11.12.2012 Views

DEFENSE SWITCHED NETWORK INFORMATION ASSURANCE ...

DEFENSE SWITCHED NETWORK INFORMATION ASSURANCE ...

DEFENSE SWITCHED NETWORK INFORMATION ASSURANCE ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

TABLE OF CONTENTS (continued)<br />

iv<br />

Page<br />

Internet Protocol Interface Identification............................................................... E-70<br />

System Under Test (SUT) Test Procedures......................................................... E-71<br />

Institute For Security And Open Methodologies Open Source Security Testing<br />

Methodology Manual Procedures For Systems Service Identification.................. E-80<br />

Institute For Security And Open Methodologies Open Source Security Testing<br />

Methodology Manual Procedures For Internet Application Testing ...................... E-82<br />

Spectra Training Guide for SS7 and ISDN Protocols ........................................... E-84<br />

DoD <strong>INFORMATION</strong> <strong>ASSURANCE</strong> CERTIFICATION AND ACCREDITATION<br />

PROCESS (DIACAP) PACKAGE............................................................................F-1<br />

DoD Information Systems .......................................................................................F-1<br />

Accreditation Steps .................................................................................................F-2<br />

APPENDICES<br />

ACRONYMS .......................................................................................................... A-1<br />

REQUIREMENTS .................................................................................................. B-1<br />

TEST PREPARATION DOCUMENTS ................................................................... C-1<br />

DSN ARCHITECTURE........................................................................................... D-1<br />

ASSESSMENT OBJECTIVES, CRITERIA, PROCEDURES,<br />

AND DATA REQUIRED....................................................................................... E-1<br />

DoD <strong>INFORMATION</strong> <strong>ASSURANCE</strong> CERTIFICATION AND ACCREDITATION<br />

PROCESS (DIACAP) PACKAGE.........................................................................F-1<br />

REFERENCES.......................................................................................................G-1<br />

POINTS OF CONTACT.......................................................................................... H-1<br />

LIST OF FIGURES<br />

1. APL Certification Process Flow .............................................................................5<br />

2. Sample Diagram....................................................................................................7<br />

B-1. IASE Website................................................................................................. B-5<br />

B-2. NSA Website ................................................................................................. B-6<br />

B-3. Toggle Buttons............................................................................................. B-10<br />

D-1. DNS Architecture........................................................................................... D-1<br />

E-1. Information Assurance STIG Testing Process............................................... E-1<br />

E-2. Security Configuration and Analysis .............................................................. E-6<br />

E-3. Configure Your Computer.............................................................................. E-7<br />

E-4. Analyzing System Security ............................................................................ E-7<br />

E-5. Analysis Objects ............................................................................................ E-8<br />

E-6. Logon Screen .............................................................................................. E-84<br />

E-7. Running Mode ............................................................................................. E-84<br />

E-8. Functions Keys ............................................................................................ E-85<br />

E-9. Capture Buffer Indicator............................................................................... E-85

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!