亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? computer security_2.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
               National Agency Check Inquiries (NACI) are required for all               employees but have not been completed for everyone having               access to sensitive information.  Expected operational date -               October 1989.               DEVELOPMENT CONTROLS                                                            In Place                                     In Place    Planned    & Planned   N/A                                     --------    -------    ---------   ---               Security               Specifications            [X]         [ ]         [ ]      [ ]               Design Review               & Testing                 [ ]         [ ]         [ ]      [X]               Certification/               Accreditation             [ ]         [X]         [ ]      [ ]               (Note:  No information is given for certification/               accreditation.  OMB Bulletin 88-16 states that a general               description of the planned measures and expected operational               dates should be provided.)                                         18                 APPENDIX III                                    APPENDIX III               OPERATIONAL CONTROLS                                                             In Place                                      In Place    Planned    & Planned   N/A                                      --------    -------    ---------   ---               Production, I/O Controls  [X]         [ ]         [ ]      [ ]               Contingency Planning      [ ]         [X]         [ ]      [ ]               A contingency plan is being developed in compliance with               requirements established by the agency's security program.               Completion date - November 1990.               Audit and Variance               Detection                 [ ]         [ ]         [X]      [ ]               Day-to-day procedures are being developed for variance               detection.  Audit reviews are also being developed and will be               conducted on a monthly basis.  Completion date - June 1989.               Software Maintenance               Controls                  [X]         [ ]         [ ]      [ ]               Documentation             [X]         [ ]         [ ]      [ ]               SECURITY AWARENESS AND TRAINING                                                              In Place                                       In Place    Planned    & Planned   N/A                                       --------    -------    ---------   ---               Security Awareness and               Training Measures         [ ]         [ ]         [X]      [ ]               Training for management and users in information and               application security will be strengthened, and security               awareness training provided for all new employees beginning in               June 1989.                                         19                 APPENDIX III                                    APPENDIX III               TECHNICAL CONTROLS                                                              In Place                                       In Place    Planned    & Planned   N/A                                       --------    -------    ---------   ---               User Identification and               Authentication            [X]         [ ]         [ ]      [ ]               Authorization/Access               Controls                  [X]         [ ]         [ ]      [ ]               Data Integrity &               Validation Controls       [X]         [ ]         [ ]      [ ]               Audit Trails & Journaling [X]         [ ]         [ ]      [ ]               SUPPORT SYSTEM SECURITY MEASURES                                                              In Place                                       In Place    Planned    & Planned   N/A                                       --------    -------    ---------   ---               Security Measures for               Support Systems           [X]         [ ]         [ ]      [ ]          4.   NEEDS AND ADDITIONAL COMMENTS               (Note:  This section was left blank in most plans.  OMB               Bulletin 88-16 stated that the purpose of this section was to               give agency planners the opportunity to include comments               concerning needs for additional guidance, standards, or other               tools to improve system protection.)                                         20          APPENDIX IV                                             APPENDIX IV                     NIST/NSA FEEDBACK ON COMPUTER SECURITY PLANS                     --------------------------------------------          The following example shows typical NIST/NSA comments and          recommendations.          COMPUTER SECURITY PLAN REVIEW PROJECT COMMENTS AND RECOMMENDATIONS                                     REF. NO. 0001          AGENCY NAME:  Department of X                        Subagency Y          SYSTEM NAME:  Automated Report Management System          The brevity of information in the information sensitivity, general          system description, and the system environment sections made it          difficult to understand the security needs of the system.          Information on the physical, operational, and technical environment          and the nature of the sensitivity is essential to understanding the          security needs of the system.          For some controls, such as security training and awareness,          expected operational dates are not indicated as required by OMB          Bulletin 88-16.          The plan refers to the development control, design review and          testing, as not applicable.  Even in an operational system,          development controls should be addressed as historical security          measures and as ongoing measures for changing hardware and          software.          The plan notes that a more formal risk assessment is being planned.          This effort should help your organization more effectively manage          risks and security resources.  National Institute of Standards and          Technology Federal Information Processing Standards Publication 65,          "Guideline for Automatic Data Processing Risk Analysis," and 73,          "Guideline for the Security of Computer Applications" may be of          help in this area.                                         21          APPENDIX V                                               APPENDIX V                      STATUS OF SECURITY CONTROLS IN 1,542 PLANS                      ------------------------------------------                                                          Planned &                                 Plan         In place    in place    Planned                                 ----         --------    ---------   -------    Security controls            responses#a  (percent)   (percent)   (percent)    Management controls    Assignment of security    responsibility               1,448        91           5          4    Personnel selection and    screening                    1,268        84          11          5    Risk analysis and    sensitivity assessment       1,321        71          13         17    Development controls    Design review and testing      728        82          10          8    Certification and    accreditation                  948        66          10         24    Security and acquisition    specifications               1,093        83          10          7    Operational controls    Audit and variance    detection                    1,177        81           7         12    Documentation                1,375        83          10          8    Emergency, backup, and    contingency planning         1,381        69          14         17    Physical and environmental    protection                     450        87          10          4    Production and input/    output controls              1,290        87           7          7    Software maintenance    controls                     1,327        87           7          7    Security training and    awareness measures           1,408        58          27         15                                         22          APPENDIX V                                               APPENDIX V    Technical controls    Authorization/access    controls                     1,389        87           6          7    Confidentiality controls       357        84           7          9    Audit trail mechanisms       1,194        83           8          9    Integrity controls           1,220        85           8          7    User identification    and authentication           1,370        87           7          6    Weighted average               --         81          10         10    Note:  The status of security controls is based on information reported    in 1,542 civilian plans in early 1989 and contained in the NIST/NSA data    base.  Missing and not applicable answers were not included in the    percentages.  Some percentages do not add up to 100 due to rounding.   a"Plan responses" is the number of plans, out of 1,542, that addressed    each control.                                         23    APPENDIX VI                                                   APPENDIX VI                        MAJOR CONTRIBUTORS TO THIS REPORT                        ---------------------------------    INFORMATION MANAGEMENT AND TECHNOLOGY DIVISION, WASHINGTON, D.C.    ----------------------------------------------------------------    Linda D. Koontz, Assistant Director    Jerilynn B. Hoy, Assignment Manager    Beverly A. Peterson, Evaluator-in-Charge    Barbarol J. James, Evaluator    (510465)                                         24                              RELATED GAO PRODUCTS                              --------------------    Computer Security:  Identification of Sensitive Systems Operated on    Behalf of Ten Agencies (GAO/IMTEC-89-70, Sept. 27, 1989).    Computer Security:  Compliance With Security Plan Requirements of the    Computer Security Act (GAO/IMTEC-89-55, June 21, 1989).    Computer Security:  Compliance With Training Requirements of the    Computer Security Act of 1987 (GAO/IMTEC-89-16BR, Feb. 22, 1989).    Computer Security:  Status of Compliance With the Computer Security Act    of 1987 (GAO/IMTEC-88-61BR, Sept. 22, 1988).                                         25

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
美女网站在线免费欧美精品| 久久久久久久一区| av中文字幕亚洲| 国产乱码精品一区二区三区av| 久久精工是国产品牌吗| 日本亚洲一区二区| 秋霞午夜鲁丝一区二区老狼| 亚洲福利视频一区| 丝袜美腿亚洲色图| 亚洲一二三四在线| 亚洲五码中文字幕| 秋霞电影一区二区| 麻豆一区二区99久久久久| 久久激五月天综合精品| 狠狠狠色丁香婷婷综合久久五月| 麻豆中文一区二区| 国产一区二区三区在线看麻豆| 久久99精品一区二区三区三区| 国产呦精品一区二区三区网站 | 国产一区二区三区日韩| 久久不见久久见免费视频7| 久久97超碰色| 成人深夜在线观看| 99re热视频这里只精品| 99国产精品久久| 欧美色综合网站| 欧美高清dvd| 精品国产乱码久久久久久夜甘婷婷| 精品福利在线导航| 国产精品久久久久久久久久久免费看| 中文字幕一区二区三区不卡在线| 亚洲精品国久久99热| 天堂av在线一区| 国产一区二区成人久久免费影院| 成人激情小说乱人伦| 久久精品水蜜桃av综合天堂| 中文字幕一区av| 亚洲一卡二卡三卡四卡| 韩国欧美国产1区| 成人app下载| 欧美福利一区二区| 亚洲国产精品二十页| 亚洲自拍偷拍网站| 国产一区二区不卡| 色综合天天综合网天天看片| 在线成人小视频| 中文字幕欧美日本乱码一线二线| 玉足女爽爽91| 国产麻豆精品theporn| 91小视频免费观看| 日韩欧美成人午夜| 亚洲精品菠萝久久久久久久| 人禽交欧美网站| 91在线视频播放| 欧美成人a∨高清免费观看| 一色屋精品亚洲香蕉网站| 蜜桃视频第一区免费观看| 99视频在线精品| 精品国产一区二区三区四区四| 国产精品传媒在线| 久久丁香综合五月国产三级网站| 不卡欧美aaaaa| 日韩丝袜情趣美女图片| 亚洲欧美视频在线观看视频| 久久超碰97中文字幕| 色www精品视频在线观看| 精品久久久影院| 亚洲成人精品一区二区| 国产v日产∨综合v精品视频| 666欧美在线视频| 亚洲婷婷在线视频| 国产综合色视频| 91麻豆精品久久久久蜜臀| 亚洲日本电影在线| 国产精品资源网| 欧美一区二区免费视频| 亚洲精品大片www| av电影一区二区| 国产嫩草影院久久久久| 精品一二三四在线| 8x8x8国产精品| 亚洲制服丝袜一区| 99re在线精品| 国产精品蜜臀在线观看| 激情综合亚洲精品| 日韩一级高清毛片| 日韩精品一卡二卡三卡四卡无卡| 色婷婷精品大在线视频| 国产精品免费久久| 成人三级伦理片| 久久午夜色播影院免费高清| 美女一区二区在线观看| 欧美日本在线视频| 亚洲6080在线| 欧美日韩大陆在线| 亚洲成av人片在线观看无码| 91久久线看在观草草青青| 亚洲视频一区二区在线观看| 国产精品白丝jk黑袜喷水| www国产成人| 国产精品白丝av| 久久久美女毛片| 高清不卡在线观看av| 久久久久久久电影| 国产精品一区二区在线播放| 精品国产制服丝袜高跟| 国产又粗又猛又爽又黄91精品| 精品日韩一区二区三区 | 欧美日韩性生活| 亚洲一区二区成人在线观看| 欧美影院精品一区| 天天综合天天综合色| 欧美美女一区二区三区| 肉肉av福利一精品导航| 日韩一区二区视频| 九九久久精品视频| 国产夜色精品一区二区av| 成人免费视频视频| 亚洲视频综合在线| 在线观看亚洲专区| 日本v片在线高清不卡在线观看| 欧美一级xxx| 国产一区二区三区在线观看免费 | 日本一区中文字幕| 欧美成人a在线| 夫妻av一区二区| 1区2区3区精品视频| 欧美系列日韩一区| 奇米一区二区三区av| 久久久国产一区二区三区四区小说| 国产精品77777竹菊影视小说| 国产精品丝袜一区| 欧美在线一二三| 久久国产精品无码网站| 国产精品毛片无遮挡高清| 色哦色哦哦色天天综合| 日产欧产美韩系列久久99| 欧美tk丨vk视频| jizz一区二区| 五月天婷婷综合| 久久久久久电影| 色婷婷综合五月| 六月婷婷色综合| 中文字幕乱码亚洲精品一区| 91激情五月电影| 久久精品99国产国产精| 亚洲欧洲www| 91麻豆精品国产91久久久| 国产成人aaa| 亚洲成人tv网| 国产亚洲欧美日韩日本| 欧美午夜不卡视频| 国产精品资源站在线| 亚洲国产va精品久久久不卡综合| 精品国产99国产精品| 一本大道综合伊人精品热热 | 欧美一级日韩一级| 成人晚上爱看视频| 香蕉影视欧美成人| 国产精品久久精品日日| 欧美精品粉嫩高潮一区二区| 成人精品免费看| 日韩高清不卡在线| 亚洲欧美怡红院| 精品成人私密视频| 欧美日韩精品专区| 粉嫩av亚洲一区二区图片| 天堂影院一区二区| 亚洲欧洲国产专区| 久久蜜桃av一区二区天堂 | 国产婷婷一区二区| 7777精品伊人久久久大香线蕉经典版下载 | 337p日本欧洲亚洲大胆色噜噜| 91在线丨porny丨国产| 激情综合色综合久久综合| 亚洲一区欧美一区| 国产欧美日韩亚州综合| 日韩一级黄色大片| 欧美午夜寂寞影院| 99久久99久久综合| 国产成人三级在线观看| 免费不卡在线观看| 亚洲午夜在线电影| 亚洲美女屁股眼交| 国产精品免费久久久久| 26uuu国产一区二区三区| 欧美日韩日日摸| 色香色香欲天天天影视综合网| 国产成人综合亚洲网站| 免费成人美女在线观看| 丝袜美腿亚洲色图| 亚洲成人手机在线| 亚洲一区精品在线| 亚洲欧美另类图片小说| 欧美国产乱子伦| 国产亚洲综合在线| 久久久久久久精| 久久久噜噜噜久久人人看| xnxx国产精品| 精品不卡在线视频|