ACP 122 (F) - Multilateral Planners Conference
ACP 122 (F) - Multilateral Planners Conference
ACP 122 (F) - Multilateral Planners Conference
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
UNCLASSIFIED<br />
<strong>ACP</strong> <strong>122</strong>(F)<br />
MEASURES REQUIRED ............................................................................................................................... 5-2<br />
COMPUTER NETWORK DEFENCE (CND) ................................................................................................ 5-3<br />
CHAPTER 6............................................................................................................................................................. 6-4<br />
VERIFICATION ACTIVITIES ............................................................................................................6-4<br />
OVERVIEW .................................................................................................................................................... 6-4<br />
NATIONAL MAPPING .................................................................................................................................. 6-4<br />
VULNERABILITY ANALYSIS (VA) ........................................................................................................... 6-4<br />
VA ACTIVITY LEVELS ................................................................................................................................6-5<br />
ACTIVE VULNERABILITY ASSESSMENT................................................................................................ 6-5<br />
VULNERABILITY ASSESSMENT ............................................................................................................... 6-5<br />
TELECOMMUNICATIONS SECURITY MONITORING............................................................................ 6-7<br />
POLICY ........................................................................................................................................................... 6-7<br />
TECHNICAL SECURITY INSPECTIONS .................................................................................................... 6-7<br />
CHAPTER 7............................................................................................................................................................. 7-1<br />
SECURITY ARCHITECTURE ............................................................................................................7-1<br />
OVERVIEW .................................................................................................................................................... 7-1<br />
POLICY ........................................................................................................................................................... 7-1<br />
NATIONAL MAPPING .................................................................................................................................. 7-1<br />
INTERCONNECTION SCENARIOS............................................................................................................. 7-2<br />
CHAPTER 8............................................................................................................................................................. 8-1<br />
COMMUNICATIONS SECURITY......................................................................................................8-1<br />
OVERVIEW .................................................................................................................................................... 8-1<br />
PRINCIPLE ..................................................................................................................................................... 8-1<br />
CRYPTOGRAPHIC SECURITY (CRYPTOSEC) ......................................................................................... 8-1<br />
NATIONAL MAPPING .................................................................................................................................. 8-1<br />
TRANSMISSION SECURITY (TRANSEC).................................................................................................. 8-2<br />
TRANSEC SCOPE.......................................................................................................................................... 8-2<br />
TRANSEC MEASURES ................................................................................................................................. 8-2<br />
NETWORK SECURITY (NETSEC)............................................................................................................... 8-3<br />
NETSEC MEASURES .................................................................................................................................... 8-3<br />
INTEROPERABILITY CONCERNS.............................................................................................................. 8-4<br />
CHAPTER 9............................................................................................................................................................. 9-1<br />
CCEB GUIDANCE ON SECURITY LABELLING .............................................................................9-1<br />
INTRODUCTION ........................................................................................................................................... 9-1<br />
AIM.................................................................................................................................................................. 9-1<br />
SCOPE ............................................................................................................................................................. 9-1<br />
SECURITY LABEL ELEMENTS................................................................................................................... 9-1<br />
POLICY IDENTIFIER. ................................................................................................................................... 9-1<br />
CLASSIFICATION. ........................................................................................................................................ 9-2<br />
CATEGORIES................................................................................................................................................. 9-2<br />
COUNTRY CODES. ....................................................................................................................................... 9-3<br />
INTERNATIONAL DEFENCE ORGANISATIONS. .................................................................................... 9-3<br />
LABEL STRUCTURE. ................................................................................................................................... 9-3<br />
CONCLUSION................................................................................................................................................ 9-4<br />
x<br />
UNCLASSIFIED<br />
Original