Committee on National Security Systems

Last updated
Committee on National Security Systems
CNSS
CNSS Logo.svg
Logo of the CNSS
Agency overview
Formed16 October 2001
Preceding agency
  • National Security Telecommunications and Information Systems Security Committee (NSTISSC)
JurisdictionUnited States
Headquarters Fort Meade, Maryland
Parent agencyIntergovernmental, chaired by DoD
Websitewww.cnss.gov

The Committee on National Security Systems (CNSS) is a United States intergovernmental organization that sets policies for the security of the US security systems. [1] The CIA triad (data confidentiality, data integrity, and data availability) are the three main security goals of CNSS. [2]

Contents

History

The National Security Telecommunications and Information Systems Security Committee (NSTISSC) was established under National Security Directive 42, "National Policy for the Security of National Security Telecommunications and Information Systems", dated 5 July 1990. On October 16, 2001, President George W. Bush signed Executive Order 13231, the Critical Infrastructure Protection in the Information Age, re-designating the National Security Telecommunications and Information Systems Security Committee (NSTISSC) as the Committee on National Security Systems.

Activities

The CNSS holds discussions of policy issues, sets national policy, directions, operational procedures, and guidance for the information systems operated by the U.S. Government, its contractors or agents that either contain classified information, involve intelligence activities, involve cryptographic activities related to national security, involve command and control of military forces, involve equipment that is an integral part of a weapon or weapons system(s) or are critical to the direct fulfillment of military or intelligence missions.

The Department of Defense chairs the committee. Membership consists of representatives from 21 U.S. Government Departments and Agencies with voting privileges, including the CIA, DIA, DOD, DOJ, FBI, NSA, and the National Security Council, and all United States Military Services. Members not on the voting committee include the DISA, NGA, NIST, and the NRO. The operating Agency for CNSS appears to be the National Security Agency, which serves as the primary contact for public inquiries.

Education certification

The CNSS defines several standards, which include standards on training in IT security. Current certifications include:

Related Research Articles

<span class="mw-page-title-main">Defence Intelligence</span> Intelligence agency of the United Kingdom

Defence Intelligence (DI) is an organisation within the United Kingdom intelligence community which focuses on gathering and analysing military intelligence. It differs from the UK's intelligence agencies in that it is an integral part of a government department – the Ministry of Defence (MoD) – rather than a stand-alone organisation. The organisation employs a mixture of civilian and military staff and is funded within the UK's defence budget. The organisation was formerly known as the Defence Intelligence Staff (DIS), but changed its name in 2009.

<span class="mw-page-title-main">Bureau of Intelligence and Research</span> Intelligence agency in the U.S. State Department

The Bureau of Intelligence and Research (INR) is an intelligence agency in the United States Department of State. Its central mission is to provide all-source intelligence and analysis in support of U.S. diplomacy and foreign policy. INR is the oldest civilian element of the U.S. Intelligence Community and among the smallest, with roughly 300 personnel. Though lacking the resources and technology of other U.S. intelligence agencies, it is "one of the most highly regarded" for the quality of its work.

Committee on National Security Systems Instruction No. 4009, National Information Assurance Glossary, published by the United States federal government, is an unclassified glossary of Information security terms intended to provide a common vocabulary for discussing Information Assurance concepts.

<span class="mw-page-title-main">Directorate of Operations (CIA)</span> US clandestine intelligence organization

The Directorate of Operations (DO), less formally called the Clandestine Service, is a component of the US Central Intelligence Agency. It was known as the Directorate of Plans from 1951 to 1973; as the Directorate of Operations from 1973 to 2005; and as the National Clandestine Service (NCS) from 2005 to 2015.

<span class="mw-page-title-main">Under Secretary of Defense for Policy</span> United States government position

The United States under secretary of defense for policy (USDP) is a high level civilian official in the United States Department of Defense. The under secretary of defense for policy is the principal staff assistant and adviser to both the secretary of defense and the deputy secretary of defense for all matters concerning the formation of national security and defense policy.

<span class="mw-page-title-main">U.S. critical infrastructure protection</span>

In the U.S., critical infrastructure protection (CIP) is a concept that relates to the preparedness and response to serious incidents that involve the critical infrastructure of a region or the nation. The American Presidential directive PDD-63 of May 1998 set up a national program of "Critical Infrastructure Protection". In 2014 the NIST Cybersecurity Framework was published after further presidential directives.

The National Information Assurance Certification and Accreditation Process (NIACAP) formerly was the minimum-standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national-security information. NIACAP was derived from the Department of Defense Certification and Accreditation Process (DITSCAP), and it played a key role in the National Information Assurance Partnership.

A cross-domain solution (CDS) is an integrated information assurance system composed of specialized software, and sometimes hardware, that provides a controlled interface to manually or automatically enable and/or restrict the access or transfer of information between two or more security domains based on a predetermined security policy. CDSs are designed to enforce domain separation and typically include some form of content filtering, which is used to designate information that is unauthorized for transfer between security domains or levels of classification, such as between different military divisions, intelligence agencies, or other operations which depend on the timely sharing of potentially sensitive information.

Intelligence cycle management refers to the overall activity of guiding the intelligence cycle, which is a set of processes used to provide decision-useful information (intelligence) to leaders. The cycle consists of several processes, including planning and direction, collection, processing and exploitation, analysis and production, and dissemination and integration. The related field of counterintelligence is tasked with impeding the intelligence efforts of others. Intelligence organizations are not infallible but, when properly managed and tasked, can be among the most valuable tools of management and government.

Intelligence Analysis Management is the process of managing and organizing the analytical processing of raw intelligence information. The terms "analysis", "production", and "processing" denote the organization and evaluation of raw information used in a phase informally called "connecting the dots", thus creating an "intelligence mosaic". The information may result in multiple analytic products, each with different security classifications, time scales, and levels of detail. Intelligence analysis goes back to the beginning of history. Sherman Kent is often considered the father of modern intelligence analysis. His writings include a 1947 book, Strategic Intelligence for American World Policy.

The counter-terrorism page primarily deals with special police or military organizations that carry out arrest or direct combat with terrorists. This page deals with the other aspects of counter-terrorism:

National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which it defends. A number of disciplines go into protecting the intelligence cycle. One of the challenges is there are a wide range of potential threats, so threat assessment, if complete, is a complex task. Governments try to protect three things:

This article deals with activities of the U.S. Central Intelligence Agency, specifically dealing with arms control, weapons of mass destruction (WMD) and weapons proliferation. It attempts to look at the process of tasking and analyzing, rather than the problem itself, other than whether the CIA's efforts match its legal mandate or assists in treaty compliance. In some cases, the details of a country's programs are introduced because they present a problem in analysis. For example, if Country X's policymakers truly believe in certain history that may not actually be factual, an analyst trying to understand Country X's policymakers needs to be able to understand their approach to an issue.

This article deals with the activities of the Central Intelligence Agency (CIA) of the federal government of the United States that are violations of human rights.

With Europe stabilizing along the Iron Curtain, the CIA attempted to limit the spread of Soviet influence elsewhere around the world. Much of the basic model came from George Kennan's "containment" strategy from 1947, a foundation of US policy for decades.

At various times since the creation of the Central Intelligence Agency, the Federal government of the United States has produced comprehensive reports on CIA actions that marked historical watersheds in how CIA went about trying to fulfill its vague charter purposes from 1947. These reports were the result of internal or presidential studies, external investigations by congressional committees or other arms of the Federal government of the United States, or even the simple releases and declassification of large quantities of documents by the CIA.

<span class="mw-page-title-main">Organizational structure of the Central Intelligence Agency</span> Overview of the organizational structure of the Central Intelligence Agency

The CIA publishes organizational charts of its agency. Here are a few examples.

Technical Intelligence (TECHINT) is intelligence about weapons and equipment used by the armed forces of foreign nations. The related term, scientific and technical intelligence, addresses information collected or analyzed about the broad range of foreign science, technology, and weapon systems.

Cyberwarfare is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes. As a major developed economy, the United States is highly dependent on the Internet and therefore greatly exposed to cyber attacks. At the same time, the United States has substantial capabilities in both defense and power projection thanks to comparatively advanced technology and a large military budget. Cyber warfare presents a growing threat to physical systems and infrastructures that are linked to the internet. Malicious hacking from domestic or foreign enemies remains a constant threat to the United States. In response to these growing threats, the United States has developed significant cyber capabilities.

A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, personal computer devices, or smartphones. An attacker is a person or process that attempts to access data, functions, or other restricted areas of the system without authorization, potentially with malicious intent. Depending on the context, cyberattacks can be part of cyber warfare or cyberterrorism. A cyberattack can be employed by sovereign states, individuals, groups, societies or organizations and it may originate from an anonymous source. A product that facilitates a cyberattack is sometimes called a cyber weapon. Cyberattacks have increased over the last few years. A well-known example of a cyberattack is a distributed denial of service attack (DDoS).

References

  1. "Committee on National Security Systems [website]". Homeland Security Digital Library. 1969-01-01. Retrieved 2021-09-04.
  2. "Definition and Dimension of CNSS Model". desklib.com. Retrieved 2023-06-08.