Air Force Civil Engineer
UESC Playbook
116 | P a g e
ETL 11-1
Civil Engineer Industrial Control Systems
Information Assurance Compliance
LANs, or long-haul data transport capabilities, such as wide area and backbone
networks.
Demilitarized Zone (DMZ) – A secure interface between systems or components of
systems or a perimeter network that adds an extra layer of protection between internal
and external networks by enforcing the internal network’s IA policy for external
information exchange. A DMZ, also called a “screened subnet,” provides external,
untrusted sources with restricted access to releasable information while shielding the
internal network from outside attacks.
Enclave – A collection of computing environments connected by one or more internal
networks under the control of a single approval authority and security policy, including
personnel and physical security.
Global Information Grid (GIG) – The globally interconnected, end-to-end set of
information capabilities for collecting, processing, storing, disseminating, and managing
information on demand to warfighters, policy makers, and support personnel. The GIG
includes owned and leased communications and computing systems and services,
software (including applications), data, security services, other associated services, and
National Security Systems. Non-GIG includes stand-alone, self contained, or embedded
IT that is not, and will not be, connected to the enterprise network. (DODD 8000.01)
Information Assurance (IA) – Measures that protect and defend information and
information systems by ensuring their availability, integrity, authentication, confidentiality,
and non-repudiation. This includes providing for restoration of information systems by
incorporating protection, detection, and reaction capabilities.
IA Control – An objective IA condition of integrity, availability, or confidentiality achieved
through the application of specific safeguards or through the regulation of specific
activities that is expressed in a specified format, i.e., a control number, a control name,
control text, and a control class. Specific management, personnel, operational, and
technical controls are applied to each DOD information system to achieve and
appropriate level of integrity, availability, and confidentiality in accordance with OMB
Circular A-130. (DODI 8500.2)
Information System (IS) – A discrete set of information resources organized for the
collection, storage, processing, maintenance, use, sharing, dissemination, disposition,
display, or transmission of information. (Note: Includes AIS applications, enclaves,
outsourced IT-based processes, and PITIs.)
Information Technology (IT) – Any equipment or interconnected system or subsystem
of equipment used in the automatic acquisition, storage, manipulation, management,
movement, control, display, switching, interchange, transmission, or reception of data or
information. This includes equipment used by the executive agency directly or used by a
contractor under a contract with the executive agency, which (i) requires the use of such
equipment, or (ii) requires the use, to a significant extent, of such equipment in the
performance of a service or the furnishing of a product. The term “information
technology” includes computers, ancillary equipment, software, firmware, and similar