01.01.2015 Views

Information Security Warfare Systems - CTC Bremerton Instructional ...

Information Security Warfare Systems - CTC Bremerton Instructional ...

Information Security Warfare Systems - CTC Bremerton Instructional ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ADL SCORM 2004 Demonstration: ISWS Course Conversion Lessons Learned<br />

TECHNICAL ACTIVITY TREE PART II<br />

Sequencing Control Mode: Flow = true, Choice =<br />

true, ChoiceExit = true, forward only = false<br />

Rollup Rules:<br />

Precondition Rules: skip if satisfied, hidden if<br />

satisfied<br />

targetObjectiveID = obj_1, 2…6<br />

Attack*<br />

-- Description<br />

Protection Safeguards<br />

-- Safeguard<br />

-- Safeguard<br />

Detection Safeguards<br />

-- Safeguard<br />

-- Safeguard<br />

Assessment Safeguards<br />

-- Safeguard<br />

-- Safeguard<br />

Recovery Safeguards<br />

-- Safeguard<br />

-- Safeguard<br />

Treatment Safeguards<br />

-- Safeguard<br />

-- Safeguard<br />

targetObjectiveID = obj_1, 2…6<br />

Sequencing Control Mode: Flow = true, Choice =<br />

true, ChoiceExit = true, forward only = false<br />

Rollup Rules:<br />

Precondition Rules: skip if satisfied, hidden if<br />

satisfied<br />

<strong>CTC</strong> <strong>Bremerton</strong>, May 14, 2004 14

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!