physical protection system uses small sensors mountedat intervals on the fence and at each gate.Emanations ProtectionIn evaluating the need for perimeter protection, takeinto account the possibility that electromagnetic oracoustic emanations from AIS hardware may beintercepted. Tests show that interception andinterpretation of such emanations may be possibleunder the right conditions by technically qualifiedpersons using generally available hardware. As a ruleof thumb, interception of electromagnetic emanationsbeyond 325 yards is very difficult. However, if there isreason to believe that a potential exposure tointerception exists, seek technical guidance from uppermanagement and the Chief of Naval Operations.Measures to control compromising emanations aresubject to approval under the provisions of Control ofCompromising Emanations, DOD Directive C5200.19,by the cognizant authority of the component approvingsecurity features of the AIS system. Application ofthese measures within industrial AIS systems is only atthe direction of the contracting activity concerned underprovisions of the Security Requirements for AutomatedInformation Systems (AIS’s), DOD Directive 5200.28,and the requirements are to be included in the contract.Interior Physical ProtectionIntrusion detection systems (IDSs) (OPNAVINST5510.1) provide a means of detecting and announcingproximity or intrusion that endangers or may endangerthe security of a command. The use of an IDS in theprotective program of a command may be requiredbecause of the critical importance of a facility orbecause of the location or the layout of the command.Remember, IDSs are designed to detect, notprevent, an attempted intrusion. Thus, acomprehensive security plan must contain appropriatesecurity measures along with procedures for aneffective reaction force.Remote Terminal Areas ProtectionThe physical and personnel security requirementsfor the central computer facility area are based upon theoverall requirements of the total AIS system. Theremote terminal area requirements are based upon thehighest classified and most restrictive category and typeof material that will be accessed through the terminalunder system constraints.Each remote terminal should be individuallyidentified to ensure required security control andprotection. Identify each terminal as a feature ofhardware in combination with the operating system.Before personnel of a component that is notresponsible for the overall AIS operation can use aremote device approved for handling classifiedmaterial, security measures must be established. Thesesecurity measures are established by the authorityresponsible for the security of the overall AIS. They areagreed to and implemented before the remote device isconnected to the AIS.DOD component systems may become part of alarger AIS network. The approval and authority toauthorize temporary exceptions to security measuresfor the component’s system in the network requires twocomponents. These include the DOD componentoperating the AIS system and the DOD componenthaving overall responsibility for the security of thenetwork.Each remote terminal that is not controlled andprotected as required for material accessible through itshould be disconnected from the AIS system when thesystem contains classified information. Disconnectprocedures are used to disconnect remote input/outputterminals and peripheral devices from the system by ahardware or software method authorized by thedesignated approving authority of the central computerfacility.Security SurveyAn annual security survey of the AIS facility areashould be conducted by the AIS technical manager. Thefirst step of the survey is to evaluate all potential threatsto the AIS facility as discussed earlier in this chapter.The second step is to define and tabulate areas withinthe facility for control purposes. Details depend on thespecifics of each facility, but the following are commonareas to consider:ll*llllllPublic entrance or lobby;Loading dock;Spaces occupied by other building tenants;AIS facility reception area;AIS input/output counter area;AIS data conversion area;Media library;Systems analysis and programming areas;Computer room spaces;4-24
Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business