Skip Ribbon Commands Skip to main content

Cybersecurity Basics and Help

IASE Customer Support:

Need Help? - Contains IASE Support Desk information, POCs, and FAQs.

Five tips to improve computer security: By Deputy Defense Secretary Paul Wolfowitz.

  1. Employ information assurance best practices for proper network configurations.
  2. Use accepted password management practices.
  3. Minimize access privileges through need-to-know criteria.
  4. Increase awareness of cross-domain file transfer security procedures.
  5. Eliminate unauthorized use of readily exploitable software such as peer-to-peer file sharing and remote access applications.

Cybersecurity Basics:

The following is a list of resources to help new Cybersecurity professional get started. If you have any Cybersecurity related questions you can also submit them to the IASE Support Desk.

Resources
Common Criteria - All Cybersecurity-enabled products must be Common Criteria certified for use within DoD.
Cybersecurity Posters - Free posters to promote security within your organization.
Cybersecurity Training Products - Order Free Cybersecurity Training WBT CD's here.
‚ÄčRMF for DoD IT - Risk Management Framework (RMF) for DoD Information Technology (IT).
NIST Computer Security Division - National Institute of Standards and Technology (NIST) Computer Security Resource Center.
Policy and Guidance - Compliance with the ever changing security Policy and Guidance is crucial to success. Policy and Guidance is listed by organizations and by category.

Supporting DoD Cybersecurity:

The following is a list of resources, in addition to the Cybersecurity Basics above, to assist DoD Cybersecurity Support Contractors and Vendors in supporting DoD customers.

External Certification Authorities (IECA)

Solution-based contract providing Engineering Product Services and Technical Support to produce unified, fully integrated systems security solutions for the DOD. The contract is structured to permit purchase of a full range of Information Assurance (IA) solutions, including the hardware, software and enabling products necessary to implement these solutions.

I Assure Characteristics - Characteristic, Awards, and Details.

What is (PII) Personally Identifiable Information and why is it important to protect PII. Launch training to find out.
Interested in posting your Working Group's information to the IASE web page? Contact the IA Webmaster for information at mailto:disa.meade.FSO.mbx.iase-website@mail.mil