answersLogoWhite

0

Computer Security Law

Computer security means protecting the confidentiality, integrity, and availability of information stored on, processed by, and transmitted by computers. In order to achieve this, various governments and organizations have established laws, regulations, and standards for securing computers and the data stored, processed, and transmitted by them. This category is for questions about existing and proposed laws and standards specifically related to computer security including the contents of the laws & regulations, who is legally responsible, who/what the laws/regulations/standards apply to, how the security is evaluated, and how it is documented.

310 Questions

What is iaw?

IAW stands for "In Accordance With." It is commonly used in legal, military, and formal contexts to indicate that something is being done in compliance with established guidelines, regulations, or agreements. For example, a document may state that actions are to be taken IAW specific procedures or policies. It helps clarify adherence to rules or standards in various communications.

What is allowed IAW AR 25-2?

Installation of software, configuration of an IS or connecting any ISs to a distributed computing environment with prior approval

IAW AR 25-2?

"IAW AR 25-2" means "in accordance with AR 25-2". AR 25-2 is Army Regulation 25-2, Information Management, Information Assurance. According to the executive summary of AR 25-2:

Summary. This regulation provides Information Assurance policy, mandates , roles, responsibilities, and procedures for implementing the Army Information Assurance Program, consistent with today's technological advancements for achieving acceptable levels of security in engineering, implementation, operation, and maintenance for information systems connecting to or crossing any U.S. Army managed network.

Applicability. This regulation applies to the Active Army, the Army National Guard/Army National Guard of the United States, and the U.S. Army Reserve, unless otherwise stated. Also, it applies to all users, information systems, and networks a t all information classification levels; program executive officers; direct reporting program managers; strategic, tactical, and non-tactical environments or installations; internal or external organizations, services, tenants, or agencies.

Which of the following is allowed IAW AR 25-2?

Installation of software, configuration of an IS or connecting any ISs to a distributed computing enviorment with prior approval.

What are the responsibilities of the IASO?

IASO is to ensure that all personnel associated with IS receive system-specific and general awareness security training (see AR 25-2, para 3-2f) including:

  • IA training and certification
  • IA situation and awareness briefing
  • Information Assurance Workforce Improvement Program
  • Information Assurance Training and Certification Best Business Practice (BBP)

The IASO is also responsible to responsible to the IAM for ensuring that the appropriate operational IA posture is maintained for a DoD information system or organization.

Where will the DIACAP team members be listed?

The roles are listed in DoDI 8510. Usually the names of those filling the roles will also be listed in the Certification and Accreditation Plan (C&A Plan)

What are the sources of responsibility for the DAA?

The answer depends a bit on what you mean by "sources of responsibility".

DoDI 8510.01, paragraph 5.8.5 states that Heads of the DoD Components Appoint DAAs for DoD ISs under their purview so the DAA derives their authority and responsibility from that appointment. Under paragraph 5.9.1, the Chairman of the Joint Cheifs of Staff appoints a PAA for DPD Information systmes governed by the Warfighting Mission Areas (think Joint Capabilities) and 5.10 the Commander of the US STRATCOM appoints DAAs for space systems.

DODD 8500.1 and DoDI 8500.2 are the basic original documents laying out the responsibilities of the DAA with Paragraph 5.15 of DoDI 8510.01 lays out additional responsibilities. All these are driven by the requirements of the Federal Information Security Management Act (FISMA).

The dod instuction which covers diacap states that the ia posture of an organization?

The relevant DoD Instruction is DoDI 8500.2, which states that the IA posture must be reviewed at least once a year.