16.10.2014 Views

DoD Instruction 8500.2 - Common Access Card (CAC)

DoD Instruction 8500.2 - Common Access Card (CAC)

DoD Instruction 8500.2 - Common Access Card (CAC)

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

DODI <strong>8500.2</strong>, February 6, 2003<br />

E2.1.47.1. High Robustness. Security services and mechanisms that provide<br />

the most stringent protection and rigorous security countermeasures.<br />

E2.1.47.2. Medium Robustness. Security services and mechanisms that<br />

provide for layering of additional safeguards above good commercial practices.<br />

E2.1.47.3. Basic Robustness. Security services and mechanisms that equate<br />

to best commercial practices (reference (a)).<br />

E2.1.48. Safeguard<br />

E2.1.48.1. A protection included to counteract a known or expected condition.<br />

E2.1.48.2. An incorporated countermeasure or set of countermeasures within<br />

a base release.<br />

E2.1.49. Security Target. Set of security requirements and specifications to be<br />

used as the basis for evaluation of an identified IA or IA-enabled product and its<br />

associated administrator and user guidance documentation.<br />

E2.1.50. Sensitive Compartmented Information (SCI). Classified information<br />

concerning or derived from intelligence sources, methods, or analytical processes, that<br />

is required to be handled within formal access control systems established by the<br />

Director of Central Intelligence (reference (a)).<br />

E2.1.51. Sensitive Information. Information, the loss, misuse, or unauthorized<br />

access to or modification of, could adversely affect the national interest or the conduct<br />

of Federal programs, or the privacy to which individuals are entitled under Section 552a<br />

of title 5, United States Code, "The Privacy Act" (reference (z)), but which has not been<br />

specifically authorized under criteria established by Executive order or an Act of<br />

Congress to be kept secret in the interest of national defense or foreign policy.<br />

(Section 278g-3 of title 15, United States Code, "The Computer Security Act of 1987"<br />

(reference (aa)). Examples of sensitive information include, but are not limited to<br />

information in <strong>DoD</strong> payroll, finance, logistics, and personnel management systems.<br />

Sensitive information sub-categories include, but are not limited to, the following:<br />

E2.1.51.1. For Official Use Only (FOUO). In accordance with <strong>DoD</strong> 5400.7-R<br />

(reference (ab)), <strong>DoD</strong> information exempted from mandatory public disclosure under<br />

the Freedom of Information Act (FOIA) (reference (ac)).<br />

24 ENCLOSURE 2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!