16.10.2014 Views

DoD Instruction 8500.2 - Common Access Card (CAC)

DoD Instruction 8500.2 - Common Access Card (CAC)

DoD Instruction 8500.2 - Common Access Card (CAC)

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

DODI <strong>8500.2</strong>, February 6, 2003<br />

way to assess and specify IA across multiple, interconnecting <strong>DoD</strong> information systems<br />

and to ensure that they take advantage of supporting IA infrastructures.<br />

E2.1.25. IA Certification and Accreditation (IA C&A). The standard <strong>DoD</strong> approach<br />

for identifying information security requirements, providing security solutions, and<br />

managing the security of <strong>DoD</strong> information systems.<br />

E2.1.26. IA Control. An objective IA condition of integrity, availability, or<br />

confidentiality achieved through the application of specific safeguards or through the<br />

regulation of specific activities that is expressed in a specified format (i.e., a control<br />

number, a control name, control text, and a control class). Specific management,<br />

personnel, operational, and technical controls are applied to each <strong>DoD</strong> information<br />

system to achieve an appropriate level of integrity, availability, and confidentiality in<br />

accordance with OMB Circular A-130 (reference (v)).<br />

E2.1.27. IA Manager (IAM). The individual responsible for the information<br />

assurance program of a <strong>DoD</strong> information system or organization. While the term IAM<br />

is favored within the Department of Defense, it may be used interchangeably with the IA<br />

title Information Systems Security Manager (ISSM).<br />

E2.1.28. IA Officer (IAO). An individual responsible to the IAM for ensuring that<br />

the appropriate operational IA posture is maintained for a <strong>DoD</strong> information system or<br />

organization. While the term IAO is favored within the Department of Defense, it may<br />

be used interchangeably with other IA titles (e.g., Information Systems Security Officer,<br />

Information Systems Security Custodian, Network Security Officer, or Terminal Area<br />

Security Officer).<br />

E2.1.29. IA Product. Product or technology whose primary purpose is to provide<br />

security services (e.g., confidentiality, authentication, integrity, access control or<br />

non-repudiation of data); correct known vulnerabilities; and/or provide layered defense<br />

against various categories of non-authorized or malicious penetrations of information<br />

systems or networks. Examples include such products as data/network encryptors,<br />

firewalls, and intrusion detection devices (reference (a)).<br />

E2.1.30. IA-Enabled Product. Product or technology whose primary role is not<br />

security, but which provides security services as an associated feature of its intended<br />

operating capabilities. Examples include such products as security-enabled web<br />

browsers, screening routers, trusted operating systems, and security-enabled messaging<br />

systems (reference (a)).<br />

20 ENCLOSURE 2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!