Specifications

M!L-SI’L)-1472E
5.15.8 .12.3 Browsin~Hel~. Uscrsshould bepermitted to browse through on-line HELP
displays, just as they would through a printed manual, to gain familiarity with system functions and
operating procedures.
5.15.8,13 Datasecurity. Data shall be protected from unauthorized use, potential loss from
equipment failure, and user errors.
5.15.8 .13.1 Automated securitYrneasums. Automated measu.msshall be provided to minimize
data loss from inttuders in a system or from errors by legitimate users.
5.15.8 .13.2 Wamirm of t.hmatsto security.
Computer logic shalJ be provided that will generate
messages and/or alarm signais in order to warn users of attempted intrusion by unauthorized users.
5.15.8 .13.3 Seme~
ati~~ real from simulated data. When simulated data and system functions
are provided (perhaps for user training), real data shall be protected and teal system use shall be clearly
distinguished from all simulated operations.
5.15.8 .13.4 Disda~ of simulated data. In applications where either real or simulated data can be
displayed, a clear indication of simulated data shaIl be included as part of the ckissifiaition label.
5.15 .8.13.5 Displayed security classification. When displayed data are classified for security
purposes, a prominent indication of security classification level shall be labeled in each display.
5.15 .8.13.6 User identification. User identification procedures shall be as simple as possible,
consistent with adequate data protection. The password shall not be echoed on the display (see
5.15. 1.2). Audio feedback, rather than visual, shail be provided when inputting secure passwords
during log-on.
5.15.8 .13.7 Choice of Passwords. When passwords are required, users shall be allowed to ‘~
choose their own passwords since a password chosen by a user will generally be easier for that
individual to R2mesnk.
Guidelines for password selection shall be given so that users will
not choose
easily guessable ones.
5.15.8 .13.8 ChanRin~ passwords. Users should be allowed to change passwords whenever
they choose; all passwords should be changed at periodic intexvals (not to exceed six months).
5.15.9
System rewonse time. Maximum system response times for real-time systems (e.g.,
fire control systems, command
and control systems) shall not exctxxl the values of Table XXIX. Non-
real-time systems may permit relaxed response times.
If com ter response time will exceed 15
rseconds, the user should be given a message indicating that e system is responding.
5.15.10 (lhermauirernents.
5.15.10.1 Overlays. Mechanical overlays, such as coverings over the keyboard or transparent
sheets placed on the display, shall be avoided.
5,15.10.2
Hard cmpy.
Tku=*tlh=tka_mtina~~d&@*
contents of the alphanumeric or digitaJ graphic display in those systems where (a) mass storage is
restricted, (b) Mass stored
data can be lost by power interruption, or (c) Record keeping is required.
5.15.10.2.1 DisQklvDL-iQ.
The user sMl bc able to
print a c!i$p!nyhy simple
?
nrw. (r ,g
PRINT-SCREEN) without having to trike a series of other actions first, such as calling or the display
t~ k fikxl,
spcci&ing a filename, then calling f~w Rprint of that narnexl file
1s3