This security guide is based on an organizational framework
and core content developed at the Security Research Center of the Defense Security
Service. The core content is Unclassified and has been approved for public release by the
Department of Defense.
The core program (Version 99.7) has been customized and
enhanced to reflect the specific procedures, policies and needs of USASMDC.
Comments and questions concerning this guide should be
directed to Brenda Turner.
This program uses software that creates summary statistics on
how frequently the program and various files within it are accessed. The purpose is to
help improve the program. The statistics show how often the program is used and what
information is of greatest or least interest, identify system performance problems, or
help determine technical design specifications. No attempt is made to identify individual
users or their usage habits. Raw data logs that do contain such information are scheduled
for regular destruction in accordance with National Archives and Records Administration
Unauthorized attempts to upload information or change
information in this program are strictly prohibited and may be punishable under the
Computer Fraud and Abuse Act of 1987 and the National Information Infrastructure
This program builds on briefings, brochures and articles
developed by individuals and organizations throughout the the U.S. Government security
community. Their contributions are greatly appreciated, as are the comments of the dozens
of people throughout the security community who reviewed the core program and provided
input to make it better.