About this Guide

This security guide is based on an organizational framework and core content developed at the Security Research Center of the Defense Security Service. The core content is Unclassified and has been approved for public release by the Department of Defense.

The core program (Version 99.7) has been customized and enhanced to reflect the specific procedures, policies and needs of USASMDC. 

Comments and questions concerning this guide should be directed to Brenda Turner.

Privacy Notice

This program uses software that creates summary statistics on how frequently the program and various files within it are accessed. The purpose is to help improve the program. The statistics show how often the program is used and what information is of greatest or least interest, identify system performance problems, or help determine technical design specifications. No attempt is made to identify individual users or their usage habits. Raw data logs that do contain such information are scheduled for regular destruction in accordance with National Archives and Records Administration guidelines.

Unauthorized attempts to upload information or change information in this program are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1987 and the National Information Infrastructure Protection Act.

Credits

This program builds on briefings, brochures and articles developed by individuals and organizations throughout the the U.S. Government security community. Their contributions are greatly appreciated, as are the comments of the dozens of people throughout the security community who reviewed the core program and provided input to make it better.

 

HOME      |      HELP

SECURITYTHREATS | TECH VULNERABILITYASSISTANCE | SPY STORIES | TREASON 101