Добавил:
north memphis Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
лаба_10 / лаб_10_02_3.docx
Скачиваний:
3
Добавлен:
27.10.2025
Размер:
226.64 Кб
Скачать

Insurance/Bond 0.00 0.00 0

Life Cycle Management 0.00 0.00 0

Material Segregation 0.00 0.00 0

Monitor System 0.00 0.00 0

New Construction 0.00 0.00 0

Operating Procedures 0.00 0.00 0

OPR for each System 0.00 0.00 0

Organizational Structure 0.00 0.00 0

Passwords/Authenticaion 0.00 0.00 0

Personnel Clearances 0.00 0.00 0

Personnel Control 0.00 0.00 0

Preventive Maintenance 0.00 0.00 0

Property Management 0.00 0.00 0

Quality Assurance 0.00 0.00 0

Redundant Power 0.00 0.00 0

Review Sens. Applications 0.00 0.00 0

Risk Analysis 0.00 0.00 0

Security Classification 0.00 0.00 0

Security Plan 0.00 0.00 0

Security Policy 0.00 0.00 0

Security Staff 0.00 0.00 0

Safeguard Test & Eval. 0.00 0.00 0

System Validation 0.00 0.00 0

Technical Surveillance 0.00 0.00 0

Tempest Survey 0.00 0.00 0

Training 0.00 0.00 0

Visitor Control 0.00 0.00 0

Water Drainage 0.00 0.00 0

Safeguards B/C-10% ROI-10% PP-10%

Physical Access Control 0.00 0.00 0

Application Controls 0.00 0.00 0

Audit Trails 0.00 0.00 0

Classification Markings 0.00 0.00 0

Contingency Plan 0.00 0.00 0

Contract Specifications 0.00 0.00 0

Data Encryption 0.00 0.00 0

Detection System 0.00 0.00 0

Documentation 0.00 0.00 0

Electrical Power 0.00 0.00 0

Emergency Response 0.00 0.00 0

File/Pgm. Control (DAC) 0.00 0.00 0

Fire Suppression 0.00 0.00 0

Grounding System 0.00 0.00 0

Insurance/Bond 0.00 0.00 0

Life Cycle Management 0.00 0.00 0

Material Segregation 0.00 0.00 0

Monitor System 0.00 0.00 0

New Construction 0.00 0.00 0

Operating Procedures 0.00 0.00 0

OPR for each System 0.00 0.00 0

Organizational Structure 0.00 0.00 0

Passwords/Authenticaion 0.00 0.00 0

Personnel Clearances 0.00 0.00 0

Personnel Control 0.00 0.00 0

Preventive Maintenance 0.00 0.00 0

Property Management 0.00 0.00 0

Quality Assurance 0.00 0.00 0

Redundant Power 0.00 0.00 0

Review Sens. Applications 0.00 0.00 0

Risk Analysis 0.00 0.00 0

Security Classification 0.00 0.00 0

Security Plan 0.00 0.00 0

Security Policy 0.00 0.00 0

Security Staff 0.00 0.00 0

Safeguard Test & Eval. 0.00 0.00 0

System Validation 0.00 0.00 0

Technical Surveillance 0.00 0.00 0

Tempest Survey 0.00 0.00 0

Training 0.00 0.00 0

Visitor Control 0.00 0.00 0

Water Drainage 0.00 0.00 0

Safeguards B/C-15% ROI-15% PP-15%

Physical Access Control 0.00 0.00 0

Application Controls 0.00 0.00 0

Audit Trails 0.00 0.00 0

Classification Markings 0.00 0.00 0

Contingency Plan 0.00 0.00 0

Contract Specifications 0.00 0.00 0

Data Encryption 0.00 0.00 0

Detection System 0.00 0.00 0

Documentation 0.00 0.00 0

Electrical Power 0.00 0.00 0

Emergency Response 0.00 0.00 0

File/Pgm. Control (DAC) 0.00 0.00 0

Fire Suppression 0.00 0.00 0

Grounding System 0.00 0.00 0

Insurance/Bond 0.00 0.00 0

Life Cycle Management 0.00 0.00 0

Material Segregation 0.00 0.00 0

Monitor System 0.00 0.00 0

New Construction 0.00 0.00 0

Operating Procedures 0.00 0.00 0

OPR for each System 0.00 0.00 0

Organizational Structure 0.00 0.00 0

Passwords/Authenticaion 0.00 0.00 0

Personnel Clearances 0.00 0.00 0

Personnel Control 0.00 0.00 0

Preventive Maintenance 0.00 0.00 0

Property Management 0.00 0.00 0

Quality Assurance 0.00 0.00 0

Redundant Power 0.00 0.00 0

Review Sens. Applications 0.00 0.00 0

Risk Analysis 0.00 0.00 0

Security Classification 0.00 0.00 0

Security Plan 0.00 0.00 0

Security Policy 0.00 0.00 0

Security Staff 0.00 0.00 0

Safeguard Test & Eval. 0.00 0.00 0

System Validation 0.00 0.00 0

Technical Surveillance 0.00 0.00 0

Tempest Survey 0.00 0.00 0

Training 0.00 0.00 0

Visitor Control 0.00 0.00 0

Water Drainage 0.00 0.00 0

The following table shows the safeguards with the 10 greatest Return on Investment (ROI-10%). Also shown are the Initial and Maintenance Costs of those safeguards. Following the table are barcharts and piecharts of the costs.

Safeguards ROI-10% Initial Cost Maint. Cost

INITIAL COSTS

MAINTENANCE COSTS

SAFEGUARD DEFINITIONS

ACCESS CONTROL - The Access Control safeguard refers to the

existence of a verifiable and coordinated access control

system. The system can range from simple (key lock systems)

to complex (cypher/key card identification systems).

APPLICATION CONTROL STANDARDS - Application control refers

to a specific system of controls designed by a team of

internal auditors to ensure that universal programming

standards, data element dictionaries and record association

conventions are maintained.

AUDIT TRAILS - The safeguard of Audit Trails refers to the

organization having a fully implemented audit trail

capability so that it is simple to track which user was

accessing any system at any point in time.

CLASSIFICATION MARKING - The safeguard of Classification

Marking refers to having all media and reports containing

information which is classified as Classified, Sensitive, or

Privacy Act data marked on the top and bottom of each page.

CONTINGENCY PLAN - The Contingency Plan is also known as a

Continuity of Operations Plans (COOP), or as a Disaster

Recovery Plan; and it contains a detailed blueprint of

backup procedures to be followed in case of emergency

disruption to the ADP facility, as well as a guide to

getting the programs operational as quickly as possible.

CONTRACT SPECIFICATIONS - The Contract Specification

safeguard refers to the practice of requiring each

contractor to include as a formal contract deliverable, a

plan for including appropriate security controls, addressing

of pertinent threats, and possible loss quantification.

DATA ENCRYPTION - This safeguard involves the application

of encipherment techniques to one or more datasets or to

data traveling over communications systems.

DETECTION SYSTEM - The Detection System safeguard refers to

having a coordinated fire detection/access control violation

system which will alert the proper authorities to smoke,

heat, water, humidity fluctuations, grounding problems, as

well as monitoring any attempt at unauthorized access.

DOCUMENTATION - The Documentation safeguard refers to the

need for the organization to provide backup documentation

for every file, program, and process; including providing

hard copies retained in a safe location.

ELECTRICAL POWER CONDITIONING - The Electrical Power

Conditioning safeguard refers to the establishment of a

stable sources of electrical power, including a

consideration of a source of uninterruptable power, backup

generators, as well as consideration of phase-balancing to

prevent power fluctuations.

EMERGENCY RESPONSE - The emergency response safeguard deals

with a having a detailed guide of how the organization can

continue to operate in the event of large scale emergencies,

such as chemical spills, civil disobedience, or nuclear

mishaps.

FILE/PROGRAM CONTROL - The safeguard of File/Program Control

refers to the practice of establishing a system of access

controls and authorizations for programs and files based on

"need to know".

FIRE SUPPRESSION SYSTEM - The Fire Suppression safeguard

refers to the appropriate combination of water and CO2 which

should be installed in any ADP facility.

GROUNDING SYSTEM - The Grounding System safeguard refers to

provision for proper electrical grounding for all equipment,

including lightning arrestors; a separate grounding system

for all signal cables. For sites processing classified

information, a local low resistance ground is required.

INSURANCE - Insurance policies should be considered as a

safeguard for situations where other types of safeguards may

not be currently available or cost-effective. Financial

institutions should consider bonding insurance for key

personnel.

LIFE CYCLE MANAGEMENT - The safeguard of Life Cycle

Management refers to the adoption of a formal, written plan

for all systems, including security and audit controls,

This plan should address general management, personnel,

organizational, system design, data center management, and

computer applications controls.

MATERIAL SEGREGATION - The Material Segregation safeguard

refers to the procedure of separating Classified, Sensitive

and Privacy Act data from all other material in order to

guard against inadvertent disclosure.

MONITOR SYSTEM - The Monitoring System safeguard refers to

having an effective system in place which covers checking of

remote sites, critical components, operational status of

various programs and applications as well as sensitive

operational areas.

NEW CONSTRUCTION - The New Construction safeguard covers a

variety of considerations which should be reviewed for any

new facility. These include, but are not limited to, use of

fire retardant and low combustion building materials, use of

floor-to-ceiling walls, automatic vent closures, inside

hinges on doors and windows, and proper drainage.

OFFICE OF PRIMARY RESPONSIBILITY (OPR) - An Office of

Primary Responsibility (OPR) should be designated for each

data base, data file, and removable media containing data or

programs, The OPR designation is necessary to ensure

integrity of data files and accuracy of their contents.

OPERATING PROCEDURES - The safeguard of operating procedures

refers to having a monitoring program in place in order to

determine the effectiveness and efficiency of the system's

operating procedures, as well as a method of monitoring that

these procedures are continuously upgraded.

ORGANIZATIONAL STRUCTURE - Organizational structure refers

to the safeguard of having the organization not only

staffed, but also responsive to the need for redundancy of

critical job functions and that the necessary guidelines are

in place to ensure functional separation of duties.

PASSWORDS - The safeguard of Passwords refers to the

organization having an effective policy of user passwords

which should be fully implemented for every system.

PERSONNEL CLEARANCE - The Personnel Clearance safeguard

refers to having an organizational policy governing

personnel clearance in which each individual must have a

security clearance of equal or greater classification than

the highest level of data processed in the system they are

accessing. This safeguard also includes background

investigation of all employees.

PERSONNEL CONTROL - The safeguard of Personnel Control

refers to the organization having proper procedures for

automatic background checks, authority based on "need to

know" criteria, as well as timely method for updating

personnel records when individuals are reassigned,

transferred or discharged.

PREVENTIVE MAINTENANCE - The Preventive Maintenance

safeguard refers to having an effective maintenance program

in place which should include all computer hardware,

generators, air conditioning equipment, grounding systems,

lightning arrestors, fire systems and structured components

such as vent closures, floor plates, doors, etc.

PROPERTY MANAGEMENT - The Property Management safeguard

refers to the organization having a comprehensive and

effective program for property inventory control, allocation

and accountability.

QUALITY ASSURANCE - The safeguard of Quality Assurance

refers to the formal establishment of a program which will

regularly monitor (and find ways to improve) programming

quality, user error, communication ability, etc.

REDUNDANT POWER - The safeguard of Redundant Power refers to

having a secondary independent source of electrical power to

backup the primary power source.

REVIEW OF SENSITIVE APPLICATIONS - The safeguard of Review

of Sensitive Applications refers to the need of the

organization to conduct a formal risk assessment of each

Sensitive Application program on a regular basis.

RISK ANALYSIS - The safeguard of Risk Analysis refers to the

organization having recently conducted a formal risk

assessment of each major system and application program.

SECURITY CLASSIFICATION - The Security Classification

safeguard requires that each activity have policies in place

addressing the proper classification of sensitive materials,

including a receipt program, and general handling procedures

for all sensitive and classified materials.

SECURITY PLAN - The Security Plan refers to the existence of

a document which defines the tasks and charges of the

security organization; as well as planning the security

procedures necessary for the protection of the organization.

SECURITY POLICY - Security policy refers to the existence of

written, defined guidelines which dictate how the

organization manages its resources and protects them from

both internal and external threats.

SECURITY STAFF - The Security Staff refers to the

individuals in the organization who maintain or manage

security tasks, as well as addressing full-time security

staff, include managers who have part-time security

responsibilities for the resources they manage.

SYSTEM SECURITY TEST AND EVALUATION (SST&E) - The safeguard

of SST&E (System Security Test and Evaluation) refers to the

organization having a formal procedure to test each

individual safeguard for effectiveness and accuracy.

SYSTEM VALIDATION - The System Validation safeguard refers

to the practice of ensuring that the operating system

contains only approved code; and that changes to the

operating system are accounted for, are verified, and are

transmitted in a secure and acknowledged mode.

TECHNICAL SURVEILLANCE - This safeguard is applicable to

Classified environments and refers to a (possibly external)

organization that can conduct a survey to identify potential

security problems.

TEMPEST SURVEY - This safeguard is applicable to Classified

environments and refers to the gathering of information, by

inspection or survey, about all instrumentation and sites

that store or process classified information.

TRAINING - The training safeguard refers to the organization

having a written implemented program for security training

of new employees, and security awareness programs for

current employees.

VISITOR CONTROL - The visitor control safeguard refers to

ensuring that visitors to a facility are monitored twenty-

four hours a day, that an audit trail of visitors exists and

that this official record is maintained for at least two

years.

WATER DRAINAGE - The Water Drainage safeguard refers to

ensuring that the facility is equipped with a drainage

system so that water from broken pipes, water from activated

sprinkler systems or water used in fire fighting can be

easily and effectively drained from the facility.

The section below looks at each safeguard and indicates, for each threat, the ALE before and after the safeguard is implemented. The overall ALE for a threat is the sum of the ALEs for each of the associated incidents. The percentage by which the ALE is reduced by the safeguard is also indicated.

The next section contains a table indicating, for each safeguard, the ALE before (Original ALE) and after the safeguard is implemented.

Safeguard: Physical Access Control

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Application Controls

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Audit Trails

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Classification Markings

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Contingency Plan

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Contract Specifications

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Data Encryption

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Detection System

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Documentation

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Electrical Power

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Emergency Response

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: File/Pgm. Control (DAC)

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Fire Suppression

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Grounding System

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Insurance/Bond

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Life Cycle Management

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Material Segregation

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Monitor System

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: New Construction

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Operating Procedures

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: OPR for each System

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Organizational Structure

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Passwords/Authenticaion

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Personnel Clearances

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Personnel Control

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Preventive Maintenance

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Property Management

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Quality Assurance

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Redundant Power

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Review Sens. Applications

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Risk Analysis

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Security Classification

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Security Plan

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Security Policy

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Security Staff

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Safeguard Test & Eval.

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: System Validation

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Technical Surveillance

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Tempest Survey

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Training

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Visitor Control

Threat Original ALE ALE with Safeguard Percentage Drop

Safeguard: Water Drainage

Threat Original ALE ALE with Safeguard Percentage Drop

The following is a table indicating, for each safeguard, the ALE before (Original ALE) and after the safeguard is implemented (ALE with Safeguard). This table also indicates the difference between the two ALE values.

Also shown is a barchart that provides a visual presentation of the difference in ALE for each safeguard.

Safeguard Original ALE ALE with Safeguard Difference

Physical Access Control $0. $0. $0.

Application Controls $0. $0. $0.

Audit Trails $0. $0. $0.

Classification Markings $0. $0. $0.

Contingency Plan $0. $0. $0.

Contract Specifications $0. $0. $0.

Data Encryption $0. $0. $0.

Detection System $0. $0. $0.

Documentation $0. $0. $0.

Electrical Power $0. $0. $0.

Emergency Response $0. $0. $0.

File/Pgm. Control (DAC) $0. $0. $0.

Fire Suppression $0. $0. $0.

Grounding System $0. $0. $0.

Insurance/Bond $0. $0. $0.

Life Cycle Management $0. $0. $0.

Material Segregation $0. $0. $0.

Monitor System $0. $0. $0.

New Construction $0. $0. $0.

Operating Procedures $0. $0. $0.

OPR for each System $0. $0. $0.

Organizational Structure $0. $0. $0.

Passwords/Authenticaion $0. $0. $0.

Personnel Clearances $0. $0. $0.

Personnel Control $0. $0. $0.

Preventive Maintenance $0. $0. $0.

Property Management $0. $0. $0.

Quality Assurance $0. $0. $0.

Redundant Power $0. $0. $0.

Review Sens. Applications $0. $0. $0.

Risk Analysis $0. $0. $0.

Security Classification $0. $0. $0.

Security Plan $0. $0. $0.

Security Policy $0. $0. $0.

Security Staff $0. $0. $0.

Safeguard Test & Eval. $0. $0. $0.

System Validation $0. $0. $0.

Technical Surveillance $0. $0. $0.

Tempest Survey $0. $0. $0.

Training $0. $0. $0.

Visitor Control $0. $0. $0.

Water Drainage $0. $0. $0.

QUESTION CATEGORY REPORT

FOR QUESTION CATEGORY ADP Centers

1. AC 5 - Controls on Media

The organization has implemented procedures and controls to preclude access to removable tape and disk files in order to prevent unauthorized users and programs from accessing, reading, modifying or damaging data on these media?

Vulnerability Category: Access Control

Number of Answers: 3 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

2. ACC 6 - Individual Identification

Each individual user is assigned a unique identification number and password?

Vulnerability Category: Accountability

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

3. ACC 5 - Control over material and equipment

There is continuous accountability and control for all equipment and materials maintained in the computer facility or that are released or transferred from the facility?

Vulnerability Category: Accountability

Number of Answers: 3 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

4. ACC 6 - Individual Identification

Each individual user is assigned a unique identification number and password?

Vulnerability Category: Accountability

Number of Answers: 2 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

5. COMPL 6 - Verification of Authenticity of Software

The authenticity of the software is verified by comparing the registry or shipment number with the information contained in the communications from the originator?

Vulnerability Category: Compliance

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

6. COMPL 4 - Verification of Markings/Expectations

Users are required to verify that the information in their files and reports is in accordance with the markings and expectations?

Vulnerability Category: Compliance

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

7. COMPL 5 - Matching Configuration to Environment

The system is configured in a manner to clearly indicate a particular security environment?

Vulnerability Category: Compliance

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

8. COMPL 6 - Verification of Authenticity of Software

The authenticity of the software is verified by comparing the registry or shipment number with the information contained in the communications from the originator?

Vulnerability Category: Compliance

Number of Answers: 2 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

9. COMPL 4 - Verification of Markings/Expectations

Users are required to verify that the information in their files and reports is in accordance with the markings and expectations?

Vulnerability Category: Compliance

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

10. COMPL 5 - Matching Configuration to Environment

The system is configured in a manner to clearly indicate a particular security environment?

Vulnerability Category: Compliance

Number of Answers: 2 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

11. COMPL 4 - Verification of Markings/Expectations

Users are required to verify that the information in their files and reports is in accordance with the markings and expectations?

Vulnerability Category: Compliance

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

12. C.PLAN 7 - Fireproof Storage Facilities

The disaster recovery plan provides for local storage of magnetic media and other documentation in metal or other fire retardant cabinets within the facility?

Vulnerability Category: Contingency Plan

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 1 Not Applicable: 0

13. C.PLAN 8 - Alternate Sites

The disaster recovery plan provides for an alternate site containing compatible equipment?

Vulnerability Category: Contingency Plan

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 1

14. C.PLAN 6 - Duplication of Systems

The disaster recovery plan provides for duplicate system programs, start-up programs, and data base backups?

Vulnerability Category: Contingency Plan

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 1

15. C.PLAN 7 - Fireproof Storage Facilities

The disaster recovery plan provides for local storage of magnetic media and other documentation in metal or other fire retardant cabinets within the facility?

Vulnerability Category: Contingency Plan

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 1 Not Applicable: 0

16. C.PLAN 8 - Alternate Sites

The disaster recovery plan provides for an alternate site containing compatible equipment?

Vulnerability Category: Contingency Plan

Number of Answers: 2 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 2

17. C.PLAN 6 - Duplication of Systems

The disaster recovery plan provides for duplicate system programs, start-up programs, and data base backups?

Vulnerability Category: Contingency Plan

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 1

18. C.PLAN 5 - Plans for Computer Failure

The organization has viable plans for recovery in the event of computer failure?

Vulnerability Category: Contingency Plan

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

19. C.PLAN 6 - Duplication of Systems

The disaster recovery plan provides for duplicate system programs, start-up programs, and data base backups?

Vulnerability Category: Contingency Plan

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 1

20. C.PLAN 5 - Plans for Computer Failure

The organization has viable plans for recovery in the event of computer failure?

Vulnerability Category: Contingency Plan

Number of Answers: 2 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

21. C.PLAN 7 - Fireproof Storage Facilities

The disaster recovery plan provides for local storage of magnetic media and other documentation in metal or other fire retardant cabinets within the facility?

Vulnerability Category: Contingency Plan

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 1 Not Applicable: 0

22. D.INTEG 2 - Data Validation in Media Transfer

Sufficient controls exist to ensure that data is validated at each point as it moves from one medium to another?

Vulnerability Category: Data Integrity

Number of Answers: 3 Below 11% threshold: 0 Don't Know: 3 Not Applicable: 0

23. DISC 1 - Hiding Passwords when Entered

The user password is hidden (not displayed) when it is typed into the system to protect password information?

Vulnerability Category: Disclosure

Number of Answers: 2 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

24. DISC 2 - Maintenance Personnel

All personnel who service and maintain the computer and its support systems are properly cleared or monitored by well qualified escorts?

Vulnerability Category: Disclosure

Number of Answers: 3 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

25. DISC 1 - Hiding Passwords when Entered

The user password is hidden (not displayed) when it is typed into the system to protect password information?

Vulnerability Category: Disclosure

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

26. EVAL 5 - Risk Analysis for new Installations

A risk analysis is performed prior to the approval of design specifications for new computer installations?

Vulnerability Category: Evaluation

Number of Answers: 2 Below 11% threshold: 0 Don't Know: 2 Not Applicable: 0

27. EVAL 3 - Design Reviews on Applications

An official design review has been conducted, documented and maintained for each operating application?

Vulnerability Category: Evaluation

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 1 Not Applicable: 0

28. EVAL 6 - Risk Analysis on Changes to Software/Hardware

A risk analysis is performed whenever there is a major change to facility software?

Vulnerability Category: Evaluation

Number of Answers: 3 Below 11% threshold: 0 Don't Know: 3 Not Applicable: 0

29. EVAL 3 - Design Reviews on Applications

An official design review has been conducted, documented and maintained for each operating application?

Vulnerability Category: Evaluation

Number of Answers: 2 Below 11% threshold: 0 Don't Know: 2 Not Applicable: 0

30. EVAL 4 - Determining Criticality

Criticality determinations are made for all data maintained on the system?

Vulnerability Category: Evaluation

Number of Answers: 3 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 3

31. EVAL 5 - Risk Analysis for new Installations

A risk analysis is performed prior to the approval of design specifications for new computer installations?

Vulnerability Category: Evaluation

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 1 Not Applicable: 0

32. EVAL 3 - Design Reviews on Applications

An official design review has been conducted, documented and maintained for each operating application?

Vulnerability Category: Evaluation

Respondent(s) did not answer this question.

33. MAINT 4 - Media Cleaning and Maintenance

The organization has an effective magnetic media maintenance system to ensure that the media are clean, error-free and properly labeled internally and externally in a manner that indicates use, content, classification and restrictions?

Vulnerability Category: Maintenance

Respondent(s) did not answer this question.

34. MAINT 5 - Quarterly Printer Maintenance

Printers are serviced on a quarterly maintenance schedule to assure continued, trouble-free operation?

Vulnerability Category: Maintenance

Number of Answers: 3 Below 11% threshold: 0 Don't Know: 3 Not Applicable: 0

35. MAINT 4 - Media Cleaning and Maintenance

The organization has an effective magnetic media maintenance system to ensure that the media are clean, error-free and properly labeled internally and externally in a manner that indicates use, content, classification and restrictions?

Vulnerability Category: Maintenance

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

36. MAINT 2 - Labeling Electrical Switches etc.

All switches, control panels and circuit breaker panels are adequately labeled to indicate the specific functions, outlets and/or equipment they support?

Vulnerability Category: Maintenance

Respondent(s) did not answer this question.

37. MAINT 4 - Media Cleaning and Maintenance

The organization has an effective magnetic media maintenance system to ensure that the media are clean, error-free and properly labeled internally and externally in a manner that indicates use, content, classification and restrictions?

Vulnerability Category: Maintenance

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

38. MAINT 3 - Preventative Maintenance

Preventive maintenance of ADP equipment is performed according to published schedules?

Vulnerability Category: Maintenance

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 1 Not Applicable: 0

39. MAINT 4 - Media Cleaning and Maintenance

The organization has an effective magnetic media maintenance system to ensure that the media are clean, error-free and properly labeled internally and externally in a manner that indicates use, content, classification and restrictions?

Vulnerability Category: Maintenance

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

40. MAINT 3 - Preventative Maintenance

Preventive maintenance of ADP equipment is performed according to published schedules?

Vulnerability Category: Maintenance

Number of Answers: 2 Below 11% threshold: 0 Don't Know: 2 Not Applicable: 0

41. MAINT 2 - Labeling Electrical Switches etc.

All switches, control panels and circuit breaker panels are adequately labeled to indicate the specific functions, outlets and/or equipment they support?

Vulnerability Category: Maintenance

Number of Answers: 3 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

42. ORG 4 - Separation of Duties

Critical computer systems and functions are protected by separation of duties and other internal controls?

Vulnerability Category: Organization

Number of Answers: 3 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

43. POL 7 - Testing of Changes to Software

System and application software changes and new releases are always tested using pre-approved procedures that are approved by the security or internal audit functions before being placed into operational service?

Vulnerability Category: Policy

Number of Answers: 3 Below 11% threshold: 3 Don't Know: 0 Not Applicable: 0

44. PROC 7 - Operating procedures to Minimize Errors

The organization has viable system operating procedures in order to minimize errors in data bases, program execution, communications and data entry?

Vulnerability Category: Procedures

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

45. PROC 5 - Protecting Operational Data during Testing

Only test data or copies of operational data files are used in the testing of programs?

Vulnerability Category: Procedures

Number of Answers: 2 Below 11% threshold: 2 Don't Know: 0 Not Applicable: 0

46. PROC 7 - Operating procedures to Minimize Errors

The organization has viable system operating procedures in order to minimize errors in data bases, program execution, communications and data entry?

Vulnerability Category: Procedures

Respondent(s) did not answer this question.

47. PROC 5 - Protecting Operational Data during Testing

Only test data or copies of operational data files are used in the testing of programs?

Vulnerability Category: Procedures

Number of Answers: 1 Below 11% threshold: 1 Don't Know: 0 Not Applicable: 0

48. PROC 7 - Operating procedures to Minimize Errors

The organization has viable system operating procedures in order to minimize errors in data bases, program execution, communications and data entry?

Vulnerability Category: Procedures

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

49. PROC 6 - input/output Controls for Data/Printouts/Media

The organization and site have effective and verifiable input and output control systems to ensure that authorized and validated data only is entered, and that printouts and other media are provided to authorized individuals only?

Vulnerability Category: Procedures

Number of Answers: 3 Below 11% threshold: 3 Don't Know: 0 Not Applicable: 0

50. PROC 7 - Operating procedures to Minimize Errors

The organization has viable system operating procedures in order to minimize errors in data bases, program execution, communications and data entry?

Vulnerability Category: Procedures

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

51. REL 3 - Training to Reduce Data Errors

The training provided to the operators and user is current and sufficient to minimize most data entry errors, and to reduce the likelihood of data contamination and destruction?

Vulnerability Category: Reliability

Number of Answers: 1 Below 11% threshold: 1 Don't Know: 0 Not Applicable: 0

52. REL 2 - Mainframe Reliability and Availability

The Main Frame Computer system is reliable and provides maximum availability, response time and support to the users?

Vulnerability Category: Reliability

Number of Answers: 2 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

53. REL 3 - Training to Reduce Data Errors

The training provided to the operators and user is current and sufficient to minimize most data entry errors, and to reduce the likelihood of data contamination and destruction?

Vulnerability Category: Reliability

Respondent(s) did not answer this question.

54. REL 2 - Mainframe Reliability and Availability

The Main Frame Computer system is reliable and provides maximum availability, response time and support to the users?

Vulnerability Category: Reliability

Number of Answers: 1 Below 11% threshold: 0 Don't Know: 0 Not Applicable: 0

55. REL 3 - Training to Reduce Data Errors

The training provided to the operators and user is current and sufficient to minimize most data entry errors, and to reduce the likelihood of data contamination and destruction?

Vulnerability Category: Reliability

Number of Answers: 1 Below 11% threshold: 1 Don't Know: 0 Not Applicable: 0

56. REL 2 - Mainframe Reliability and Availability

The Main Frame Computer system is reliable and provides maximum availability, response time and support to the users?

Vulnerability Category: Reliability

Respondent(s) did not answer this question.

57. REL 3 - Training to Reduce Data Errors

The training provided to the operators and user is current and sufficient to minimize most data entry errors, and to reduce the likelihood of data contamination and destruction?

Vulnerability Category: Reliability

Number of Answers: 1 Below 11% threshold: 1 Don't Know: 0 Not Applicable: 0

58. TRAIN 6 - User Familiarization Training

The organization has a user familiarization and training program in effect?

Vulnerability Category: Training

Number of Answers: 3 Below 11% threshold: 3 Don't Know: 0 Not Applicable: 0

RESPONDENT REPORT

Legend:

* - Below Threshold value: 11

FOR RESPONDENT Nelly

1. AC 2 - Security Notified of Employee Transfer or Termination

Answer: 5*

2. ACC 1 - Adequate Accountability Control

Answer: 6*

3. ACC 2 - Securing Copying Facilities

Answer: 5*

4. ACC 3 - Continuous Accountability

Answer: 6*

5. ACC 4 - Written Accountability Policy

Answer: 5*

6. ADMIN 1 - Security Program and Staff

Answer: 6*

7. ADMIN 2 - Analysis of Operational Problems

Answer: 5*

8. AUD.TR 1 - Maintain Investigation Reports

Answer: 6*

9. COMPL 1 - Act on Audit Review Concerns

Answer: 5*

10. COMPL 2 - Training for Awareness

Answer: 6*

11. COMPL 3 - Investigate Incidents

Answer: 5*

12. C.PLAN 1 - Backup Personnel

Answer: 6*

13. C.PLAN 2 - Distribute Emergency Instructions

Answer: 5*

14. C.PLAN 3 - Periodic Testing of Plans and Equipment

Answer: 6*

15. C.PLAN 4 - Existence of Plan

Answer: 6*

16. D.INTEG 1 - Existence of Data Security Policy

Answer: 66

17. DOC 1 - Security Testing Records

Answer: 77

18. EM.RESP 1 - Evacuation Plan

Answer: 63

19. EVAL 1 - Annual Security Audit

Answer: 66

20. EVAL 2 - Risk Analysis

Answer: Don't Know

21. FIRE 1 - Existence of Fire Control Plan

Answer: Don't Know

22. FIRE 2 - Separate Storage of Hazardous Material

Answer: Don't Know

23. FIRE 3 - Inspection Schedule

Answer: 66

24. MAINT 1 - Equipment Operation

Answer: 6*

25. ORG 1 - Centralized Purchasing Authority

Answer: 4*

26. ORG 2 - Security Organization

Answer: 4*

27. ORG 3 - Internal Audit

Answer: 5*

28. POL 1 - Life Cycle Management

Answer: 4*

29. POL 2 - Acquisition of Hardware and Software

Answer: 5*

30. POL 3 - Personnel Background Checks

Answer: 5*

31. POL 4 - SSO Reporting

Answer: 4*

32. POL 5 - Security Policy

Answer: 55

33. POL 6 - Security Organization

Answer: 5*

34. PRIV.ACT 1 - Confidentiality Policy

Answer: 4*

35. PROC 1 - Inspection of Goods

Answer: 4*

36. PROC 2 - Badges

Answer: 5*

37. PROC 3 - Operating Procedures

Answer: 6*

38. PROC 4 - Escorting Visitors

Answer: 8*

39. REL 1 - Waterproof Coverings for Computer Equipment

Answer: 6*

40. TRAIN 1 - Training Budget

Answer: 4*

41. TRAIN 2 - Technological Training

Answer: 5*

42. TRAIN 3 - All Personnel made Aware of Data Security

Answer: 6*

43. TRAIN 4 - Immediate Awareness Training

Answer: 5*

44. TRAIN 5 - QA and Performance Program

Answer: 4*

45. AC 34 - Visitor Logs

Answer: 5*

46. AC 35 - Authorized Access

Answer: 55

47. ADMIN 6 - Background Check for New Employees

Answer: 5*

48. ADMIN 7 - Tracking Personnel Documents

Answer: 4*

49. ADMIN 8 - Benefits for Permanent Employees

Answer: 5*

50. ADMIN 9 - Pay Raises

Answer: 4*

51. COMPL 18 - Performance Raises

Answer: 5*

52. COMP 19 - Personnel Files

Answer: 4*

53. ORG 8 - Vacancies Filled

Answer: 55

54. ORG 9 Automating Human Resource Management

Answer: 55

55. POL 17 - Fair Promotion Practices

Answer: 6*

56. POL 18 - Compensation Packages

Answer: 7*

57. POL 19 - Conflict of Interest Awareness

Answer: 5*

58. POL 20 - Retirement Plan

Answer: 7*

59. POL 21 - Promotions from Within Organization

Answer: 6*

60. PROC 21 - Procedures for Documentation Requirements

Answer: 5*

61. PROC 22 - Screening Candidates

Answer: 66

62. PROC 23 - Procedures to Stop rehiring Previously Terminated (for Cause) Employee

Answer: 77

63. TRAIN 10 - New Employee Orientation

Answer: 66

64. TRAIN 11 - Safety Training

Answer: 77

65. TRAIN 12 - Technical Training and Grievance Procedures

Answer: 66

66. AC 36 - Access Control Defined for Individuals and/or Groups

Answer: 55

67. AC 37 - Furthering Access Rights

Answer: 64

68. AC 38 - RACF Profiles

Answer: 4*

69. AC 39 - RACF and TSO user Information

Answer: 4*

70. AC 40 - RACF and Data

Answer: Not Applicable

71. AC 41 - Spooled Environment

Answer: Not Applicable

72. AC 42 - Initial Passwords

Answer: Don't Know

73. AC 43 - Nature of Passwords

Answer: Don't Know

74. AC 44 - Changing Passwords

Answer: Don't Know

75. AC 45 - Authorizing Access to Files

Answer: Don't Know

76. ACC 19 - Tracking Sensitive Output

Answer: Don't Know

77. ACC 20 - Separation of Duties

Answer: Don't Know

78. AUD.TR 2 - Trail to include File Names

Answer: Don't Know

79. AUD.TR 3 - Individual Audibility

Answer: 55

80. AUD.TR 4 - Linking Users to Actions

Answer: 5*

81. COMPL 20 - Incident Investigation

Answer: 5*

82. COMPL 21 - Front Cover of Sensitive Listings

Answer: 5*

83. COMPL 22 - User Clearances

Answer: 5*

84. COMPL 23 - Physical Security Requirements

Answer: 5*

85. C.PLAN 9 - Provisions for Sensitive Material on Evacuation

Answer: 5*

86. DISC 14 - Need for Two Persons

Answer: 6*

87. DISC 15 - Sensitive Output Distribution

Answer: 7*

88. DISC 16 - Communications Links Requirements

Answer: 4*

89. DISC 17 - Sensitivity Determination for All Data

Answer: 6*

90. DISC 18 - Requirements for Unescorted Access

Answer: 5*

91. DISC 19 - Role of Office of Primary Responsibility

Answer: 6*

92. DISC 20 - Verifying Requests

Answer: 6*

93. DISC 21 - Control of Removable Media

Answer: 6*

94. DISC 22 - Customer Awareness of Overall Classification

Answer: 6*

95. DISC 23 - After-hours Removal of Sensitive Material

Answer: 4*

96. DISC 24 - User Awareness of Discrepancy Reporting

Answer: 44

97. DISC 25 - Receipts Issued

Answer: 44

98. DISC 26 - Customer Receipts

Answer: 55

99. DISC 27 - Customer Review

Answer: 23

100. DISC 28 - Testing Tapes for Reusability

Answer: 44

101. DISC 29 - Operations Personnel Awareness

Answer: 55

102. DISC 30 - Protecting System Tapes

Answer: 6*

103. DISC 31 - Restricted Access to Written Records

Answer: 5*

104. DISC 32 - Telephone Esquires

Answer: 6*

105. DISC 33 - Degaussing Media

Answer: 5*

106. DISC 34 - No Public Discussion

Answer: 6*

107. DOC 3 - Manufacturer's Statement on Protection

Answer: 5*

108. DOC 4 - Summary of Protection Mechanisms

Answer: 6*

109. DOC 5 - System Administration Manual

Answer: 5*

110. EVAL 9 - Boundary Maintenance

Answer: 44

111. LABEL 5 - Utility for Printer Direction Labeling

Answer: 33

112. LABEL 6 - Storage Devices Labeled

Answer: 44

113. LABEL 7 - Output is Labeled

Answer: 33

114. LABEL 8 - Universal System Labeling Utility Available

Answer: 44

115. LABEL 9 - System Labeling Utility Available

Answer: 22

116. PRIV.ACT 2 - Media Labeling

Answer: 33

117. PRIV.ACT 3 - Appointment of Officer

Answer: 44

118. PRIV.ACT 4 - Relevant markings are System Generated

Answer: 23

119. PRIV.ACT 5 - Duties of Privacy Act Officer

Answer: 24

120. PRIV.ACT 6 - Procedures to Enforce Local Regulations

Answer: 24

121. PROC 24 - Challenge Unescorted Visitors

Answer: 33

122. PROC 25 - Escort Procedures

Answer: 33

123. REL 13 - Periodic Validation of Hardware and Firmware

Answer: 33

124. REL 14 - Testing Security Mechanisms

Answer: 33

125. REL 15 - Operating System free from Tampering

Answer: 33

126. TRAIN 13 - Group Course for Security Staff

Answer: 33

127. AC 3 - Authorizing Access

Answer: 6*

128. AC 4 - Visitor Logs

Answer: 5*

129. AC 5 - Controls on Media

Answer: 45

130. ACC 5 - Control over material and equipment

Answer: 54

131. ACC 6 - Individual Identification

Answer: 56

132. COMPL 4 - Verification of Markings/Expectations

Answer: 67

133. COMPL 5 - Matching Configuration to Environment

Answer: 55

134. COMPL 6 - Verification of Authenticity of Software

Answer: 36

135. C.PLAN 5 - Plans for Computer Failure

Answer: 55

136. C.PLAN 6 - Duplication of Systems

Answer: Not Applicable

137. C.PLAN 7 - Fireproof Storage Facilities

Answer: Don't Know

138. C.PLAN 8 - Alternate Sites

Answer: Not Applicable

139. D.INTEG 2 - Data Validation in Media Transfer

Answer: Don't Know

140. DISC 1 - Hiding Passwords when Entered

Answer: 56

141. DISC 2 - Maintenance Personnel

Answer: 77

142. EVAL 3 - Design Reviews on Applications

Answer: Don't Know

143. EVAL 4 - Determining Criticality

Answer: Not Applicable

144. EVAL 5 - Risk Analysis for new Installations

Answer: Don't Know

145. EVAL 6 - Risk Analysis on Changes to Software/Hardware

Answer: Don't Know

146. MAINT 2 - Labeling Electrical Switches etc.

Answer: 44

147. MAINT 3 - Preventative Maintenance

Answer: Don't Know

148. MAINT 4 - Media Cleaning and Maintenance

Answer: 44

149. MAINT 5 - Quarterly Printer Maintenance

Answer: Don't Know

150. ORG 4 - Separation of Duties

Answer: 44

151. POL 7 - Testing of Changes to Software

Answer: 4*

152. PROC 5 - Protecting Operational Data during Testing

Answer: 4*

153. PROC 6 - input/output Controls for Data/Printouts/Media

Answer: 4*

154. PROC 7 - Operating procedures to Minimize Errors

Answer: 65

155. REL 2 - Mainframe Reliability and Availability

Answer: 56

156. REL 3 - Training to Reduce Data Errors

Answer: 7*

157. TRAIN 6 - User Familiarization Training

Answer: 7*

158. AC 6 - Access only to Relevant Data

Answer: 76

159. AC 7 - Program Fund Diversion Control

Answer: 79

160. AC 9 - Access only to Relevant Systems and Applications

Answer: 44

161. ACC 7 - Control Access to Forms

Answer: 34

162. ACC 8 - Securing Negotiable Instruments

Answer: 23

163. APPL 1 - Securing Site-Specific Applications

Answer: 32

164. COMPL 7 - Policy Violation Action and Reporting

Answer: 12

165. COMPL 8 - Review Reports of Policy Violation

Answer: 11

166. ORG 5 - Federal Reporting Requirements

Answer: 10*

167. POL 8 - Staff responsible for Security Incident Follow-up

Answer: 100

168. POL 9 - Work Area Security Procedures Prescribed

Answer: 56

169. POL 10 - Employee Data Security Affirmation

Answer: 45

170. PROC 8 - Remote Facility Security Responsibility

Answer: 67

171. PROC 9 - Reporting Security Abnormalities

Answer: 22

172. TRAIN 7 - Program Security Rep. Awareness

Answer: Don't Know

173. TRAIN 8 - Office of Data Security Awareness

Answer: Don't Know

174. AC 10 - Formal requests for access to Classified Files

Answer: Not Applicable

175. COMPL 9 - Annually Verified Inventories of Classified Devices

Answer: Don't Know

176. DISC 3 - Timely Disconnection of dial up Access

Answer: 34

177. DISC 4 - AUTODIN interfacing

Answer: 33

178. DISC 5 - Semi-Annually Verified Inventories of Classified Devices

Answer: 22

179. DISC 6 - Guidelines for De-classifying Equipment

Answer: 45

180. DISC 7 - Full requirements for De-classifying ADP Equipment

Answer: 66

181. DISC 8 - Erasing Magnetic Media

Answer: 76

182. DISC 9 - Working Papers Appropriately Marked

Answer: 66

183. EVAL 7 - Handling STE Results

Answer: 66

184. LABEL 1 - Marking Printed Listings

Answer: 77

185. TEMP 1 - TEMPEST evaluation

Answer: 76

186. TEMP 2 - TEMPEST Compliance

Answer: 55

187. TEMP 3 - TEMPEST applied to ADP equipment

Answer: 78

188. AC 32 - Changing Passwords

Answer: 70

189. ACC 17 - Data File Accountability

Answer: 100

190. DISC 12 - Protect Network System Files

Answer: Not Applicable

191. DOC 2 - Secure Unused Documentation

Answer: Don't Know

192. FIRE 22 - Adequate Fire Protection for Network Facilities

Answer: 33

193. POL 14 - Written Policy for Backup

Answer: 44

194. AC 11 - Mission-critical AIS Resources

Answer: 5*

195. AC 12 - Insecurity of Dial-up Comms

Answer: 3*

196. AC 13 - Precautions for Network Protection

Answer: 5*

197. AC 14 - Use Passwords for Network Access

Answer: 35

198. AC 15 - Secure Location for Comms Equipment

Answer: 63

199. ACC 10 - Unique Identification of Comms lines

Answer: 22

200. ADMIN 3 - Prior Written consent for Network Interconnection

Answer: 45

201. D.INTEG 3 - Use of Error Checking on Comms Systems

Answer: 22

202. DISC 10 - Public Comms and Sensitive Data

Answer: 4*

203. EVAL 8 - Approval for new Comms Links

Answer: 34

204. POL 11 - Management Approval for Network Systems

Answer: 35

205. REL 4 - Log-in Data Maintenance

Answer: 36

206. REL 5 - Comms Equipment Location

Answer: 79

207. ADMIN - Establish Risk Management

Answer: Don't Know

208. COMPL - Perform Detailed Risk Analysis

Answer: Not Applicable

209. PROC - Risk Analysis of Environment

Answer: Don't Know

210. REL - Risk Analysis of Hardware

Answer: Not Applicable

211. REL - Risk Analysis of all Interconnections.

Answer: Don't Know

212. POL - Susceptibility to Each Risk

Answer: Not Applicable

213. POL - Definition of "Terms of Sale"

Answer: Don't Know

214. POL - Trading Partner Coordination

Answer: Not Applicable

215. REL - Official Records

Answer: Don't Know

216. PROC - Detect Conflicts

Answer: 44

217. REL - Requirements for Timely Processing

Answer: 45

218. AUD.TR - Audit Trail Effectiveness

Answer: 46

219. D.INTEG - Minimize Data Flow Uncertainty

Answer: 55

220. D.INTEG - Detecting Transaction Changes

Answer: 55

221. AC - Authorized Access

Answer: 55

222. AC - Technological & Procedural Controls

Answer: 44

223. PROC - Prevention of Wiretapping

Answer: 44

224. C.PLAN - Protective Measures

Answer: 33

225. D.INTEG - Name of Message Originator

Answer: 22

226. ACC - Stronger Authentication

Answer: 11

227. C.PLAN - Contingency Plans Developed

Answer: 12

228. POL - Record of Electronic Messages.

Answer: 12

229. D.INTEG - Controls of Unauthorized Modification

Answer: 12

230. AUD.TR - Audit Trail of all Modifications

Answer: 12

231. AUD.TR - Audit Trail Id/Date/Time/Activity

Answer: 12

232. ACC

Answer: 2*

233. PROC - Transaction Agreement

Answer: 1*

234. PROC - Authentication Mechanisms Agreement

Answer: 2*

235. PROC - Message Verification

Answer: 1*

236. COMPL - Digital Signatures Requirement

Answer: 2*

237. APPL - Digital Signature Requirements

Answer: 12

238. DIS - Cryptography When Cost Effective

Answer: 22

239. POL - Non-Cryptographic Methodologies

Answer: 33

240. AC 16 - Door Hinges

Answer: 2*

241. AC 17 - Alarmed and Secure Work Areas

Answer: 3*

242. AC 18 - Well Lighted and Locked Facility

Answer: 2*

243. AC 19 - Separation of Areas from Each Other and Outside

Answer: 3*

244. ADMIN 4 - Furniture and Supplies

Answer: 2*

245. COMPL 10 - Access to Handicapped Personnel

Answer: 3*

246. COMPL 11 - Environmental Hazards

Answer: 2*

247. CONST 1 - Nearby Air Traffic

Answer: 3*

248. CONST 2 - Distance from Industrial Activity

Answer: 2*

249. CONST 3 - Environmental Concerns

Answer: 3*

250. CONST 4 - Perimeter Lighting

Answer: 5*

251. CONST 5 - Low Noise Levels

Answer: 6*

252. CONST 6 - Good Working Light Levels

Answer: 3*

253. CONST 7 - Adequate Electrical Outlets

Answer: 65

254. CONST 8 - Good Temperature Control

Answer: 7*

255. CONST 9 - Adequate Parking

Answer: 7*

256. CONST 10 - Visitor Waiting Areas

Answer: 4*

257. CONST 11 - Safe secure Working Areas

Answer: 45

258. CONST 12 - Water Drainage

Answer: 65

259. CONST 13 - Flood Plains

Answer: 55

260. CONST 14 External Access to the Roof

Answer: 55

261. CONST 15 - Nearby Hazardous Material

Answer: 5*

262. CONST 16 - Protective Covering for Glass Windows

Answer: 5*

263. EM.RESP 2 - Emergency Power Shut-off

Answer: 5*

264. EM.RESP 3 - Adequate Public Address System

Answer: 5*

265. FIRE 4 - Designation of Personnel to assist Evacuation

Answer: 5*

266. FIRE 5 - Inadvertent activation of Fire Suppression Systems

Answer: 5*

267. FIRE 6 - Evacuation Routing for Visitors

Answer: 5*

268. FIRE 7 - Adequate Fire Suppression Equipment

Answer: 5*

269. FIRE 8 - Floor to Ceiling Walls

Answer: 5*

270. FIRE 9 - Periodic Inspection of Fire Equipment

Answer: 5*

271. FIRE 10 - Evacuation Routing

Answer: 5*

272. FIRE 11 - Fire Hydrants

Answer: 5*

273. FIRE 12 - Control Panel for Smoke Detectors

Answer: 5*

274. FIRE 13 - Fire Alarm Pull Boxes

Answer: 5*

275. FIRE 14 - Dampers in Ducting

Answer: 5*

276. FIRE 15 - Adequate Fire Suppression in Computer Room

Answer: 5*

277. FIRE 16 - Fire and Smoke Detection

Answer: Don't Know

278. FIRE 17 - Shut-Off Valve for Fire Suppression System

Answer: Don't Know

279. FIRE 18 - Standards to Include Fire Alarms

Answer: 55

280. FIRE 19 - Adequate Fire Alarm

Answer: 44

281. FIRE 20 - Fire Suppression Systems

Answer: 55

282. FIRE 21 - Fire Alarm Location Awareness

Answer: 44

283. MAINT 6 - Janitorial service

Answer: 5*

284. MAINT 7 - Restroom

Answer: 5*

285. MAINT 8 - Pest Control

Answer: 5*

286. MAINT 9 - Hazard-free Working Area

Answer: 5*

287. MAINT 11 - Preventative Maintenance Program

Answer: 5*

288. MAINT 12 - Adequate Electrical Grounding

Answer: 5*

289. MAINT 13 - Anchoring Carpets

Answer: 5*

290. ORG 6 - Adequate Work Space for Employees

Answer: 4*

291. POL 12 - Space Concerns in Work Environment

Answer: 4*

292. POL 13 - Avoiding Staff Contact with Hostile Clients

Answer: 5*

293. PROC

Answer: 4*

294. REL 6 - Water Detectors

Answer: 35

295. REL 7 - Reliable High Quality Electrical Power

Answer: 4*

296. REL 8 - Independent Power Sources

Answer: 5*

297. REL 9 - Avoiding Accidental Shutdowns

Answer: 4*

298. REL 10 - Adequate electrical Power

Answer: 5*

299. REL 11 Securing Supporting Utilities

Answer: 4*

300. REL 12 - Water Cooling System Protection

Answer: 5*

301. AC - Additional Authentication

Answer: 4*

302. AC - Application Restrictions Via Firewall

Answer: 5*

303. D.INTEG - External Privileges

Answer: 4*

304. AUD.TR - Sharing Audit Trails

Answer: 5*

305. DISC - Audit Trail of External Functions

Answer: 4*

306. D.INTEG - Audit Trail of External Update Access

Answer: 5*

307. AC - Firewall Protection

Answer: 5*

308. PROC - External User Request

Answer: 66

309. AUD.TR - Logs of External Activity.

Answer: 66

310. AUD.TR - Maintain Logs

Answer: 66

311. AC - User Authentication

Answer: 77

312. AC - Minimize External Connections

Answer: 77

313. POL - Authorizing Network Connection

Answer: 77

314. PROC - External User Authorization

Answer: 67

315. PROC - Session Initiation

Answer: 65

316. TRN - External Access

Answer: 45

317. AUD.TR - Log All Activity

Answer: 45

318. REL - Transmitting Controls

Answer: 45

319. APPL - Transmission of Executable Code

Answer: 45

320. PROC - Unsolicited Executable Files

Answer: 23

321. AC - Proxy Server

Answer: 22

322. POL - International Standard 7498-2

Answer: 33

323. TRN - Train Administrators

Answer: 44

324. TRN - Train Users

Answer: 55

325. PROC - Reporting Security Breaches

Answer: 44

326. AC - Blocking Unwanted Logons

Answer: 44

327. AC - Gateway Used for Validation

Answer: 44

328. AC - Anonymous FTP

Answer: 55

329. AC - Disable TFTP

Answer: 55

330. ACC - Record of Patches

Answer: 45

331. ACC - Unsupported Versions

Answer: 34

332. ACC - Install Latest Version of TCP

Answer: 35

333. AC - Implement Trusted Host

Answer: 23

334. ACC - Implementing Patches

Answer: 24

335. ACC - Reporting Incidents

Answer: 33

336. ACC - Virus Checking

Answer: 44

337. D.INTEG - Moving Data

Answer: 55

338. ACC - Communication Line Identification #

Answer: 12

339. AC - Passwords Changed Periodically

Answer: 34

340. AC - Password Modification

Answer: 34

341. AC - Memorizing Passwords

Answer: 23

342. ADMIN - Reviewing Sensitivity

Answer: 66

343. AC - Building Access

Answer: 56

344. AC - Renewed Passwords

Answer: 56

345. ACC - Property Management

Answer: 86

346. ADMIN - IT Security Program

Answer: 87

347. ACC - One Logon Session Per User

Answer: 87

348. PROC - Reporting and Investigating Incidents

Answer: 97

349. ACC - IT Security Individual Accountability

Answer: 87

350. POL - Copyright License

Answer: 98

351. AC - Secure Telecommunications Equipment

Answer: 78

352. PROC - Compliance with Copyright Licenses

Answer: 77

353. AC - Secure Office Areas

Answer: 77

354. ACC - Copyright Licenses

Answer: 88

355. ADMIN - High Retention and Morale

Answer: 77

356. ADMIN - Security Plan Reviewed

Answer: Don't Know

357. ADMIN - Fair Promotions

Answer: Don't Know

358. ADMIN - Conflict of Interest

Answer: Don't Know

359. ADMIN - Retirement Plan

Answer: Don't Know

360. ADMIN - Re-employment

Answer: Not Applicable

361. COMPL - Investigating IT Security Incidents

Answer: Not Applicable

362. POL - Approval for System & Network Changes

Answer: Not Applicable

363. DISC - Secure Communications

Answer: Not Applicable

364. COMPL - Documenting System Changes

Answer: Not Applicable

365. AC - Securing Network Connections

Answer: Not Applicable

366. AC - Interagency Data Protection

Answer: 33

367. AC - Network Passwords

Answer: 3*

368. ADMIN - Interagency Agreements

Answer: 3*

369. ACC - Identifying all Port Connections

Answer: 3*

370. REL - Clean/Cool Communications Area

Answer: 3*

371. EVAL - Risk Analysis on Telecommunications

Answer: 3*

372. COMPL - Implementing Security Controls

Answer: 3*

373. ORG - ITSSO Placement

Answer: 3*

374. COMPL - Periodic Audit Reviews

Answer: 3*

375. AC - Password Protected Screen Saver

Answer: 3*

376. POL - Workstation Security

Answer: 3*

377. POL - Reporting Security Incidents

Answer: 89

378. COMPL - Violation Reporting

Answer: 99

379. ACC - New Communication Links

Answer: 9*

380. PROC - Reporting Security Incidents

Answer: 100

381. COMPL - Reporting to the ITSO

Answer: 5*

382. COMPL - IT Security Requirements

Answer: 5*

383. AC - Restricted User Access

Answer: 5*

384. AC - Uploading & Downloading Data

Answer: 5*

385. COMPL - Virus Detection on File Servers

Answer: 6*

386. COMPL - Life Cycle Management Plan

Answer: 7*

387. ORG - Advanced Technical Solutions

Answer: 8*

388. ADMIN - Defined Operating Procedures

Answer: 5*

389. C.PLAN - Develop & Maintain Disaster Recovery

Answer: 44

390. TRAIN - Security Training Budget

Answer: 5*

391. ADMIN - Formal IT Security Plan

Answer: 55

392. C.PLAN - Managers Contingency Plan Participation

Answer: 66

393. C.PLAN - Off-Site Equipment

Answer: 77

394. POL - Maintain Written IT Security Policy

Answer: 88

395. ORG - IT Security Designation

Answer: 56

396. AC - Cleared Service Personnel

Answer: 45

397. POL - Property Management

Answer: 64

398. POL - Provisions for Data Integrity

Answer: 75

399. ORG - ITSSO Position Description

Answer: 76

400. C.PLAN - Testing Contingency Plan

Answer: 55

401. COMPL - Investigating Security Incidents

Answer: 66

402. ORG - Internal Controls Effective

Answer: Don't Know

403. AC - AC to all Facilities

Answer: Don't Know

404. ORG - Minimum Work Space

Answer: Not Applicable

405. POL - Protecting Sensitive Information

Answer: 12

406. POL - Sensitive Information Storage

Answer: 22

407. PROC - Protecting Sensitive Information

Answer: 22

408. PROC - Data Sensitivity Controls

Answer: 2*

409. AC - Locking Devices

Answer: 2*

410. POL - Key Control Policy

Answer: 2*

411. POL - Password Control

Answer: 2*

412. AC - Unique Identifiers

Answer: 2*

413. AC - Dial Access Lines

Answer: 2*

414. AC - Restricted Line Access

Answer: 2*

415. C.PLAN - Alternate Telecommunications Paths

Answer: 2*

416. PROC - Telecommunications Specialist

Answer: 2*

417. POL - Review Security Policy

Answer: 2*

418. ACC - Data Ownership

Answer: 2*

419. AC 20 - Authorized Access to Areas

Answer: 2*

420. AC 21 - Log Off on Leaving Area

Answer: 33

421. AC 22 - Physical Security of sites

Answer: 44

422. AC 23 - Current Access List for Each Site

Answer: 5*

423. AC 24 - Physical Access Logs

Answer: 6*

424. ACC 11 - Single Workstation Access by Each User

Answer: 5*

425. ACC 12 - No sharing of Codes or Passwords

Answer: 6*

426. ACC 13 - No Lending of Codes or Passwords

Answer: 5*

427. ACC 14 - Unique ID for Printers or Workstations

Answer: 6*

428. COMPL 12 - Work Area Procedures consistent with Organization Plan

Answer: 5*

429. COMPL 13 - Security Officer Appointment

Answer: 6*

430. COMPL 14 - Local Procedures consistent with Organization Plan

Answer: 5*

431. COMPL 15 - Virus Scanning for Imported Software

Answer: 6*

432. COMPL 16 - Internal Virus Detection

Answer: 5*

433. COMPL 17 - External Virus Detection

Answer: 6*

434. DISC 11 - Secure Area

Answer: 5*

435. LABEL 2 - Unique ID for Printers and Workstations

Answer: 6*

436. PROC 11 - Full Implementation of Security Procedures

Answer: 5*

437. PROC 12 - Procedures for Incidents at Remote Sites

Answer: 6*

438. T.SITE 1 - Securing Work Areas

Answer: 5*

439. T.SITE 2 - Monitoring by Security Staff

Answer: 6*

440. T.SITE 3 - Monitoring by Security Office

Answer: 5*

441. AC 1 - Security Notified of Impending Employee Termination

Answer: 6*

ВЫВОДЫ

В ходе лабораторной работы была изучена оценка безопасности предприятия с помощью ПО Risk Watch. Автоматически сгенерирован отчёт с помощью контекстного меню.

Соседние файлы в папке лаба_10