answersLogoWhite

0

Computer Security Law

Computer security means protecting the confidentiality, integrity, and availability of information stored on, processed by, and transmitted by computers. In order to achieve this, various governments and organizations have established laws, regulations, and standards for securing computers and the data stored, processed, and transmitted by them. This category is for questions about existing and proposed laws and standards specifically related to computer security including the contents of the laws & regulations, who is legally responsible, who/what the laws/regulations/standards apply to, how the security is evaluated, and how it is documented.

310 Questions

What is iaw?

IAW stands for "In Accordance With." It is commonly used in legal, military, and formal contexts to indicate that something is being done in compliance with established guidelines, regulations, or agreements. For example, a document may state that actions are to be taken IAW specific procedures or policies. It helps clarify adherence to rules or standards in various communications.

What is allowed IAW AR 25-2?

Installation of software, configuration of an IS or connecting any ISs to a distributed computing environment with prior approval

IAW AR 25-2?

"IAW AR 25-2" means "in accordance with AR 25-2". AR 25-2 is Army Regulation 25-2, Information Management, Information Assurance. According to the executive summary of AR 25-2:

Summary. This regulation provides Information Assurance policy, mandates , roles, responsibilities, and procedures for implementing the Army Information Assurance Program, consistent with today's technological advancements for achieving acceptable levels of security in engineering, implementation, operation, and maintenance for information systems connecting to or crossing any U.S. Army managed network.

Applicability. This regulation applies to the Active Army, the Army National Guard/Army National Guard of the United States, and the U.S. Army Reserve, unless otherwise stated. Also, it applies to all users, information systems, and networks a t all information classification levels; program executive officers; direct reporting program managers; strategic, tactical, and non-tactical environments or installations; internal or external organizations, services, tenants, or agencies.

Which of the following is allowed IAW AR 25-2?

Installation of software, configuration of an IS or connecting any ISs to a distributed computing enviorment with prior approval.

What are the responsibilities of the IASO?

IASO is to ensure that all personnel associated with IS receive system-specific and general awareness security training (see AR 25-2, para 3-2f) including:

  • IA training and certification
  • IA situation and awareness briefing
  • Information Assurance Workforce Improvement Program
  • Information Assurance Training and Certification Best Business Practice (BBP)

The IASO is also responsible to responsible to the IAM for ensuring that the appropriate operational IA posture is maintained for a DoD information system or organization.

Where will the DIACAP team members be listed?

The roles are listed in DoDI 8510. Usually the names of those filling the roles will also be listed in the Certification and Accreditation Plan (C&A Plan)

What are the sources of responsibility for the DAA?

The answer depends a bit on what you mean by "sources of responsibility".

DoDI 8510.01, paragraph 5.8.5 states that Heads of the DoD Components Appoint DAAs for DoD ISs under their purview so the DAA derives their authority and responsibility from that appointment. Under paragraph 5.9.1, the Chairman of the Joint Cheifs of Staff appoints a PAA for DPD Information systmes governed by the Warfighting Mission Areas (think Joint Capabilities) and 5.10 the Commander of the US STRATCOM appoints DAAs for space systems.

DODD 8500.1 and DoDI 8500.2 are the basic original documents laying out the responsibilities of the DAA with Paragraph 5.15 of DoDI 8510.01 lays out additional responsibilities. All these are driven by the requirements of the Federal Information Security Management Act (FISMA).

The dod instuction which covers diacap states that the ia posture of an organization?

The relevant DoD Instruction is DoDI 8500.2, which states that the IA posture must be reviewed at least once a year.

Trending Questions
Where should DoD employees look for guidance on safeguarding controlled unclassified information? What documents require IASO? Is it true that fisma and omb memorandum m-07-16 require federal government organizations to implement policies for handling lost pii? Which of the following is the most acceptable list of DIACAP team members are responsible for implementing DIACAP? What is the difference between AR 25-2 and AR 380-5? What AR 25-2 requires to all users? What is In accordance with AR 25-2 whose responsibility is it to ensure all users receive initial and annual IA awareness training? How long to complete the IASO course? Our source for DIACAP resources and knowledge services can be discovered through our relationship and support from? What are the sources of responsibility for the DAA? What kind of practice is information assurance? What the answers to IASO? When someone has viewed archived copyright protected data and sent it to someone else what has occurred? How often does DIACAP allow you to review your IA posture? Is it illegal to put an MP3 on a website? Who is responsible for ensuring that each assigned DoD information system has a designated Information Assurance Manager with the support authority and resources to satisfy the reponsibilities? What is source for DIACAP resources? What is computer sabotage? Three confidentiality levels which are used in the DIACAP? What covers DIACAP states that the IA posture of an organization will be reviewed every two years?