AIS Modes of Operation


There are a number of modes of operation that can be used to process, transmit, and store various types of national security information. The mode used is authorized by the government customer based on the authorized variations in the AIS InfoSec environment. It is based on the personal security clearances of the users and national security information access needs, for example, Secret clearance held by the users and their need to use that information to accomplish the contractual tasks assigned. It is also based on the automated and manual information protection and defense controls that will be used.

The modes of operation that are used generally fall into four distinct categories:

  • Dedicated: the users all have a personal clearance equal to the highest level of national security information being processed, stored, and transmitted by the AIS, and a need-to-know (NTK) for all the information on that AIS.

  • Systems high: all the users have a personal clearance, but not a NTK for all the information on the AIS. The users must be separately identified and controlled. This is generally done through passwords, identification devices, and add-on software packages.

  • Partitioned: all users have a personal clearance for the highest level of national security information processed, but have not necessarily had a special briefing and NTK for all the information on the AIS. The general controls include a separate identity and password for each user, possibly a special briefing and NTK. The AIS is partitioned, to include possibly two or more CPUs in the same "box," using the same communications links.

  • Multilevel: this mode permits concurrent processing of various, separate national security-related, multicontractual programs' information. This level is the highest, the most costly, and the least flexible of the security modes and is seldom used. Users on these AIS may or may not have a personal security clearance or NTK for all the information on the AIS. Thus, someone with no national security background check or clearance can use the system containing national security information. This is possible because the system is so secure that it prevents the user from accessing national security information of a higher level than the user is cleared to access.




The Information Systems Security Officer's Guide. Establishing and Managing an Information Protection Program
The Information Systems Security Officers Guide: Establishing and Managing an Information Protection Program
ISBN: 0750698969
EAN: 2147483647
Year: 2002
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net