SPECIAL INSTRUCTIONS
Publication 1
1
PURPOSE
Cyber Security Manual, DM 3500-000 is being
updated and additional chapters are being published.
2
EXPLANATION OF CHANGES
The DM 3500 is being revised to incorporate a
new number scheme and to add Chapters 4 and 5 to the manual. The Table of Contents for Chapter 1, Part 1
has been revised and Chapter 6, Part 1 has been updated and Parts 2 & 3
have been added.
3
FILING INSTRUCTIONS:
Insert or replace the following material
Insert: Cover Page, Cyber Security Classification Numbering Table
and Introduction
Replace: USDA Computer Incident Response, Chapter 1, Table of Contents with Incident Response Procedures dated October 25, 2001, with DM 3505, Chapter 1, and Table of Contents
Note:
The remainder of Chapter 1 is still valid
Insert: DM 3520-000, Configuration Management, Chapter 4
DM 3520-001, Configuration Management Policy and Responsibilities,
Part 1
DM 3525-000, USDA Internet and E-mail Security, Chapter 5,
DM 3525-001, USDA Internet Access Security for Private Internet Service Providers, Part 1
DM 3525-002, Internet Use and Copyright Restrictions, Part 2
Replace: Vulnerability Scan Procedures, Chapter 6 dated April 4, 2003, in its entirety with
DM 3530-000, Security Protection, Chapter 6
DM 3530-001, Vulnerability Scan Procedures, Part 1
Insert: DM 3530-002, IBM & IBM Compatible Security Standards, Part 2
DM 3530-003, Public Key Infrastructure, Part 3
DM
3500-901, Appendix A, Glossary