.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Authority. 2400.1 Section 2400.1 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM General...

  7. 32 CFR 2400.15 - Classification guides.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Classification guides. 2400.15 Section 2400.15 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  8. 32 CFR 2400.37 - Mandatory review.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Mandatory review. 2400.37 Section 2400.37 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  9. 32 CFR 2400.34 - Classification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Classification. 2400.34 Section 2400.34 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Foreign...

  10. 32 CFR 2400.15 - Classification guides.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Classification guides. 2400.15 Section 2400.15 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  11. 32 CFR 2400.37 - Mandatory review.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Mandatory review. 2400.37 Section 2400.37 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  12. 32 CFR 2400.15 - Classification guides.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Classification guides. 2400.15 Section 2400.15 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  13. 32 CFR 2400.6 - Classification levels.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Classification levels. 2400.6 Section 2400.6 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  14. 32 CFR 2400.37 - Mandatory review.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Mandatory review. 2400.37 Section 2400.37 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  15. 32 CFR 2400.1 - Authority.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Authority. 2400.1 Section 2400.1 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM General...

  16. 32 CFR 2400.6 - Classification levels.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Classification levels. 2400.6 Section 2400.6 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  17. 32 CFR 2400.15 - Classification guides.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Classification guides. 2400.15 Section 2400.15 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  18. 32 CFR 2400.34 - Classification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Classification. 2400.34 Section 2400.34 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Foreign...

  19. 32 CFR 2001.71 - Coverage.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Coverage. 2001.71 Section 2001.71 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL... Training § 2001.71 Coverage. (a) General. Each department or agency shall establish and maintain a formal...

  20. 32 CFR 2001.71 - Coverage.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Coverage. 2001.71 Section 2001.71 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL... Training § 2001.71 Coverage. (a) General. Each department or agency shall establish and maintain a formal...

  1. 32 CFR 2001.71 - Coverage.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Coverage. 2001.71 Section 2001.71 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL... Training § 2001.71 Coverage. (a) General. Each department or agency shall establish and maintain a formal...

  2. 77 FR 8825 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-15

    ... LEAD BY EXAMPLE using the application just as we expect those ``in the field'' to do. The information... access and visibility of this information. DMHRSi uses role-based security so a user sees only the... hosted in a secure facility managed by the Defense Information Systems Agency. For JMIS military and...

  3. 32 CFR Appendix A to Part 806 - References

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION AIR FORCE FREEDOM OF..., Air Force Security and Policy Review Program AFI 36-2603, Air Force Board for Correction of Military... Responsibility AFI 36-2907, Unfavorable Information File (UIF) Program AFPD 37-1, Air Force Information...

  4. 32 CFR Appendix A to Part 806 - References

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION AIR FORCE FREEDOM OF..., Air Force Security and Policy Review Program AFI 36-2603, Air Force Board for Correction of Military... Responsibility AFI 36-2907, Unfavorable Information File (UIF) Program AFPD 37-1, Air Force Information...

  5. 36 CFR § 1260.32 - How is the NDC administered?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., Defense, Energy, and Homeland Security, the Attorney General, and the Director of National Intelligence... ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION The National Declassification...

  6. 32 CFR 2700.2 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Other Regulations Relating to National Defense OFFICE FOR MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Introduction § 2700.2 Purpose. The purpose of this Regulation is to ensure, consistent with the authorities listed in § 2700.1, that national security information originated and/or held by...

  7. 78 FR 21592 - Reporting for Calendar Year 2012 on Offsets Agreements Related to Sales of Defense Articles or...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-11

    ... Defense Services to Foreign Countries or Foreign Firms AGENCY: Bureau of Industry and Security, Department... public that U.S. firms are required to report annually to the Department of Commerce (Commerce... required to report information on contracts for the sale of defense articles or defense services to foreign...

  8. 32 CFR 2003.2 - Authority (Article II).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Authority (Article II). 2003.2 Section 2003.2 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE...) BYLAWS, RULES, AND APPEAL PROCEDURES Bylaws § 2003.2 Authority (Article II). ISCAP was established by...

  9. 32 CFR 2003.8 - Records (Article VIII).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Records (Article VIII). 2003.8 Section 2003.8 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE...) BYLAWS, RULES, AND APPEAL PROCEDURES Bylaws § 2003.8 Records (Article VIII). (a) Integrity of ISCAP...

  10. 32 CFR 2003.2 - Authority (Article II).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Authority (Article II). 2003.2 Section 2003.2 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE...) BYLAWS, RULES, AND APPEAL PROCEDURES Bylaws § 2003.2 Authority (Article II). ISCAP was established by...

  11. 32 CFR 2003.3 - Functions (Article III).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Functions (Article III). 2003.3 Section 2003.3 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE...) BYLAWS, RULES, AND APPEAL PROCEDURES Bylaws § 2003.3 Functions (Article III). In carrying out its purpose...

  12. 32 CFR 2003.3 - Functions (Article III).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Functions (Article III). 2003.3 Section 2003.3 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE...) BYLAWS, RULES, AND APPEAL PROCEDURES Bylaws § 2003.3 Functions (Article III). In carrying out its purpose...

  13. 32 CFR 2003.8 - Records (Article VIII).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Records (Article VIII). 2003.8 Section 2003.8 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE...) BYLAWS, RULES, AND APPEAL PROCEDURES Bylaws § 2003.8 Records (Article VIII). (a) Integrity of ISCAP...

  14. 32 CFR 2400.35 - Duration of classification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Duration of classification. 2400.35 Section 2400.35 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY...

  15. 32 CFR 2400.11 - Duration of classification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Duration of classification. 2400.11 Section 2400.11 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY...

  16. 32 CFR 2400.4 - Atomic Energy Material.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Atomic Energy Material. 2400.4 Section 2400.4 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  17. 32 CFR 2400.11 - Duration of classification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Duration of classification. 2400.11 Section 2400.11 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY...

  18. 32 CFR 2400.4 - Atomic Energy Material.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Atomic Energy Material. 2400.4 Section 2400.4 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  19. 32 CFR 2400.35 - Duration of classification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Duration of classification. 2400.35 Section 2400.35 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY...

  20. 32 CFR 2400.35 - Duration of classification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Duration of classification. 2400.35 Section 2400.35 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY...

  1. 32 CFR 2400.10 - Presumption of damage.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Presumption of damage. 2400.10 Section 2400.10 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  2. 32 CFR 2400.10 - Presumption of damage.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Presumption of damage. 2400.10 Section 2400.10 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  3. 32 CFR 2400.11 - Duration of classification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Duration of classification. 2400.11 Section 2400.11 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY...

  4. 32 CFR 2400.10 - Presumption of damage.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Presumption of damage. 2400.10 Section 2400.10 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  5. 32 CFR 2400.35 - Duration of classification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Duration of classification. 2400.35 Section 2400.35 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY...

  6. 32 CFR 2400.4 - Atomic Energy Material.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Atomic Energy Material. 2400.4 Section 2400.4 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  7. 32 CFR 2400.10 - Presumption of damage.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Presumption of damage. 2400.10 Section 2400.10 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  8. 32 CFR 2400.11 - Duration of classification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Duration of classification. 2400.11 Section 2400.11 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY...

  9. 32 CFR 2400.4 - Atomic Energy Material.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Atomic Energy Material. 2400.4 Section 2400.4 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  10. 32 CFR 2400.10 - Presumption of damage.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Presumption of damage. 2400.10 Section 2400.10 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  11. 32 CFR 2400.4 - Atomic Energy Material.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Atomic Energy Material. 2400.4 Section 2400.4 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  12. 32 CFR 2400.35 - Duration of classification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Duration of classification. 2400.35 Section 2400.35 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY...

  13. 32 CFR 2400.11 - Duration of classification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Duration of classification. 2400.11 Section 2400.11 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY...

  14. 76 FR 72426 - Agency Information Collection Activities: Submission for Review; Information Collection Request...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... (DHS), Science and Technology, Protected Repository for the Defense of Infrastructure Against Cyber... the Defense of Infrastructure against Cyber Threats (PREDICT) program, and is a revision of a... operational data for use in cyber security research and development through the establishment of distributed...

  15. 32 CFR 811.2 - Release of visual information materials.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Section 811.2 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE SALES AND SERVICES RELEASE, DISSEMINATION, AND SALE OF VISUAL INFORMATION MATERIALS § 811.2 Release of visual... Security and Policy Review Program. (b) The Secretary of the Air Force for Legislative Liaison (SAF/LL...

  16. Gross anatomy of network security

    NASA Technical Reports Server (NTRS)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  17. 32 CFR 2003.6 - Voting (Article VI).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Voting (Article VI). 2003.6 Section 2003.6 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE...) BYLAWS, RULES, AND APPEAL PROCEDURES Bylaws § 2003.6 Voting (Article VI). (a) Motions. When the Panel is...

  18. 32 CFR 2003.6 - Voting (Article VI).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Voting (Article VI). 2003.6 Section 2003.6 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE...) BYLAWS, RULES, AND APPEAL PROCEDURES Bylaws § 2003.6 Voting (Article VI). (a) Motions. When the Panel is...

  19. Security Assessment Simulation Toolkit (SAST) Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

    2009-11-15

    The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSDmore » NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.« less

  20. Rethinking Defensive Information Warfare

    DTIC Science & Technology

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  1. Towards an integrated defense system for cyber security situation awareness experiment

    NASA Astrophysics Data System (ADS)

    Zhang, Hanlin; Wei, Sixiao; Ge, Linqiang; Shen, Dan; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    In this paper, an implemented defense system is demonstrated to carry out cyber security situation awareness. The developed system consists of distributed passive and active network sensors designed to effectively capture suspicious information associated with cyber threats, effective detection schemes to accurately distinguish attacks, and network actors to rapidly mitigate attacks. Based on the collected data from network sensors, image-based and signals-based detection schemes are implemented to detect attacks. To further mitigate attacks, deployed dynamic firewalls on hosts dynamically update detection information reported from the detection schemes and block attacks. The experimental results show the effectiveness of the proposed system. A future plan to design an effective defense system is also discussed based on system theory.

  2. 78 FR 17220 - Request for Information (RFI) Regarding the Planned Biotechnology Development Module (BDM) As...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-20

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0018] Request for Information (RFI) Regarding the Planned Biotechnology Development Module (BDM) As Part of the National Bio and Agro-Defense... Development Module (BDM) a planned component of the National Bio and Agro-Defense Facility (NBAF) and...

  3. 32 CFR 2004.11 - Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)].

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Implementation and Oversight § 2004.11 Agency...

  4. 32 CFR 2103.21 - Definition and application.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ....21 National Defense Other Regulations Relating to National Defense NATIONAL SECURITY COUNCIL... DECLASSIFIED Derivative Classification § 2103.21 Definition and application. Derivative classification is the... substance as information that is currently classified. Thus, derivative classification may be accomplished...

  5. 32 CFR 806b.12 - Requesting the Social Security Number.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Requesting the Social Security Number. 806b.12... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.12 Requesting the Social Security Number. When asking an individual for his or her Social Security Number, always give a Privacy Act...

  6. 32 CFR 806b.12 - Requesting the Social Security Number.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Requesting the Social Security Number. 806b.12... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.12 Requesting the Social Security Number. When asking an individual for his or her Social Security Number, always give a Privacy Act...

  7. 32 CFR 806b.12 - Requesting the Social Security Number.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Requesting the Social Security Number. 806b.12... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.12 Requesting the Social Security Number. When asking an individual for his or her Social Security Number, always give a Privacy Act...

  8. 32 CFR 806b.12 - Requesting the Social Security Number.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Requesting the Social Security Number. 806b.12... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.12 Requesting the Social Security Number. When asking an individual for his or her Social Security Number, always give a Privacy Act...

  9. 32 CFR 806b.12 - Requesting the Social Security Number.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Requesting the Social Security Number. 806b.12... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.12 Requesting the Social Security Number. When asking an individual for his or her Social Security Number, always give a Privacy Act...

  10. Identifying and Eliminating Barriers Faced by Nontraditional Department of Defense Suppliers

    DTIC Science & Technology

    2014-01-01

    organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more...Commands, the Department of the Navy, the Marine Corps, the defense agencies, and the defense Intelligence Community . For more information on the RAND...17 Lack of Access to and Communication

  11. Maneuver Warfare in Cyberspace

    DTIC Science & Technology

    1997-01-01

    government departments and agencies; (2) National security and military strategies must outline a response to the threats and opportunities of cyber ... warfare ; and (3) the Department of Defense’s offensive and defensive responsibilities, parameters, and capabilities for strategic information warfare need

  12. Sandia National Laboratories: Sandia National Laboratories: Missions:

    Science.gov Websites

    ; Security Weapons Science & Technology Defense Systems & Assessments About Defense Systems & ; Development Technology Deployment Centers Working With Sandia Working With Sandia Prospective Suppliers What Information Construction & Facilities Contract Audit Sandia's Economic Impact Licensing & Technology

  13. Hybrid network defense model based on fuzzy evaluation.

    PubMed

    Cho, Ying-Chiang; Pan, Jen-Yi

    2014-01-01

    With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.

  14. Defense AT&L (Volume 36, Number 5, September-October 2007)

    DTIC Science & Technology

    2007-10-01

    requirements, providing security solutions, and manag- ing the security of information systems. 14 CAD/ PAD Require- ments Determination in the Air Force...be contacted at williams_peter@bah.com and steward_tiffani@bah.com. Defense AT&L: September-October 2007 14 Williams is director of the CAD/ PAD Joint...the U.S. House Science and Technology Subcommittee on Transportation, Aviation and Materials. Blair is the former head of the Air Force CAD/ PAD

  15. Can the Analytical Hierarchy Process Model Be Effectively Applied in the Prioritization of Information Assurance Defense In-Depth Measures? --A Quantitative Study

    ERIC Educational Resources Information Center

    Alexander, Rodney T.

    2017-01-01

    Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection…

  16. 48 CFR 239.7101 - Definition.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7101 Definition. Information assurance, as used in this subpart, means...

  17. 48 CFR 239.7101 - Definition.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7101 Definition. Information assurance, as used in this subpart, means...

  18. 48 CFR 239.7101 - Definition.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7101 Definition. Information assurance, as used in this subpart, means...

  19. 48 CFR 239.7101 - Definition.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7101 Definition. Information assurance, as used in this subpart, means...

  20. 48 CFR 239.7101 - Definition.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7101 Definition. Information assurance, as used in this subpart, means...

  1. 32 CFR 2400.3 - Applicability.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM General Provisions § 2400.3 Applicability. This Regulation governs the Office of Science and Technology Policy...

  2. 32 CFR 2400.3 - Applicability.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM General Provisions § 2400.3 Applicability. This Regulation governs the Office of Science and Technology Policy...

  3. 32 CFR 2400.3 - Applicability.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM General Provisions § 2400.3 Applicability. This Regulation governs the Office of Science and Technology Policy...

  4. 32 CFR 2400.3 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM General Provisions § 2400.3 Applicability. This Regulation governs the Office of Science and Technology Policy...

  5. 32 CFR 2400.3 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM General Provisions § 2400.3 Applicability. This Regulation governs the Office of Science and Technology Policy...

  6. 6 CFR 7.23 - Emergency release of classified information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ....23 Section 7.23 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLASSIFIED...) The Secretary of Homeland Security has delegated to certain DHS employees the authority to disclose... emergency situations when there is an imminent threat to life or in defense of the homeland. (b) In...

  7. 32 CFR 264.4 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... purposes only. 2. This information shall be accorded substantially the same degree of security protection... 413(a) of the Mutual Security Act of 1954, as amended (22 U.S.C. 1933(a)), and pursuant to the... the Mutual Security Program, to relieve the Department of Defense of administrative burdens, and to...

  8. Mapping the Risks. Assessing the Homeland Security Implications of Publicly Available Geospatial Information

    DTIC Science & Technology

    2004-01-01

    Defense Nuclear Facilities Safety Board 1 0.2 Export-Import Bank 1 0.2 National Archives and Records Administration 1 0.2 Supreme Court of the United...Agency Commodity Futures Trading Commission Consumer Product Safety Commission Defense Nuclear Facilities Safety Board Environmental Protection Agency...Intelligence www.cia.gov Defense Nuclear Facilities Safety Board Defense Nuclear Facilities Safety Board www.dnfsb.gov Department of

  9. Assistant Secretary of Defense for Homeland Defense and Global Security

    Science.gov Websites

    Defense for Policy ASD for Asian and Pacific Security Affairs ASD for Homeland Defense Global Security Special Operations/Low-Intensity Conflict Counternarcotics and Global Threats Stability and Humanitarian HomeOUSDP OfficesASD for Homeland Defense Global Security Assistant Secretary of Defense for Homeland

  10. Sandia National Laboratories: National Security Missions: International

    Science.gov Websites

    Weapons Safety & Security Weapons Science & Technology Defense Systems & Assessments About Directed Research & Development Technology Deployment Centers Working With Sandia Working With Sandia Payable Contract Information Construction & Facilities Contract Audit Sandia's Economic Impact

  11. 48 CFR 239.7100 - Scope of subpart.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7100 Scope of subpart. This subpart includes information assurance and...

  12. 48 CFR 239.7100 - Scope of subpart.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7100 Scope of subpart. This subpart includes information assurance and...

  13. 48 CFR 239.7100 - Scope of subpart.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7100 Scope of subpart. This subpart includes information assurance and...

  14. 48 CFR 239.7100 - Scope of subpart.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7100 Scope of subpart. This subpart includes information assurance and...

  15. 48 CFR 239.7100 - Scope of subpart.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7100 Scope of subpart. This subpart includes information assurance and...

  16. 32 CFR 806.5 - Responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... to the Director, Freedom of Information and Security Review (DFOISR), and provides guidance and instructions to MAJCOMs. Responsibilities of other Air Force elements follow. (b) SAF/GCA makes final decisions... Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION AIR FORCE FREEDOM OF...

  17. 32 CFR 2400.9 - Classification requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ....9 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY... unauthorized disclosure as determined by the Director, Office of Science and Technology Policy. Each such...

  18. 32 CFR 2400.23 - Prohibition.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM... 12356 and Directive No. 1, or this regulation: (a) The Office of Science and Technology Policy shall...

  19. 32 CFR 2400.23 - Prohibition.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM... 12356 and Directive No. 1, or this regulation: (a) The Office of Science and Technology Policy shall...

  20. 32 CFR 2400.23 - Prohibition.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM... 12356 and Directive No. 1, or this regulation: (a) The Office of Science and Technology Policy shall...

  1. 32 CFR 2400.23 - Prohibition.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM... 12356 and Directive No. 1, or this regulation: (a) The Office of Science and Technology Policy shall...

  2. 32 CFR 2400.9 - Classification requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ....9 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY... unauthorized disclosure as determined by the Director, Office of Science and Technology Policy. Each such...

  3. 32 CFR 2400.9 - Classification requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ....9 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY... unauthorized disclosure as determined by the Director, Office of Science and Technology Policy. Each such...

  4. 32 CFR 2400.9 - Classification requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ....9 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY... unauthorized disclosure as determined by the Director, Office of Science and Technology Policy. Each such...

  5. 32 CFR 2400.23 - Prohibition.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM... 12356 and Directive No. 1, or this regulation: (a) The Office of Science and Technology Policy shall...

  6. 32 CFR 2400.9 - Classification requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ....9 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY... unauthorized disclosure as determined by the Director, Office of Science and Technology Policy. Each such...

  7. 32 CFR 154.14 - Civilian employment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... intelligence and security agencies with respect to granting security clearances in an expeditious manner under... National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Personnel Security Investigative Requirements § 154.14 Civilian...

  8. Towards a (Preliminary) Theory of Cyberpower

    DTIC Science & Technology

    2008-06-01

    response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and... reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information...In the 2006 Quadrennial Defense Review , a request was made to have the Center for Technology and National Security Policy (CTNSP), National Defense

  9. The study and implementation of the wireless network data security model

    NASA Astrophysics Data System (ADS)

    Lin, Haifeng

    2013-03-01

    In recent years, the rapid development of Internet technology and the advent of information age, people are increasing the strong demand for the information products and the market for information technology. Particularly, the network security requirements have become more sophisticated. This paper analyzes the wireless network in the data security vulnerabilities. And a list of wireless networks in the framework is the serious defects with the related problems. It has proposed the virtual private network technology and wireless network security defense structure; and it also given the wireless networks and related network intrusion detection model for the detection strategies.

  10. 32 CFR 156.5 - National security positions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... of Existing Personnel Security Clearances” dated December 12, 2005 (Copies available on the Internet... 32 National Defense 1 2014-07-01 2014-07-01 false National security positions. 156.5 Section 156.5 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE...

  11. Database Security: What Students Need to Know

    ERIC Educational Resources Information Center

    Murray, Meg Coffin

    2010-01-01

    Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…

  12. Building Multilevel Secure Web Services-Based Components for the Global Information Grid

    DTIC Science & Technology

    2006-05-01

    unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 Transforming: Business , Security ,Warfighting 16 CROSSTALK The Journal of Defense...A Single Step of the BAC Table 1: A Single Step of the Block Access Controller Transforming: Business , Security ,Warfighting 18 CROSSTALK The Journal

  13. Hybrid Network Defense Model Based on Fuzzy Evaluation

    PubMed Central

    2014-01-01

    With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture. PMID:24574870

  14. In Support of the Common Defense: A Homeland Defense and Security Journal. Volume 2

    DTIC Science & Technology

    2013-06-01

    out in our minds, it is worth remembering historic actions taken by the Army in support of civil authorities in cases like the Mississippi River...controlled by the state governor, who in most cases , places them on State Active Duty (SAD) for response. The CSTs are the only unit in the Guard...disseminate this classified information. There are reported cases where the FBI did not accept DHS security clearances; and others where DHS required

  15. Common object request broker architecture (CORBA)-based security services for the virtual radiology environment.

    PubMed

    Martinez, R; Cole, C; Rozenblit, J; Cook, J F; Chacko, A K

    2000-05-01

    The US Army Great Plains Regional Medical Command (GPRMC) has a requirement to conform to Department of Defense (DoD) and Army security policies for the Virtual Radiology Environment (VRE) Project. Within the DoD, security policy is defined as the set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. Security policy in the DoD is described by the Trusted Computer System Evaluation Criteria (TCSEC), Army Regulation (AR) 380-19, Defense Information Infrastructure Common Operating Environment (DII COE), Military Health Services System Automated Information Systems Security Policy Manual, and National Computer Security Center-TG-005, "Trusted Network Interpretation." These documents were used to develop a security policy that defines information protection requirements that are made with respect to those laws, rules, and practices that are required to protect the information stored and processed in the VRE Project. The goal of the security policy is to provide for a C2-level of information protection while also satisfying the functional needs of the GPRMC's user community. This report summarizes the security policy for the VRE and defines the CORBA security services that satisfy the policy. In the VRE, the information to be protected is embedded into three major information components: (1) Patient information consists of Digital Imaging and Communications in Medicine (DICOM)-formatted fields. The patient information resides in the digital imaging network picture archiving and communication system (DIN-PACS) networks in the database archive systems and includes (a) patient demographics; (b) patient images from x-ray, computed tomography (CT), magnetic resonance imaging (MRI), and ultrasound (US); and (c) prior patient images and related patient history. (2) Meta-Manager information to be protected consists of several data objects. This information is distributed to the Meta-Manager nodes and includes (a) radiologist schedules; (b) modality worklists; (c) routed case information; (d) DIN-PACS and Composite Health Care system (CHCS) messages, and Meta-Manager administrative and security information; and (e) patient case information. (3) Access control and communications security is required in the VRE to control who uses the VRE and Meta-Manager facilities and to secure the messages between VRE components. The CORBA Security Service Specification version 1.5 is designed to allow up to TCSEC's B2-level security for distributed objects. The CORBA Security Service Specification defines the functionality of several security features: identification and authentication, authorization and access control, security auditing, communication security, nonrepudiation, and security administration. This report describes the enhanced security features for the VRE and their implementation using commercial CORBA Security Service software products.

  16. 32 CFR 154.31 - Authorized requesters.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... and Security, Washington Headquarters Services. (e) Commanders of Unified and Specified Commands or... National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Requesting Personnel Security Investigations § 154.31 Authorized...

  17. 32 CFR Appendix E to Part 154 - Personnel Security Determination Authorities

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Personnel Security Determination Authorities E Appendix E to Part 154 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. E Appendix E to Part 154—Personnel...

  18. 32 CFR 2400.29 - Accountability and control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ....29 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY... serve as Top Secret Control Officer (TSCO) for the Office of Science and Technology Policy and will be...

  19. 32 CFR 2400.29 - Accountability and control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ....29 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY... serve as Top Secret Control Officer (TSCO) for the Office of Science and Technology Policy and will be...

  20. 32 CFR 2400.29 - Accountability and control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ....29 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY... serve as Top Secret Control Officer (TSCO) for the Office of Science and Technology Policy and will be...

  1. 32 CFR 2400.29 - Accountability and control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ....29 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY... serve as Top Secret Control Officer (TSCO) for the Office of Science and Technology Policy and will be...

  2. 32 CFR 2400.29 - Accountability and control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ....29 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY... serve as Top Secret Control Officer (TSCO) for the Office of Science and Technology Policy and will be...

  3. Transboundary Water: Improving Methodologies and Developing Integrated Tools to Support Water Security

    NASA Technical Reports Server (NTRS)

    Hakimdavar, Raha; Wood, Danielle; Eylander, John; Peters-Lidard, Christa; Smith, Jane; Doorn, Brad; Green, David; Hummel, Corey; Moore, Thomas C.

    2018-01-01

    River basins for which transboundary coordination and governance is a factor are of concern to US national security, yet there is often a lack of sufficient data-driven information available at the needed time horizons to inform transboundary water decision-making for the intelligence, defense, and foreign policy communities. To address this need, a two-day workshop entitled Transboundary Water: Improving Methodologies and Developing Integrated Tools to Support Global Water Security was held in August 2017 in Maryland. The committee that organized and convened the workshop (the Organizing Committee) included representatives from the National Aeronautics and Space Administration (NASA), the US Army Corps of Engineers Engineer Research and Development Center (ERDC), and the US Air Force. The primary goal of the workshop was to advance knowledge on the current US Government and partners' technical information needs and gaps to support national security interests in relation to transboundary water. The workshop also aimed to identify avenues for greater communication and collaboration among the scientific, intelligence, defense, and foreign policy communities. The discussion around transboundary water was considered in the context of the greater global water challenges facing US national security.

  4. 48 CFR 239.7400 - Scope.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... telecommunications services and maintenance of telecommunications security. Telecommunications services meet the... DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Telecommunications...

  5. 48 CFR 239.7400 - Scope.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... telecommunications services and maintenance of telecommunications security. Telecommunications services meet the... DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Telecommunications...

  6. 15 CFR 700.81 - Appeals.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE..., or other relevant information and documents available to the Department of Commerce, or consult with... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Appeals. 700.81 Section 700.81...

  7. 76 FR 59112 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-23

    ... (DoD) strategy for cyberspace, --Presentation on Doctrine of Cybersecurity relating to computer... paper, ``Enabling Distributed Security in Cyberspace'', --Discussion with Cybersecurity Coordinator and... Awareness Month, --Discussion on cybersecurity with Senior Defense and Intelligence Advisor, --Discussion...

  8. Optical identity authentication technique based on compressive ghost imaging with QR code

    NASA Astrophysics Data System (ADS)

    Wenjie, Zhan; Leihong, Zhang; Xi, Zeng; Yi, Kang

    2018-04-01

    With the rapid development of computer technology, information security has attracted more and more attention. It is not only related to the information and property security of individuals and enterprises, but also to the security and social stability of a country. Identity authentication is the first line of defense in information security. In authentication systems, response time and security are the most important factors. An optical authentication technology based on compressive ghost imaging with QR codes is proposed in this paper. The scheme can be authenticated with a small number of samples. Therefore, the response time of the algorithm is short. At the same time, the algorithm can resist certain noise attacks, so it offers good security.

  9. 47 CFR 0.181 - The Defense Commissioner.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... designated by the Commission. The Defense Commissioner directs the homeland security, national security and..., departments, or agencies. (c) To act as the Homeland Security and Defense Coordinator in representations with... emergency, the Defense Commissioner, in consultation with the Chief, Public Safety and Homeland Security...

  10. 47 CFR 0.181 - The Defense Commissioner.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... designated by the Commission. The Defense Commissioner directs the homeland security, national security and..., departments, or agencies. (c) To act as the Homeland Security and Defense Coordinator in representations with... emergency, the Defense Commissioner, in consultation with the Chief, Public Safety and Homeland Security...

  11. 47 CFR 0.181 - The Defense Commissioner.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... designated by the Commission. The Defense Commissioner directs the homeland security, national security and..., departments, or agencies. (c) To act as the Homeland Security and Defense Coordinator in representations with... emergency, the Defense Commissioner, in consultation with the Chief, Public Safety and Homeland Security...

  12. 47 CFR 0.181 - The Defense Commissioner.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... designated by the Commission. The Defense Commissioner directs the homeland security, national security and..., departments, or agencies. (c) To act as the Homeland Security and Defense Coordinator in representations with... emergency, the Defense Commissioner, in consultation with the Chief, Public Safety and Homeland Security...

  13. 47 CFR 0.181 - The Defense Commissioner.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... designated by the Commission. The Defense Commissioner directs the homeland security, national security and..., departments, or agencies. (c) To act as the Homeland Security and Defense Coordinator in representations with... emergency, the Defense Commissioner, in consultation with the Chief, Public Safety and Homeland Security...

  14. 32 CFR 322.1 - Purpose and applicability.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...

  15. 32 CFR 322.1 - Purpose and applicability.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...

  16. 32 CFR 322.1 - Purpose and applicability.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...

  17. 32 CFR 322.1 - Purpose and applicability.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...

  18. 32 CFR 322.1 - Purpose and applicability.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...

  19. Management of the Defense Technology Security Administration Year 2000 Program

    DTIC Science & Technology

    1998-11-03

    caller is fully protected Acronyms DTSA Defense Technology Security Administration Y2K Year 2000 INSPECTOR GENERAL DEPARTMENT OF DEFENSE 400 ARMY NAVY...accordance with the DoD Management Plan Defense Technology Security Administration. The Defense Technology Security Administration ( DTSA ) was established...in 1985 as a field activity of the Office of the Secretary of Defense By establishing DTSA , the DoD role in export controls was centralized and

  20. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

    PubMed Central

    Moisan, Frédéric; Gonzalez, Cleotilde

    2017-01-01

    Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain) and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive) in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies. PMID:28690557

  1. 32 CFR 154.16 - Security clearance.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Security clearance. 154.16 Section 154.16 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE... immigrant alien or a foreign national in furtherance of the mission of the Department of Defense, such...

  2. 32 CFR 154.16 - Security clearance.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Security clearance. 154.16 Section 154.16 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE... immigrant alien or a foreign national in furtherance of the mission of the Department of Defense, such...

  3. 32 CFR 154.16 - Security clearance.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Security clearance. 154.16 Section 154.16 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE... immigrant alien or a foreign national in furtherance of the mission of the Department of Defense, such...

  4. 32 CFR 154.16 - Security clearance.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Security clearance. 154.16 Section 154.16 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE... immigrant alien or a foreign national in furtherance of the mission of the Department of Defense, such...

  5. 32 CFR 154.16 - Security clearance.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Security clearance. 154.16 Section 154.16 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE... immigrant alien or a foreign national in furtherance of the mission of the Department of Defense, such...

  6. 32 CFR 806.28 - Records with special disclosure procedures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ....28 Section 806.28 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION AIR FORCE FREEDOM OF INFORMATION ACT PROGRAM § 806.28 Records with special disclosure procedures..., Industrial Security Program Management. (e) AFI 36-2603, Air Force Board for Correction of Military Records...

  7. 32 CFR 806.28 - Records with special disclosure procedures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ....28 Section 806.28 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION AIR FORCE FREEDOM OF INFORMATION ACT PROGRAM § 806.28 Records with special disclosure procedures..., Industrial Security Program Management. (e) AFI 36-2603, Air Force Board for Correction of Military Records...

  8. 75 FR 114 - 36(b)(1) Arms Sales Notification

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-04

    ... and 09-78] 36(b)(1) Arms Sales Notification AGENCY: Defense Security Cooperation Agency, DoD. ACTION: Notice. SUMMARY: The Department of Defense is publishing the unclassified text of six section 36(b)(1... 1996. FOR FURTHER INFORMATION CONTACT: Ms. B. English, DSCA/DBO/CFM, (703) 601-3740. SUPPLEMENTARY...

  9. 32 CFR 806.28 - Records with special disclosure procedures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ....28 Section 806.28 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION AIR FORCE FREEDOM OF INFORMATION ACT PROGRAM § 806.28 Records with special disclosure procedures..., Industrial Security Program Management. (e) AFI 36-2603, Air Force Board for Correction of Military Records...

  10. 78 FR 12294 - Proposed Information Collection; Comment Request; Defense Priorities and Allocations System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-22

    ... Request; Defense Priorities and Allocations System AGENCY: Bureau of Industry and Security, Commerce...: Direct all written comments to Jennifer Jessup, Departmental Paperwork Clearance Officer, Department of... Priorities and Allocations System regulation (15 CFR part 700) must retain the records for at least 3 years...

  11. 75 FR 12173 - Proposed Information Collection; Comment Request; Defense Priorities and Allocations System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-15

    ... Allocations System regulation (15 CFR part 700) must retain the records for at least 3 years. II. Method of... Request; Defense Priorities and Allocations System AGENCY: Bureau of Industry and Security, Commerce...: Direct all written comments to Diana Hynek, Departmental Paperwork Clearance Officer, Department of...

  12. 32 CFR 223.5 - Responsibilities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... regarding nuclear weapons security and the protection of SNM at DoD nuclear reactor facilities as DoD UCNI... UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION (UCNI) § 223.5 Responsibilities. (a) The Under Secretary of Defense... compliance with the DOE program for controlling DOE UCNI. (b) The Assistant Secretary of Defense for Nuclear...

  13. 32 CFR 223.5 - Responsibilities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... regarding nuclear weapons security and the protection of SNM at DoD nuclear reactor facilities as DoD UCNI... UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION (UCNI) § 223.5 Responsibilities. (a) The Under Secretary of Defense... compliance with the DOE program for controlling DOE UCNI. (b) The Assistant Secretary of Defense for Nuclear...

  14. 32 CFR 2700.12 - Criteria for and level of original classification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... classification are authorized—“Top Secret,” “Secret,” “Confidential.” No other classification designation is... classification. 2700.12 Section 2700.12 National Defense Other Regulations Relating to National Defense OFFICE FOR MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Original Classification § 2700.12...

  15. 32 CFR 2700.12 - Criteria for and level of original classification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... classification are authorized—“Top Secret,” “Secret,” “Confidential.” No other classification designation is... classification. 2700.12 Section 2700.12 National Defense Other Regulations Relating to National Defense OFFICE FOR MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Original Classification § 2700.12...

  16. 32 CFR 2700.12 - Criteria for and level of original classification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... classification are authorized—“Top Secret,” “Secret,” “Confidential.” No other classification designation is... classification. 2700.12 Section 2700.12 National Defense Other Regulations Relating to National Defense OFFICE FOR MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Original Classification § 2700.12...

  17. Assessing the Alignment of Information Security with Strategic Business, and Strategic Information System Planning: A Department of Defense Perspective

    DTIC Science & Technology

    2010-06-01

    Wolfgang. "Appraisal of the effectivness and efficiency of an Information Security Management System based on ISO 27001 ." International Conference on...of corporate information resources (Doherty and 29 Fulford, 2006) ( ISO /IEC 17799, 2005). Both public and private sectors of business have...Science Ltd, 2002. Iacovou, Charalambos L. "The IPACS project: when IT hits the fan." Journal of Information Technology, 1999: 267-275. ISO /IEC 17799

  18. 32 CFR 228.6 - Security inspection.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Security inspection. 228.6 Section 228.6 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS SECURITY PROTECTIVE FORCE § 228.6 Security inspection. Any personal property, including but not...

  19. 32 CFR 154.68 - Safeguarding procedures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Safeguarding procedures. 154.68 Section 154.68 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE... Safeguarding procedures. Personnel security investigative reports and personnel security determination...

  20. 77 FR 26826 - Notice of Open Public Hearing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-07

    ... China's innovation capabilities, with emphasis on the information technology and defense sectors. The... U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION Notice of Open Public Hearing AGENCY: U.S.-China Economic and Security Review Commission. ACTION: Notice of open public hearing--May 10, 2012...

  1. 32 CFR 154.67 - Access restrictions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Access restrictions. 154.67 Section 154.67 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE... restrictions. Access to personnel security investigative reports and personnel security clearance determination...

  2. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills,more » and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.« less

  3. 22 CFR 127.5 - Authority of the Defense Security Service.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... ensure compliance with the Department of Defense National Industrial Security Program Operating Manual... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authority of the Defense Security Service. 127... VIOLATIONS AND PENALTIES § 127.5 Authority of the Defense Security Service. In the case of exports involving...

  4. 32 CFR 147.13 - Guideline K-Security violations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...

  5. 32 CFR 147.13 - Guideline K-Security violations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...

  6. 32 CFR 147.13 - Guideline K-Security violations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...

  7. 32 CFR 147.13 - Guideline K-Security violations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...

  8. 32 CFR 147.13 - Guideline K-Security violations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...

  9. 32 CFR 154.9 - Authorized personnel security investigative agencies.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... agencies. 154.9 Section 154.9 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Policies § 154.9 Authorized personnel... Conduct of Defense Department Counterintelligence Activities in Conjunction with the FBI. Whenever...

  10. 32 CFR 154.9 - Authorized personnel security investigative agencies.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... agencies. 154.9 Section 154.9 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Policies § 154.9 Authorized personnel... Conduct of Defense Department Counterintelligence Activities in Conjunction with the FBI. Whenever...

  11. 32 CFR 154.9 - Authorized personnel security investigative agencies.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... agencies. 154.9 Section 154.9 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Policies § 154.9 Authorized personnel... Conduct of Defense Department Counterintelligence Activities in Conjunction with the FBI. Whenever...

  12. 32 CFR 154.9 - Authorized personnel security investigative agencies.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... agencies. 154.9 Section 154.9 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Policies § 154.9 Authorized personnel... Conduct of Defense Department Counterintelligence Activities in Conjunction with the FBI. Whenever...

  13. 32 CFR 154.9 - Authorized personnel security investigative agencies.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... agencies. 154.9 Section 154.9 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Policies § 154.9 Authorized personnel... Conduct of Defense Department Counterintelligence Activities in Conjunction with the FBI. Whenever...

  14. 32 CFR 154.20 - Authority to waive investigative requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Authority to waive investigative requirements. 154.20 Section 154.20 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Personnel Security Investigative...

  15. 32 CFR 154.20 - Authority to waive investigative requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Authority to waive investigative requirements. 154.20 Section 154.20 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Personnel Security Investigative...

  16. 32 CFR 154.20 - Authority to waive investigative requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Authority to waive investigative requirements. 154.20 Section 154.20 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Personnel Security Investigative...

  17. 32 CFR 154.20 - Authority to waive investigative requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Authority to waive investigative requirements. 154.20 Section 154.20 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Personnel Security Investigative...

  18. 32 CFR 154.20 - Authority to waive investigative requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Authority to waive investigative requirements. 154.20 Section 154.20 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Personnel Security Investigative...

  19. The Impact of the Security Competency on "Self-Efficacy in Information Security" for Effective Health Information Security in Iran.

    PubMed

    Shahri, Ahmad Bakhtiyari; Ismail, Zuraini; Mohanna, Shahram

    2016-11-01

    The security effectiveness based on users' behaviors is becoming a top priority of Health Information System (HIS). In the first step of this study, through the review of previous studies 'Self-efficacy in Information Security' (SEIS) and 'Security Competency' (SCMP) were identified as the important factors to transforming HIS users to the first line of defense in the security. Subsequently, a conceptual model was proposed taking into mentioned factors for HIS security effectiveness. Then, this quantitative study used the structural equation modeling to examine the proposed model based on survey data collected from a sample of 263 HIS users from eight hospitals in Iran. The result shows that SEIS is one of the important factors to cultivate of good end users' behaviors toward HIS security effectiveness. However SCMP appears a feasible alternative to providing SEIS. This study also confirms the mediation effects of SEIS on the relationship between SCMP and HIS security effectiveness. The results of this research paper can be used by HIS and IT managers to implement their information security process more effectively.

  20. An Integrated Approach for Physical and Cyber Security Risk Assessment: The U.S. Army Corps of Engineers Common Risk Model for Dams

    DTIC Science & Technology

    2016-07-01

    Common Risk Model for Dams ( CRM -D) Methodology,” for the Director, Cost Assessment and Program Evaluation, Office of Secretary of Defense and the...for Dams ( CRM -D), developed by the U.S. Army Corps of Engineers (USACE) in collaboration with the Institute for Defense Analyses (IDA) and the U.S...and cyber security risks across a portfolio of dams, and informing decisions on how to mitigate those risks. The CRM -D can effectively quantify the

  1. Under Secretary of Defense for Policy > OUSDP Offices > ASD for Homeland

    Science.gov Websites

    Defense Global Security > Defense Critical Infrastructure Program > Roles Skip to main for Asian and Pacific Security Affairs ASD for Homeland Defense Global Security DASD Defense -Intensity Conflict Counternarcotics and Global Threats Stability and Humanitarian Affairs Special Operations

  2. Geospatial Informational Security Risks and Concerns of the U.S. Air Force GeoBase Program

    DTIC Science & Technology

    2007-03-01

    multiple governmental directives such as the Government Performance and Results Act (GPRA), Paperwork Reduction Act (PRA), and Office of Management and... governments , non- governmental organizations (NGOs), universities, and commercial sector contractors (Lachman, 2006). One command noted that over...Defense, or the United States Government . AFIT/GEM/ENV/07-M1 GEOSPATIAL INFORMATIONAL SECURITY RISKS AND CONCERNS OF THE UNITED STATES

  3. Department of Defense Intelligence Information System (DoDIIS). Instructions 2000

    DTIC Science & Technology

    2000-02-01

    DIA, November 1993, DoDIIS Site Certifier’s Guide, SC-2610-143-93. e) DIA, June 1995, DoDIIS Security Architecture Guidance and Directions ( SAGD ), Draft...Plan S&T Scientific & Technical SAGD Security Architecture Guidance and Directions SBU Sensitive But Unclassified SCI Sensitive Compartmented

  4. Joint Logistics Commanders Guide for the Management of Multinational Program,

    DTIC Science & Technology

    1981-07-01

    purchase of the A-300 Airbus and the 1977 record-breaking export performance of the French and UK aerospace industries of around $5 billion and $2 billion...DIS. They are the Defense Industrial Security Clearance Office ( DISCO ), the Defense Industrial Security Institute (DISI), and the Office of Industrial...Security International (ISI). Defense Industrial Security Clearance Office ( DISCO ) The Defense Industrial Security Program (DISP) establishes pro

  5. 77 FR 27615 - Department of Defense (DoD)-Defense Industrial Base (DIB) Voluntary Cyber Security and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-11

    ...-on, more detailed, digital forensics analysis or damage assessments of individual incidents... information. In addition, during any follow-on forensics or damage assessment activities, the Government and...), (c) and (d) of this section are maintained by the digital and multimedia forensics laboratory at DC3...

  6. Integrating the Full Range of Security Cooperation Programs into Air Force Planning: An Analytic Primer

    DTIC Science & Technology

    2011-01-01

    Exchange Program ( IEP ) Authority 10 U.S.C. §2358, “Research and development projects” Processes and agreements IEP agreements with the...2015.4, “Defense Research, Development, Test and Evaluation (RDT&E) Information Exchange Program ( IEP )”; DoDD 5134.1, “Under Secretary of Defense for

  7. 22 CFR 126.1 - Prohibited exports and sales to certain countries.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... imports of defense articles and defense services, destined for or originating in certain countries. This... security and foreign policy of the United States. Information regarding certain other embargoes appears..., except § 123.17 of this subchapter, do not apply with respect to articles originating in or for export to...

  8. Robust allocation of a defensive budget considering an attacker's private information.

    PubMed

    Nikoofal, Mohammad E; Zhuang, Jun

    2012-05-01

    Attackers' private information is one of the main issues in defensive resource allocation games in homeland security. The outcome of a defense resource allocation decision critically depends on the accuracy of estimations about the attacker's attributes. However, terrorists' goals may be unknown to the defender, necessitating robust decisions by the defender. This article develops a robust-optimization game-theoretical model for identifying optimal defense resource allocation strategies for a rational defender facing a strategic attacker while the attacker's valuation of targets, being the most critical attribute of the attacker, is unknown but belongs to bounded distribution-free intervals. To our best knowledge, no previous research has applied robust optimization in homeland security resource allocation when uncertainty is defined in bounded distribution-free intervals. The key features of our model include (1) modeling uncertainty in attackers' attributes, where uncertainty is characterized by bounded intervals; (2) finding the robust-optimization equilibrium for the defender using concepts dealing with budget of uncertainty and price of robustness; and (3) applying the proposed model to real data. © 2011 Society for Risk Analysis.

  9. Report to the Congressional Defense Committees: Status of the Department of Defense’s Business Transformation Efforts

    DTIC Science & Technology

    2008-03-15

    information insures timely payment of entitlements and foregoes receipt of mutually exclusive payments. This depth of information supplies visibility and...reporting capability, and integration with authoritative data sources such as FPDS- NG, CCR, and contractor companies to improve data quality and reduce...manual entry requirements in Q2 FY09. • Continue to implement in theater, focusing on contingency contracts for private security companies and

  10. 78 FR 53736 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-30

    ...: Title, Associated Form and OMB Number: Defense Industrial Base Cyber Security/Information Assurance (DIB CS/IA) Cyber Incident Reporting; OMB Control Number 0704-0489. Type of Request: Reinstatement without.... The requested information supports the collaborative cyber threat information sharing and incident...

  11. 32 CFR 147.15 - Guideline M-Misuse of Information technology systems.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Guideline M-Misuse of Information technology... CLASSIFIED INFORMATION Adjudication § 147.15 Guideline M—Misuse of Information technology systems. (a) The... technology systems may raise security concerns about an individual's trustworthiness, willingness, and...

  12. No-hardware-signature cybersecurity-crypto-module: a resilient cyber defense agent

    NASA Astrophysics Data System (ADS)

    Zaghloul, A. R. M.; Zaghloul, Y. A.

    2014-06-01

    We present an optical cybersecurity-crypto-module as a resilient cyber defense agent. It has no hardware signature since it is bitstream reconfigurable, where single hardware architecture functions as any selected device of all possible ones of the same number of inputs. For a two-input digital device, a 4-digit bitstream of 0s and 1s determines which device, of a total of 16 devices, the hardware performs as. Accordingly, the hardware itself is not physically reconfigured, but its performance is. Such a defense agent allows the attack to take place, rendering it harmless. On the other hand, if the system is already infected with malware sending out information, the defense agent allows the information to go out, rendering it meaningless. The hardware architecture is immune to side attacks since such an attack would reveal information on the attack itself and not on the hardware. This cyber defense agent can be used to secure a point-to-point, point-to-multipoint, a whole network, and/or a single entity in the cyberspace. Therefore, ensuring trust between cyber resources. It can provide secure communication in an insecure network. We provide the hardware design and explain how it works. Scalability of the design is briefly discussed. (Protected by United States Patents No.: US 8,004,734; US 8,325,404; and other National Patents worldwide.)

  13. Approaches to Enhancing Cyber Resilience: Report of the North Atlantic Treaty Organization (NATO) Workshop IST-153

    DTIC Science & Technology

    2018-04-01

    referred to as “defense in depth” and has been the standard model of information security management for at least a decade. Concepts such as mandatory...instrumentation into the system and monitoring this instrumentation with appropriate reports and alerts (e.g., security information event management tools or...Coalition Battle Management Language (C-BML) (NATO 2012) define information (orders, plans, reports, requests, etc.) that can be readily processed by

  14. GINSU: Guaranteed Internet Stack Utilization

    DTIC Science & Technology

    2005-11-01

    Computer Architecture Data Links, Internet , Protocol Stacks 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY...AFRL-IF-RS-TR-2005-383 Final Technical Report November 2005 GINSU: GUARANTEED INTERNET STACK UTILIZATION Trusted... Information Systems, Inc. Sponsored by Defense Advanced Research Projects Agency DARPA Order No. ARPS APPROVED FOR PUBLIC

  15. 77 FR 73669 - Response to Comments Received for the “The Menlo Report: Ethical Principles Guiding Information...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-11

    ... Technology Research'' (``The Menlo Report'') for the Department of Homeland Security (DHS), Science and Technology, Cyber Security Division (CSD), Protected Repository for the Defense of Infrastructure Against Cyber Threats (PREDICT) Project AGENCY: Science and Technology Directorate, DHS. ACTION: Response...

  16. 76 FR 6637 - Assumption Buster Workshop: Defense-in-Depth Is a Smart Investment for Cyber Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-07

    ... Technology Research and Development (NITRD) Program. ACTION: Call for participation. FOR FURTHER INFORMATION... regulations and restrictions. SUMMARY: The NCO, on behalf of the Special Cyber Operations Research and Engineering (SCORE) Committee, an interagency working group that coordinates cyber security research...

  17. CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 9

    DTIC Science & Technology

    2008-09-01

    including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson...SEP 2008 2. REPORT TYPE 3. DATES COVERED 00-00-2008 to 00-00-2008 4. TITLE AND SUBTITLE CrossTalk: The Journal of Defense Software Engineering...The Journal of Defense Software Engineering September 2008 4 10 15 19 24 26 Securing Legacy C Applications Using Dynamic Data Flow Analysis This

  18. 32 CFR 154.2 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... , Director of Central Intelligence Directive (DCID) 1/14 2 and regulations of the National Security Agency. 1... Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION General Provisions § 154.2 Applicability. (a) This part implements the...

  19. Russian Military Politics and Russia’s 2010 Defense Doctrine

    DTIC Science & Technology

    2011-03-01

    Institute (SSI) publica- tions enjoy full academic freedom, provided they do not disclose classified information, jeopardize operations security , or... attack as well, under certain, not specified, critical circum- stances for national security . This attitude was not un- expected, since the on-going... attacks in the United States—needed revision because of the deterioration of the international security situa- tion since then. Subsequently, in March

  20. Effectiveness of the Department of Defense Information Assurance Accreditation Process

    DTIC Science & Technology

    2013-03-01

    meeting the requirements of ISO 27001, Information Security Management System. ISO 27002 provides “security techniques” or best practices that can be...efforts to the next level and implement a recognized standard such as the International Organization for Standards ( ISO ) 27000 Series of standards...implemented by an organization as part of their certification effort.15 Most likely, the main motivation a company would have for achieving an ISO

  1. 10 CFR 71.11 - Protection of Safeguards Information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... public health and safety or the common defense and security, shall protect Safeguards Information against... 10 Energy 2 2012-01-01 2012-01-01 false Protection of Safeguards Information. 71.11 Section 71.11... General Provisions § 71.11 Protection of Safeguards Information. Each licensee, certificate holder, or...

  2. 10 CFR 71.11 - Protection of Safeguards Information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... public health and safety or the common defense and security, shall protect Safeguards Information against... 10 Energy 2 2011-01-01 2011-01-01 false Protection of Safeguards Information. 71.11 Section 71.11... General Provisions § 71.11 Protection of Safeguards Information. Each licensee, certificate holder, or...

  3. 10 CFR 71.11 - Protection of Safeguards Information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... public health and safety or the common defense and security, shall protect Safeguards Information against... 10 Energy 2 2010-01-01 2010-01-01 false Protection of Safeguards Information. 71.11 Section 71.11... General Provisions § 71.11 Protection of Safeguards Information. Each licensee, certificate holder, or...

  4. 10 CFR 71.11 - Protection of Safeguards Information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... public health and safety or the common defense and security, shall protect Safeguards Information against... 10 Energy 2 2013-01-01 2013-01-01 false Protection of Safeguards Information. 71.11 Section 71.11... General Provisions § 71.11 Protection of Safeguards Information. Each licensee, certificate holder, or...

  5. 48 CFR 202.101 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Agency, the Defense Logistics Agency, the Defense Security Cooperation Agency, the Defense Security... the Secretary of Defense, the Under Secretary of Defense (Acquisition, Technology, and Logistics), and... agencies)—Under Secretary of Defense (Acquisition, Technology, and Logistics); Department of the Army...

  6. 32 CFR 322.3 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...

  7. 32 CFR 322.3 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...

  8. 32 CFR 322.3 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...

  9. 32 CFR 322.3 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...

  10. 32 CFR 322.3 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...

  11. Assessment of the Office of Security Cooperation-Iraq Mission Capabilities

    DTIC Science & Technology

    2013-09-18

    and report and other activities conducted by the Office of Special Plans & Operations to spo@dodig.mil Defense Hotline, The Pentagon ... Defense for Policy, U.S. Cenh·al Command, Joint Staff, and Defense Security Cooperation Agency responses when preparing the final repmt. Please...of Department of Defense support for executing security cooperation programs in Iraq and whether the Office of Security

  12. 48 CFR 239.7103 - Contract clauses.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7103 Contract clauses. (a) Use the clause at 252.239-7000, Protection...

  13. 48 CFR 239.7103 - Contract clauses.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7103 Contract clauses. (a) Use the clause at 252.239-7000, Protection...

  14. 48 CFR 239.7103 - Contract clauses.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7103 Contract clauses. (a) Use the clause at 252.239-7000, Protection...

  15. 48 CFR 239.7103 - Contract clauses.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7103 Contract clauses. (a) Use the clause at 252.239-7000, Protection...

  16. 48 CFR 239.7103 - Contract clauses.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7103 Contract clauses. (a) Use the clause at 252.239-7000, Protection...

  17. 32 CFR 245.3 - Responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PLAN FOR THE EMERGENCY SECURITY CONTROL OF AIR TRAFFIC (ESCAT) General § 245.3 Responsibilities. The Assistant Secretary of Defense for Networks and Information Integration will ensure the responsibilities of...

  18. 32 CFR 245.3 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PLAN FOR THE EMERGENCY SECURITY CONTROL OF AIR TRAFFIC (ESCAT) General § 245.3 Responsibilities. The Assistant Secretary of Defense for Networks and Information Integration will ensure the responsibilities of...

  19. 32 CFR 245.3 - Responsibilities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... PLAN FOR THE EMERGENCY SECURITY CONTROL OF AIR TRAFFIC (ESCAT) General § 245.3 Responsibilities. The Assistant Secretary of Defense for Networks and Information Integration will ensure the responsibilities of...

  20. 32 CFR 245.3 - Responsibilities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... PLAN FOR THE EMERGENCY SECURITY CONTROL OF AIR TRAFFIC (ESCAT) General § 245.3 Responsibilities. The Assistant Secretary of Defense for Networks and Information Integration will ensure the responsibilities of...

  1. 22 CFR 125.3 - Exports of classified technical data and classified defense articles.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... in the Department of Defense National Industrial Security Program Operating Manual (unless such.... It should also list the facility security clearance code of all U.S. parties on the license and include the Defense Security Service cognizant security office of the party responsible for packaging the...

  2. 32 CFR Appendix C to Part 86 - State Information

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false State Information C Appendix C to Part 86... 86—State Information All SCHR checks should be accompanied by the following: 1. State form, if... information, such as: Name, date of birth, social security number, complete addresses, etc. 2. Fingerprint set...

  3. 32 CFR Appendix C to Part 86 - State Information

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false State Information C Appendix C to Part 86... 86—State Information All SCHR checks should be accompanied by the following: 1. State form, if... information, such as: Name, date of birth, social security number, complete addresses, etc. 2. Fingerprint set...

  4. 77 FR 43506 - DoD Unclassified Controlled Nuclear Information (UCNI)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-25

    ... Systems. (i) Information on the layout or design of security and alarm systems at a specific DoD SNM or... information is not observable from a public area. (iii) Performance characteristics of installed systems. (5... 0790-AI64 DoD Unclassified Controlled Nuclear Information (UCNI) AGENCY: Department of Defense. ACTION...

  5. The Diffusion of Military Technologies to Foreign Nations: Arms Transfers Can Preserve the Defense Technological and Industrial Base

    DTIC Science & Technology

    1995-06-01

    required, the Defense Technology Security Administration ( DTSA ) will make a determination on whether or not advanced technologies are being risked by the...sale or transfer of that product. DTSA has this role whether it is a commercial or government-to-government transfer. The Joint Chiefs of Staff also...Office of Defense Relations Security Assistance DSAA Defense Security Assistance Agency DTIB Defense Technological and Industrial Base DTSA Defense

  6. 6 CFR 9.41 - Secretary of Defense.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Secretary of Defense. 9.41 Section 9.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY RESTRICTIONS UPON LOBBYING Exemptions § 9.41 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered...

  7. 6 CFR 9.41 - Secretary of Defense.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Secretary of Defense. 9.41 Section 9.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY RESTRICTIONS UPON LOBBYING Exemptions § 9.41 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered...

  8. 6 CFR 9.41 - Secretary of Defense.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Secretary of Defense. 9.41 Section 9.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY RESTRICTIONS UPON LOBBYING Exemptions § 9.41 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered...

  9. 6 CFR 9.41 - Secretary of Defense.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Secretary of Defense. 9.41 Section 9.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY RESTRICTIONS UPON LOBBYING Exemptions § 9.41 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered...

  10. 6 CFR 9.41 - Secretary of Defense.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Secretary of Defense. 9.41 Section 9.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY RESTRICTIONS UPON LOBBYING Exemptions § 9.41 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered...

  11. 32 CFR 268.4 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Congress, Treasury Department, and NAC. (b) The Defense Security Assistance Agency (DSAA) is responsible... responding to NAC information requests. (c) Unless otherwise directed, the DoD Component which makes the sale...

  12. A cognitive and economic decision theory for examining cyber defense strategies.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bier, Asmeret Brooke

    Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participantsmore » interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.« less

  13. Information Management for an Automated Battlefield Command and Control System

    DTIC Science & Technology

    1980-05-01

    DD) I u FJ i EDITION OF" I NOV 65, IS OSSOLIETIES"-- iUnclassified1SECURITY CLASSIFICATION OF THIS PAGE (When Data Entered) t// II. Unclassified...DIRELIOk oý INSTIhJTIONAL RSCH I USA AIP DEFENSE SCHOUL ATTN: AISA -CU)-MS I iJSAADS-LIBRARY-OUCUMLNTS) I USA AIW DEFENSE ZL~N HDAU IN: fILLS

  14. Army Requirement to Acquire Individual Carbine Not Justified

    DTIC Science & Technology

    2013-09-16

    ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for...AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY...of the Department of Defense that: supports the warfighter; promotes accountability, integrity , and efficiency; advises the Secretary of Defense and

  15. U.S. Chemical Defense and the Third-World Threat

    DTIC Science & Technology

    1990-01-04

    Is the Chemical and Engineering Nw. 14 April 1986. 43 Report of the Chemical Warfare Review Comnission. 6-7. Unless otherwise stated the information...Best Available Copy (𔃾U.S.. Chemical Defense and the Third-World Threat N I A Monograph by Major Quentin W. Schillare Armor AUG2 1󈨞 4,A., - School...Security Clauipfca tiori) U.S. Chemical Defense and the Third-World Threat (") 12. PERSONAL AUTHOR(S) Major Quentin W. Schillare, USA 13a. TYPE OF REPORT

  16. Feasibility Study for a Computerized Serials Control System in the Defense Communications Agency Technical and Management Information Center.

    DTIC Science & Technology

    1984-06-20

    AD-A162 ±88 FEASIBILITY STUDY FOR A COMPUTERIZED SERIALS CONTROL 1/1 SYSTEM IN THE DEFENS (U) DEFENSE COMMUNICATIONS AGENCY WASHINGTON DC TECHNICAL...NATIONAL BUREAU OF STANDARDS- 1963-A 0FEASIBILITY STUDY FOR A COMPUTERIZED SERIALS CONTROL SYSTEM IN THE DEFENSE COMMUNICATIONS 0AGENCY TECHNICAL AND...ABSTRACT 21. ABSTRACT SECURITY CLASSIFICATION UNCLASSIFIED/UNLIMITED R1 SAME AS RPT. 0 DTIC USERS 0 UNCLASSIFIED 22&. NAME OF RESPONSIBLE INDIVIDUAL 22b

  17. 32 CFR 2400.2 - Purpose.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM General... § 2400.1 that information of the Office of Science and Technology Policy (OSTP) relating to national...

  18. 32 CFR 2400.2 - Purpose.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM General... § 2400.1 that information of the Office of Science and Technology Policy (OSTP) relating to national...

  19. 32 CFR 2400.2 - Purpose.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM General... § 2400.1 that information of the Office of Science and Technology Policy (OSTP) relating to national...

  20. 32 CFR 2400.2 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM General... § 2400.1 that information of the Office of Science and Technology Policy (OSTP) relating to national...

  1. 32 CFR 2400.2 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM General... § 2400.1 that information of the Office of Science and Technology Policy (OSTP) relating to national...

  2. 32 CFR 155.6 - Procedures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Procedures. 155.6 Section 155.6 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY... Secretary of Defense or the head of another Department or Agency determines that the hearing procedures and...

  3. 32 CFR 155.1 - Purpose.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Purpose. 155.1 Section 155.1 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY CLEARANCE PROGRAM § 155.1 Purpose. This part updates policy, responsibilities, and procedures of the Defense...

  4. 32 CFR 155.1 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Purpose. 155.1 Section 155.1 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY CLEARANCE PROGRAM § 155.1 Purpose. This part updates policy, responsibilities, and procedures of the Defense...

  5. 32 CFR 155.1 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Purpose. 155.1 Section 155.1 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY CLEARANCE PROGRAM § 155.1 Purpose. This part updates policy, responsibilities, and procedures of the Defense...

  6. 32 CFR 155.1 - Purpose.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Purpose. 155.1 Section 155.1 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY CLEARANCE PROGRAM § 155.1 Purpose. This part updates policy, responsibilities, and procedures of the Defense...

  7. 32 CFR 155.6 - Procedures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Procedures. 155.6 Section 155.6 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY... Secretary of Defense or the head of another Department or Agency determines that the hearing procedures and...

  8. 32 CFR 155.6 - Procedures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Procedures. 155.6 Section 155.6 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY... Secretary of Defense or the head of another Department or Agency determines that the hearing procedures and...

  9. Critical Infrastructure Protection and Federal Statutory Authority for the Departments of Homeland Security and Defense to Perform Two Key Tasks

    DTIC Science & Technology

    2017-04-13

    Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law , no person shall be...policy, and law . The research question is whether the Departments of Homeland Security (DHS) and Defense (DOD) have federal statutory authority to... law ); Department of Homeland Security; Department of Defense; establish standards; physical protection and security; national security 16. SECURITY

  10. 76 FR 63668 - Omaha Public Power District; Fort Calhoun Station, Unit 1; Exemption

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-13

    ... health and safety, and are consistent with the common defense and security; and (2) special circumstances.... Consistent With Common Defense and Security The proposed exemption would allow FCS to reschedule its biennial... schedule has no relation to security issues. Therefore, the common defense and security is not impacted by...

  11. 78 FR 53736 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-30

    ...: Title, Associated Form and OMB Number: Defense Industrial Base Cyber Security/Information Assurance (DIB... program administration and management purposes. Affected Public: Business or other for-Profit; Not-for...

  12. Mission Assurance Modeling and Simulation: A Cyber Security Roadmap

    NASA Technical Reports Server (NTRS)

    Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna

    2012-01-01

    This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.

  13. 76 FR 81517 - Submission for Review and Comment: “The Menlo Report: Ethical Principles Guiding Information and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-28

    ...'' (``Menlo Report'') for the Department of Homeland Security (DHS), Science and Technology, Cyber Security Division (CSD), Protected Repository for the Defense of Infrastructure Against Cyber Threats (PREDICT... be found at: http://www.cyber.st.dhs.gov/wp-content/uploads/2011/12/MenloPrinciplesCORE-20110915-r560...

  14. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-10

    ... subsection (a) to add records containing the results from TSA's intelligence-driven risk- based analysis of... information. 49 CFR Sec. 1560. \\1\\ 77 FR 69491 (Nov. 19, 2012). Under sec. 4012(a)(1)-(2) of the Intelligence... the Central Intelligence Agency, the Secretary of the Treasury, and the Secretary of Defense. The...

  15. SDIO (Strategic Defense Initiative Office) Technical Information Management Center Bibliography of Unclassified Reports: January - December 1986.

    DTIC Science & Technology

    1986-12-01

    Classification. U Security Marks, Accession *:U00298 AD *. ADA096538 TITLE: Assessment of the Crossed Porro Prism Resonator AUTHOR. Seea, B.A.; Fueloep, K...Laser Range Finder Mechanical Property Stability Resonator Porro Prism Standord Mirror Examine Pgs: 16 Classification: U Security Marks: Accession...Gamma-Ray Laser Graser Mossbauer Effect Borrman Superradiance Nuclear-Magnetic Resonance Pgs: 26 Classification: U Security Marks: Accession *:U00484 AD

  16. Ballistic Missile Defense: National Security and the High Frontier of Space.

    ERIC Educational Resources Information Center

    Adragna, Steven P.

    1985-01-01

    Ballistic missile defense is discussed, and the rationale behind the proposal to place defensive weapons in space is examined. Strategic defense is a national security, political, and moral imperative. (RM)

  17. Memory attacks on device-independent quantum cryptography.

    PubMed

    Barrett, Jonathan; Colbeck, Roger; Kent, Adrian

    2013-01-04

    Device-independent quantum cryptographic schemes aim to guarantee security to users based only on the output statistics of any components used, and without the need to verify their internal functionality. Since this would protect users against untrustworthy or incompetent manufacturers, sabotage, or device degradation, this idea has excited much interest, and many device-independent schemes have been proposed. Here we identify a critical weakness of device-independent protocols that rely on public communication between secure laboratories. Untrusted devices may record their inputs and outputs and reveal information about them via publicly discussed outputs during later runs. Reusing devices thus compromises the security of a protocol and risks leaking secret data. Possible defenses include securely destroying or isolating used devices. However, these are costly and often impractical. We propose other more practical partial defenses as well as a new protocol structure for device-independent quantum key distribution that aims to achieve composable security in the case of two parties using a small number of devices to repeatedly share keys with each other (and no other party).

  18. 32 CFR 154.55 - Requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Requirements. 154.55 Section 154.55 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Unfavorable Administrative Actions § 154.55 Requirements. (a) General. For...

  19. 32 CFR 154.55 - Requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Requirements. 154.55 Section 154.55 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Unfavorable Administrative Actions § 154.55 Requirements. (a) General. For...

  20. 32 CFR Appendix G to Part 154 - [Reserved

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false [Reserved] G Appendix G to Part 154 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Appendix G to Part 154 [Reserved] ...

  1. 32 CFR Appendix G to Part 154 - [Reserved

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false [Reserved] G Appendix G to Part 154 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Appendix G to Part 154 [Reserved] ...

  2. 32 CFR Appendix G to Part 154 - [Reserved

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false [Reserved] G Appendix G to Part 154 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Appendix G to Part 154 [Reserved] ...

  3. 32 CFR Appendix G to Part 154 - [Reserved

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false [Reserved] G Appendix G to Part 154 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Appendix G to Part 154 [Reserved] ...

  4. 32 CFR Appendix G to Part 154 - [Reserved

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false [Reserved] G Appendix G to Part 154 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Appendix G to Part 154 [Reserved] ...

  5. 32 CFR 2001.43 - Storage.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Storage. 2001.43 Section 2001.43 National... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.43 Storage... detect unauthorized access to the information. Storage at overseas locations shall be at U.S. Government...

  6. 32 CFR 2001.43 - Storage.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Storage. 2001.43 Section 2001.43 National... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.43 Storage... detect unauthorized access to the information. Storage at overseas locations shall be at U.S. Government...

  7. 32 CFR 2001.43 - Storage.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Storage. 2001.43 Section 2001.43 National... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.43 Storage... detect unauthorized access to the information. Storage at overseas locations shall be at U.S. Government...

  8. 32 CFR 2001.43 - Storage.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Storage. 2001.43 Section 2001.43 National... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.43 Storage... detect unauthorized access to the information. Storage at overseas locations shall be at U.S. Government...

  9. 32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to Part...

  10. 32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to Part...

  11. 32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to Part...

  12. 32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to Part...

  13. 32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to Part...

  14. 32 CFR 154.61 - Security education.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  15. 32 CFR 154.61 - Security education.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  16. 32 CFR 154.61 - Security education.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  17. 32 CFR 154.61 - Security education.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  18. 32 CFR 154.61 - Security education.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  19. DefenseLink Feature: Travels with Gates

    Science.gov Websites

    . Gates and U.S. Secretary of State Condoleezza Rice (right) discuss issues at the Kremlin in Moscow Freedom of Information Privacy & Security External Link Disclaimer Web Policy Contact Us

  20. 76 FR 53700 - Records Schedules; Availability and Request for Comments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-29

    ... business intelligence and finance and accounting information to Department of Defense (DOD) decision makers... to process printing orders and bill customers. 15. Department of State, Bureau of Diplomatic Security...

  1. Serbia and the NATO Partnership for Peace Program

    DTIC Science & Technology

    2008-03-01

    Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management ...For the first time, principles for democratic control of the military were established and clearly stated in the constitutional text and the tasks...book announced all principles driving the decision making process in Serbia related to national security and defense. The defense budget procedures

  2. 32 CFR 245.1 - Purpose.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... (DOT/FAA), Department of Homeland Security/Transportation Security Administration (DHS/TSA), and Department of Defense (DoD) authorities for the security control of civil and military air traffic. It... 32 National Defense 2 2014-07-01 2014-07-01 false Purpose. 245.1 Section 245.1 National Defense...

  3. 32 CFR 245.1 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... (DOT/FAA), Department of Homeland Security/Transportation Security Administration (DHS/TSA), and Department of Defense (DoD) authorities for the security control of civil and military air traffic. It... 32 National Defense 2 2011-07-01 2011-07-01 false Purpose. 245.1 Section 245.1 National Defense...

  4. 32 CFR 245.1 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (DOT/FAA), Department of Homeland Security/Transportation Security Administration (DHS/TSA), and Department of Defense (DoD) authorities for the security control of civil and military air traffic. It... 32 National Defense 2 2010-07-01 2010-07-01 false Purpose. 245.1 Section 245.1 National Defense...

  5. 32 CFR 245.1 - Purpose.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... (DOT/FAA), Department of Homeland Security/Transportation Security Administration (DHS/TSA), and Department of Defense (DoD) authorities for the security control of civil and military air traffic. It... 32 National Defense 2 2013-07-01 2013-07-01 false Purpose. 245.1 Section 245.1 National Defense...

  6. 32 CFR 245.1 - Purpose.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... (DOT/FAA), Department of Homeland Security/Transportation Security Administration (DHS/TSA), and Department of Defense (DoD) authorities for the security control of civil and military air traffic. It... 32 National Defense 2 2012-07-01 2012-07-01 false Purpose. 245.1 Section 245.1 National Defense...

  7. 32 CFR 322.6 - Establishing exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.6 Establishing... the National Security Agency shall be prohibited to the extent authorized by Pub. L. No. 86-36 (1959...

  8. 32 CFR 322.6 - Establishing exemptions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.6 Establishing... the National Security Agency shall be prohibited to the extent authorized by Pub. L. No. 86-36 (1959...

  9. 32 CFR 322.6 - Establishing exemptions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.6 Establishing... the National Security Agency shall be prohibited to the extent authorized by Pub. L. No. 86-36 (1959...

  10. 32 CFR 322.6 - Establishing exemptions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.6 Establishing... the National Security Agency shall be prohibited to the extent authorized by Pub. L. No. 86-36 (1959...

  11. 32 CFR 322.6 - Establishing exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.6 Establishing... the National Security Agency shall be prohibited to the extent authorized by Pub. L. No. 86-36 (1959...

  12. 32 CFR 154.60 - Evaluating continued security eligibility.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ....60 Section 154.60 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY... assess the future trustworthiness of an individual in terms of the likelihood of the individual... that any human being will remain trustworthy. Accordingly the issuance of a personnel security...

  13. 32 CFR 154.60 - Evaluating continued security eligibility.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ....60 Section 154.60 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY... assess the future trustworthiness of an individual in terms of the likelihood of the individual... that any human being will remain trustworthy. Accordingly the issuance of a personnel security...

  14. 32 CFR 154.60 - Evaluating continued security eligibility.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ....60 Section 154.60 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY... assess the future trustworthiness of an individual in terms of the likelihood of the individual... that any human being will remain trustworthy. Accordingly the issuance of a personnel security...

  15. 32 CFR 159.3 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... policies related to personnel allowed to carry weapons for self defense. 2 Available at http://www.dtic.mil... 32 National Defense 1 2011-07-01 2011-07-01 false Definitions. 159.3 Section 159.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY PRIVATE SECURITY CONTRACTORS...

  16. 32 CFR 159.3 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... policies related to personnel allowed to carry weapons for self defense. 2 Available at http://www.dtic.mil... 32 National Defense 1 2010-07-01 2010-07-01 false Definitions. 159.3 Section 159.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY PRIVATE SECURITY CONTRACTORS...

  17. 32 CFR 154.66 - Responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Responsibilities. 154.66 Section 154.66 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL... personnel authorized access to personnel security reports and records shall ensure that the use of such...

  18. 32 CFR 154.66 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Responsibilities. 154.66 Section 154.66 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL... personnel authorized access to personnel security reports and records shall ensure that the use of such...

  19. 32 CFR 154.66 - Responsibilities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Responsibilities. 154.66 Section 154.66 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL... personnel authorized access to personnel security reports and records shall ensure that the use of such...

  20. 32 CFR 154.66 - Responsibilities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Responsibilities. 154.66 Section 154.66 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL... personnel authorized access to personnel security reports and records shall ensure that the use of such...

Top