COMPUTER SECURITY TRAINING

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP89B01354R000200310017-8
Release Decision: 
RIPPUB
Original Classification: 
K
Document Page Count: 
14
Document Creation Date: 
December 27, 2016
Document Release Date: 
January 30, 2013
Sequence Number: 
17
Case Number: 
Content Type: 
MISC
File: 
AttachmentSize
PDF icon CIA-RDP89B01354R000200310017-8.pdf595.56 KB
Body: 
Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310017-8 COMPUTER SECURITY TRAINING STAT STAT 1. NSA - MP-181, Introduction to Computer Security. Presently, it is taught twice a week, two hour sessions, for 9 weeks. The course is being condensed into a one-week course.. See attachment for course outline. Contact is 342/688-6015. 2. CIA - None, but willing to participate in setting up one. Their people are sent to IBM for train- ing. -hat the course take place w ith IC staffing. 3. DIA - None, but use cassettes for in-house training, particularly for DIAOLS. Other training: they attend the DODCI Course. 4. DODCI - Offers a 3-day (Tues., Wed., & Thurs.) at Anacostia--Computer Systems Security Course (CS). See attachment for course outline. Contact is Mr. Losonsky, 433-2803. 5. Army - None, attend DODCI Course. There is a course given at Ft. Lee but it i:s strictly for DARCOM. See attachment. 6. USSS - None 7. FBI - None 8. Nav - None, Attend DODCI Course 9. Air Force - None, Attend DODCI Course 10. ERDA - None 11. State - None 12. CSC - Computer Security Courses deal with Privacy and Freedom of Information Acts. 13. WMCCS - Nine-day workshops in Mississippi have been discontinued. The course has been taken over by DODCI. Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310017-8 Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310017-8 . ~ ~ NSA COURSE MP-181, Introduction to Computer Security Presently, it is taught twice a week, two hour sessions, for nine weeks. The course is being condensed into a one week course. Plan of Instruction I. Introduction (History of Computer Security and Background Information--GAO and OMB documents, risk analysis) II. Pertinent DOD., IC and NSA .Documents DCID 1/16 DOD 5200.28 DOD 5200.28-M NSA/CS3 10-27 NACSEM 7002 Public Law 93-579 (Privacy Act) CISR 6/3 (Annex E) USSID 701 Industrial Security Manual III. Areas of Computer Security Other than Hardware/ Software Security COMSEC EMSEC Physical Security Personnel Security Administrative and Operational Controls NSA/CSS Computer Security Standards IV. ADP Accreditation Guidelines ADP Security Design Goals and Standards V. Tempest Threat VI. Tempest Tour VII. Definitions, Design Principles Definitions (PP1-2, 98-101 Hoffman) Security Design Principles VIII. Authentication .Lecture 1 Lecture 2 ,4~~/ ~3 Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310017-8 Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310017-8 IX. Authorization Lecture 1 Lecture 2 X. Class Problem Presentation of Simple ADP Security Problems and Its Solution Presentation of Class ADP Security Problem #1 (Let them partially solve in cl-ass) XI. Crypto Principles XII. Crypto Applications XIII. Systems Programs XIV. Machine Architecture XV. Security Kernels [Software Analysis Tools Micro-processors Security] XVI. Review Problems XVII. Review .and Micro-processor demonstration XVIII. Final Examination Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310017-8 Declassified in Part -Sanitized Copy Approved for Release 2013/01/30 :CIA-RDP89B01354R000200310017-8 _ ~/ ~ DODCI SPECIAL/ON-SITE ADP COURSES Special ADP courses are conducted by the Department of Defense Computer Institute (DODCI) upon written request. Special courses are designed as far as possible to meet the needs of the requesting organi- zation and will be held at DODCI or sckieduled on-site. However, if the requesting organization is located in the Washington, D.C. area, the course will be conducted at DODCI where adequate classrooms, support equipment and acomputer-based time shared system are readily avail- able. For special courses the following general guidance is provided to the requesting organizations: Subject Matter Computer fundamentals., computer system development orientation, command and control, information systems analysis and design, ADP resource acquisition, teleprocessing technology, ADP security and computer privacy. Enrollment should consist of a minimum of 35 and not exceed 45 students. Since DODCI courses are structured at the mid-management level, participation by military (O-1/W-1/E-6 and above) and civil service personnel, GS-9 and above is recommended. To maximize course effectiveness, ,full-time attendance by students is a prerequisite. Seven or eight hours of instruction per day will provide for a course length of 3 to 10 days. Based on DODCI experience, a minimum length of 5 days per course is recommended for an effective effort in oreinta- tion courses. Additional Special Offering: SE Com uter S stem Securit for Senior Exe~~~~~,~,_This seminar i.s a one 1 ay program on computer system security design to cover the current state-of-the-art in this prominent subject in the world of computing. The seminar will provide senior manage- ment personnel with an appreciation for the responsibil- ities and procedures for the development, management and operation of secure resource-sharing computer systems. Conducted in-house or on-site. II-1 ~~e~ Declassified in Part -Sanitized Copy Approved for Release 2013/01/30 :CIA-RDP89B01354R000200310017-8 r~ Declassified in Part -Sanitized Copy Approved for Release 2013/01/30 :CIA-RDP89B01354R000200310017-8 (~ Charles for DODCI Special/On-Site Courses: DOD Agencies: No charge is assessed for special courses conducted at the Lnstitute. However, for unprogrammed courses conducted outside the Washington, D. C. area, the requesting command will normally be responsible for fund- ing TDY travel and per diem costs for DODCI instructors assigned.. All instructional material, student notebooks and publications will be provided by DODCL. Whenever Federal (non-DOD) employees attend a DOD Agency spon- sored course they will be assessed a fee to cover the cost of books and materials. A completed CSC Optional Form 170 will be submitted at enrollment time and subsequently used for billing purposes. Federal (non-DOD) Agencies: A fee will be assessed to cover the additional expenses incurred on acost-reimbursable basis. In addit-ion, -for on-site courses, the requesting agency will be responsible for reimbursement of total course costs which include instructor salaries, travel and per diem costs plus course material expenses. Exact charges for a specific course -can be ascertained by phoning the DODCI Scheduling Office at commercial (202) 433-2020. To arrange for a special course or a.course on-site, a request from the Commanding Officer or the Executive Officer of the request- ing agency sli.ould be addressed~to the Director, DODCi. The letter should cite the objectives to be derived from the course, proposed dates, and the name of a liaison officer within the organization who can be contacted by DODCI far any additional information that may be required. ADP MANAGERIAL ADVISORY SERVICES Advisory Services may be arranged at DODCI on written request. These services are necessarily limited by the personnel and facility resouces of the Institute, but frequently, it may be possible to refer activities/organizations needing speciai.ized assistance to competent specialists in other government organizations who can provide the desired advisory .service on any specified depth. iT_1 Declassified in Part -Sanitized Copy Approved for Release 2013/01/30 :CIA-RDP89B01354R000200310017-8 Declassified in Part -Sanitized Copy Approved for Release 2013/01/30 :CIA-RDP89B01354R000200310017-8 COMPUTER SYSTEiy1 SECURITY 16 - 19 May 1978 (CS-4-78) 13 - 16 ,Tun 19 7 8 (CS-5-78) 18 - 21 Jul 1978 (CS-6-78) 15-18 Aug 1978 (GS-7-78) i7 - 20 Apr 1979 (CS-7-79) I - 4 May 197 9 (CS-8-79) 12-15 Jun 1979 (CS-9-79) 17 - 20 Jul 1979 (CS-10-?9) 14 - 17 Aug 1979 (CS-11-79) I8 - 21 Sep 1979 (CS-I2-79) Declassified in Part -Sanitized Copy Approved for Release 2013/01/30 :CIA-RDP89B01354R000200310017-8 Declassified in Part -Sanitized Copy Approved for Release 2013/01/30 :CIA-RDP89B01354R000200310017-8 ? ~ ~ ~ FY78/79 DEPARTMENT OF DEFENSE COMPUTER INSTITUTE COMPUTER SYSTEM SECURITY COURSE ___._._~ _Course Introduction. Describes the mission of DODCI and the courses offered. Provides an orientation to DODCI and the surrounding environ- ment. Presents the course objectives and gives the student an overview of the course, and of the realm of computer security concerns that exist today. (1 /2 -hour) Analysis of the Computer Security Problem. Presents an overview of specific security problems facing users and managers of ADP systems. Provides a reference for the solutions presented in the- balance of the course. (2 hours) Computer Security Guidance. Reviews the origin, content, and applica- bility of DOD directives, regulations, and policies as -they pertain to the issue of computer security. Reviews service regulations 4nd directives. Also provides an overview of the Privacy Act, Public Law 93-579, and its implementation. (1 hour) Security Program Development. Describes the requirements for the successful initiation of an ADP security program. Also introduces considerations, regarding the value of information and resources, and the requirements for planning, justification, and trade-off analysis. (2-1/2 hours) Security Program Development Seminar. Provides an opportunity to discuss some of the major problems involved in the development of a successful security program. Case examples are utilized to illustrate recommended techniques for dealing with potential problem areas. (1 hour) Data Base Integrity. Examines some of the major problems involved in the preservation of data integrity .in ADP systems. A variety of techni- cal and administrative integrity safeguards are also discussed. (1 hour) Computer Resource Protection. Examines the threats against a com- puter system and evaluates several alternative countermeasures. The essential elements of a computer system safeguards program are examined in detail. (2-1/2 hours) Software Integrity. Examines recommended procedures for the develop- ment, test, and certification of software for secure applications. (1 hour) XVI-1 Declassified in Part -Sanitized Copy Approved for Release 2013/01/30 :CIA-RDP89B01354R000200310017-8 Declassified in Part -Sanitized Copy Approved for Release 2013/01/30 :CIA-RDP89B01354R000200310017-8 ~ ~ Computer System Security (contd..) Physical Security and Media Protection. Defines the key elements in a physical security plan. Techniques for th.e evaluation of physical secur- ity hazards are examined in detail. A variety of physical security safe- guards which may be utilized to reduce the vulnerability of computer systems are also discussed. (1-1/2 hours) Data Base Management Systems.. Explores the protective features of contemporary data base management systems. (1 hour) Personnel Security. Discusses some of the typical security problems associated with personnet in an ADP environment and suggests methods of preventing or minimizing the effects of such problems. (1 hour) The Role of the Auditor. Defines the emerg-ing role of the auditor and his impact upon auditability and the detection of computer abuse. Also provides insight on how the auditor should interface in a computer secur- ity program.. (1-1/2 hours) _ Security Auditing. Defines the various methods of identifying normal and abnormal system activity. Also furnishes guidance regarding the appropriate mix of manual and automated logs required for the security surveillance of an ADP system. (1 hour) Teleprocessing Network Security. Examines several active and passive threats to teleprocessing systems. Discusses some of the major secur- ity considerations involved in intercomputer networks and analyzes a number of countermeasures that may be applied to specific threats. (1-1/2 hours) Contingency Planning. Provides guidance on the development of a contingency plan, and evaluates some of the advantages and disadvan- tages of different back-up systems. (1 hour) Parallel .Sessions. Provides an additional opportunity to discuss major problem areas and topics of interest in the area of computer security. (1 hour) Security Auditing Seminar. Provides an opportunity to discuss solu- tions to the problems assigned during the Security Auditing lecture. (1 hour Safe,.~uards Selection, Analyzes procedures by which the proper mix of available security safeguards can be selected for implementation based upon economic, technical and operational feasibility. (1-1/2 hours) Declassified in Part -Sanitized Copy Approved for Release 2013/01/30 :CIA-RDP89B01354R000200310017-8 Declassified in Part -Sanitized Copy Approved for Release 2013/01/30 :CIA-RDP89B01354R000200310017-8 Computer System Security (contd. ) Security Program Implementation and_Operation. Provides an analysis of the methodology for test, evaluation, implementation and operation of the Computer Security Program. (1 hour) Security Program Management Seminar. Discusses a variety of consid- erations regarding the, effective management of the Computer Security Program. Also provides a forum for the exchange of student ideas -and experiences in dealing with computer security problems. (2 hours) Course Closing. Summarizes the security course and provides some insight into ADP security developments that can be expected in the future. (1/2 hour) Last. day. adjournment."approximately _:1,500 hours. Declassified in Part -Sanitized Copy Approved for Release 2013/01/30 :CIA-RDP89B01354R000200310017-8 Declassified in Part - Sanitized Cop~y/Approved for Release 2013/01/30: C~IA~-)RDP89B01354R000200310017-8 `EFFECTIVE" CS-7-77 (18 - 21 October gJ77) COMPUTER SYSTEM SECURITY COURSE (4 days) Prerequisites: Officers 0-1 and above, Warrant Officers W-1 and above, Enlisted E-6 and above, and Civilians GS-9 and above. Previous attendance ati the Introduction to Computer Technology or Computer Orientation for Intermediate Executives courses, or equivalent data processing experience is essential. Attendees should be familiar with their organizations's security procedures and be prepared to discuss security problems during the student seminars. A security clearance is not required for attendance. Course Content:. This course develops an understanding of computer security problems and presents a systematic approach to developing a Computer Security Program. The concepts of risk management, sensitivity analysis, and several analytical techniques for the selection of appropriate safeguards are . developed throughout the course. Methodology for test and evaluation, implementation and operation of the Computer Security Program are also discussed. Who should attend? This course is recommended for ADP managers. computer system users, computer specialists,~security officers, or anyone engaged in the management, design, development, procurement, operation, or security of computer systems. The course covers a variety of topics dealing with the protection of data processing resources. Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310017-8 Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310017-8 .? ~ ~ FY 78/79 TYPICAL CURRICULUM DEPARTMENT OF DEFENSE COMPUTER INSTITUTE COMPUTER SYSTEM SECURITY COURSE TUESDAY 0800 Course Introduction. Describes the mission of DODCI and the courses offered. Provides an orientation to DODCI and the surrounding environment. Presents the course objectives-and gives the student an overview of the course, and of the realm of computer security concerns that exist today. 0830 Analysis of the Computer Seeurity.Problem. Presents an overview of specific security problems facing users and managers of ADP systems. Provides a reference for the solutions presented~in the balance of the course: 1030 Computer Security Guidance. Reviews the origin,content, and applicability of DOD directives, regulations, and policies as they pertain to the issue of computer security. Reviews service regulations and directives. Also provides an"overview of the Privacy Act, Public Law 93-579, and its implementation. 1130 LUNCH 1230 Security Program Development. Describes the requirements for the successful initiation of an -ADP security program. Also introduces considerations regarding the value of information and resources, and the requirements for planning, justification, and trade-off analysis. 1500 Security Program Development Seminar. Provides an opportunity to discuss some of the major problems involved in the development of a successful security program. Case examples are utilized to illustrate recommended techniques for dealing-with potential problem areas. Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310017-8 Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310017-8 WEDNESDAY 0800 Data $ase Integrity. Examines some of the major problems involved in the preservation of data integrity in ADP systems. A variety of technical and administrative integrity safeguards are also discussed. 0900 Computer Resource Protection. Examines the threats against a computer system and evaluates~several~ alternative countermeasures. The essential elements of a computer system safeguards program are examined in detail. 1130 LUNCH 1230 Software Integrity. Examines recommended procedures for the development, test, and certification of software for secure applications.: 1330Physical Security and Media Protection. Defines the key elements in a physical security plan. Techniques for the evaluation of physical security hazards are examined in detail. A variety of physical security safeguards which may be utilized to reduce the vulnerability of computer systems are also discussed. 1500 Discussion. Provides an opportunity for student partici- pation in case study analyses. 0800 Personnel Security. Discusses some of the typical security problems associated with personnel in an ADP environment and suggests methods of preventing or minimizing the effects of such problems. 0900 The Role of the Auditor. Defines the emerging role of the auditor and his impact upon auditability and the detection of computer abuse. Also provides insight on how the auditor should interface in a computer security program. Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310017-8 Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310017-8 1030 Security Auditing. Defines the various methods of identifying normal and abnormal system activity. Also, furnishes guidance regarding the appropriate mix of manual and automated logs required for the security surveillance of an ADP system. 1130 LUNCH 1230 Teleprocessing Network Security. Examines several active and passive threats to teleprocessing systems. Discusses some of the major security considerations :.~- involved in intercomputer networks and analyzes a number of countermeasures that may be applied to specific threats. 1400 Contingency .Planning. Provides guidance on the development of a contingency plan, and evaluates some of the advantages-and disadvantages of different back-up systems. 1500 Parallel Sessions. Provides an additional opportunity to discuss-major problem areas and topics of interest in the area of computer security. FRIDAY 0800 Security Auditing Seminar. Provides an opportunity to discuss solutions to the problems assigned during the Security Auditing lecture. 0900. Safeguards Selection. Analyzes procedures by which the proper mix of available security safeguards can be selected for .implementation based-upon economic, technical, and operational feasibility. 1030 Security Program Implementation and Operation, Provides an analysis of the methodology for test, evaluation, implementation and operation of the Computer Security Program. Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310017-8 Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310017-8 1130 LUNCH 3230 Security Program Management Seminar. Discusses a variety of considerations regarding the effective management of the. Computer Security Program. Also provides a forum for the exchange of student ideas and experiences in dealing with computer security problems. 1430. Course Closing._ Summarizes the security course and provides some insight into ADP security developments that can be expected in the future': _~ Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310017-8