REVIEW FOR EXISTING LESSON PLANS FOR COMPUTER SECURITY COURSES
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP89B01354R000200310016-9
Release Decision:
RIPPUB
Original Classification:
U
Document Page Count:
3
Document Creation Date:
December 27, 2016
Document Release Date:
January 30, 2013
Sequence Number:
16
Case Number:
Publication Date:
September 8, 1977
Content Type:
MEMO
File:
Attachment | Size |
---|---|
![]() | 136.26 KB |
Body:
Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310016-9
UNCLASSIFIED
8 September 1977
STAT
TO: (Chairman
DCI Computer Security. Subcommittee
National Security Agency
Fort Meade, Maryland 20755
FROM: Mr. George S. Herrmann, State MemberoS,_
DCI Computer Security Subcommittee
U.S. Department of State
Washington, D.C. 20520
SUBJ: Review of Existing Lesson Plans for Computer Security
Courses
During the week of August 29 through September 2 1977, I reviewed
three lesson plans developed for computer security training courses.
These courses are taught by the National Security Agency at Ft.
Meade, by the U.S. Army Logistics Management Center at Ft. Lee,
Virginia, and by the Department of Defense Computer Institute in
Washington, D.C. The objective of my study was to determine the
degree to which these courses overlap, and to glean from the overlap
a basic structure for a course in computer security which might be
established for interagency participation under the auspices of
the Computer Security Subcommittee.
As might be expected, there were a number of topics common to all
three courses: these are listed in Annex A. Several topics were
common to two of the three courses; these appear in Annex B. Some
topics were unique to each course: I found these to be the most
interesting topics, and have included them in Annex C.
The DODCI course-is a four-day offering, aimed apparently at mid-
level management. The NSA and Ft. Lee courses last, respectively,
one week and two weeks. These relatively long course times allow
student resolution of class problems at NSA and problem workshops
at Ft. Lee. These practical exercises strike me as valuable
training tools which help reinforce security practices presented
in the lecture courses.
Ft. Lee brings in guest speakers from private industry`to lecture
on the strengths and weaknesses of various computer systems. I was
unable to determine whether Ft. Meade does this or not, but I forsee
some scheduling problems with this approach.
UNCLASSIFIED
Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310016-9
Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310016-9
2 U
The Ft. Lee course features 5 1/2 hours of instruction on computer
fraud. It is my opinion that this course might be of interest to
the Department of the Treasury and FBI representatives to the
Subcommittee, if they have not already taken the course.
Conclusions: The Ft. Lee and DODCI courses are open to personnel
from other government agencies on a space available basis; this is
presumably true of the course at NSA. The existing courses seem
adequate: I believe that it would be premature at this point to
establish a separate interagency computer security course unless
there are important topics of concern to us which are not taught
by the existing schools. I suspect that there are.additional
computer security courses available at other government agencies
of which I am presently unaware, and that the cirreculums for these
courses should be reviewed before we consider establishing a new
course geared expressly to the needs of the Intelligence Community.
I do recommend that Annex A to this paper, listing topics common
to the three courses I examined., should serve as a starting point
for any computer security course we consider creating. I would also
suggest that the administrative office for each of the three schools
be asked to keep the Chairman, CSS informed of their projected
class schedules, so that Subcommittee members may propose personnel
for these courses in advance of course starting dates.
With the permission of the Chairman, I will continue to make the
rounds of government agencies offering computer security courses
in an effort to compile a more complete list of course offerings.
When I have what I feel is a complete list, I will again compare
cirreculums. I would hope that the Subcommittee, in reviewing
the final list of course offerings, can uncover areas of concern
to the Intelligence Community that are not offered by an existing
school. In my opinion, we should then pursue topics of concern
to us for which no instruction is currently available.
Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310016-9
Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310016-9
ANNEX A 3
TOPICS COMMON TO ALL THREE COURSES
Course Orientation
Documentation Guidelines, Regulations and Requirements
Computer Security Analysis and Design
Physical Security Considerations
Personnel Security Considerations
Privacy Act Requirements
Computer System Auditing
Data Base Integrity
Commencement Exercises
Declassified in Part - Sanitized Copy Approved for Release 2013/01/30: CIA-RDP89B01354R000200310016-9