MASTER OF SCIENCE IN INFORMATION TECHNOLOGY MANAGEMENT
|
|
|
- Lionel Caldwell
- 10 years ago
- Views:
Transcription
1 MASTER OF SCIENCE IN INFORMATION TECHNOLOGY MANAGEMENT AUTOMATING SUBMARINE TRAINING AND READINESS USING WEB-ENABLED APPLICATIONS Kevin S. Anderson-Lieutenant, United States Navy B.S., Jacksonville University, 1994 and David J. Murphy-Major, United States Marine Corps B.S., Syracuse University, 1985 Advisors: William J. Haga, Graduate School of Business and Public Policy Douglas E. Brinkley, Graduate School of Business and Public Policy This thesis examines the limits to on-board training and readiness imposed upon the submarine community by manual data collection and personnel record systems. It proposes an integration of web-based applications under the Balanced Scorecard management approach as a solution. Specifications are included for fiber optic LAN Infrastructure design, network client workstations, network servers and IT-21 compliant network operating systems, producing applications and web augmentation tools. A description of relational database design is provided that encompasses database objects, data types and table relationships. Web design issues and network security issues are examined. Complete code for a prototype of the system in Microsoft Access is appended. Recommendations are made for using an n-tier network architecture to automate the submarine training and readiness processes in small project modules using an incremental Prototype development approach. An n-tier architecture supports custom applications and commercial-off-the-shelf (COTS) components, supports component reuse and encapsulation, provides a consistent, secure and auditable access to data and will allow faster production at less risk. Recommendations are made for using Microsoft products that support n-tier architecture and are consistent with the Navy s IT-21 standards. DoD KEY TECHNOLOGY AREAS: Computing and Software, Manpower, Personnel, and Training KEYWORDS: Automation, Local Area Network, N-Tier, Readiness, Submarine, Training, Web-Based, Web-Enabled DESIGNING A RELATIONAL DATABASE TO FACILITATE MILITARY FAMILY HOUSING UTILIZATION DECISIONS Jonalan Brickey-Captain, United States Army B.S., United States Military Academy, 1991 Advisor: Daniel R. Dolk, Information Systems Academic Group Second Reader: LTC James E. Illingworth, USA, TRADOC Analysis Center Monterey The Housing Welcome Center (HWC) in Monterey, CA manages more than 2,200 military family houses and provides services to approximately 4,500 service members. The current housing information system 43
2 consists of a proprietary legacy database system, a homemade non-relational database, a collection of word processing documents, and a static online application Web site. This semi-manual system can introduce errors, inconsistencies, and redundancies that may lead to frustration and possibly a decrease in quality of life. This research presents a prototype Housing Assignments and Terminations System (HATS) that uses a top-down systems analysis design approach. The research defines requirements and models that are transformed into a relational database with connectivity to a Web site. A graphical user interface (GUI) provides intuitive menus to manipulate and view data. Decision support tools help decision-makers visualize the data in a spatial manner and make better decisions to improve the quality of life for service members. DoD KEY TECHNOLOGY AREA: Computing and Software KEYWORDS: GIS, Legacy System, Decision Support Tools, Military Family Housing, Relational Databases CORRELATION ANALYSIS OF FLEET INFORMATION WARFARE CENTER NETWORK INCIDENTS Patrick W. Ginn-Captain, United States Army B.B.A., North Georgia College, 1991 Advisors: LT Ray Buettner, USN, Information Warfare Academic Group Dan Boger, Command, Control, Communications, Computers, and Intelligence Academic Group The Navy s Intrusion Detection process is currently reactive in nature. It is designed and programmed to detect and provide alerts to the Fleet Information Warfare Center (FIWC) of suspicious network activity while it is in progress, as well as, to record/store data for future reference. However, the majority of activity taking place within and across Naval networks is legitimate and not an unauthorized activity. To allow for efficient access and utilization of the information systems sharing the network the Intrusion Detection Systems must be set at a level that filters out activity deemed as normal or non-hostile, while still providing an appropriate level of security. With this filtering in place an IDS system will not register all suspicious activity, and may not detect mild and seemingly harmless activity. When increasing security, limits must be imposed upon access. This thesis examines FIWC network incident data from 1999 to see if a correlation can be drawn between United States visibility in the foreign media during 1999 and the occurrence of suspicious network incidents. A positive correlation may provide advance-warning indicators that could lead to the development of a procedure for increasing security posture based on the current environment. These indicators would provide a more proactive method of defense, significantly reduce potential damage caused by hostile network incidents and provide for more efficient network activity. DoD KEY TECHNOLOGY AREAS: Other (Information Technology) KEYWORDS: Fleet Information Warfare Center, Intrusion Detection, Network Incidents NAVY/MARINE CORPS INTRANET INFORMATION ASSURANCE OPERATIONAL SERVICES PERFORMANCE MEASURES Randall A. Gumke-Lieutenant, United States Navy Civil Engineering Corps B.S., University of Florida, 1993 Advisors: Daniel F. Warren, Department of Computer Science Carl R. Jones, Information Systems Academic Group Communicating in the Department of the Navy (DON) over the Internet is an everyday event. The DON is developing the Navy Marine Corps Intranet (N/MCI) to enhance this communication capability. The 44
3 security of communicating over the N/MCI has become a concern to the DON. The DON is relying on the N/MCI contractor to provide security for their communications. Key aspects of this secure communication will be provided through the use of a DON Public Key Infrastructure (PKI), which the N/MCI contractor is managing. To ensure the security of the PKI based communications the contract requires the monitoring of four PKI performance measures. This thesis analyzes performance measures, criterion, and standards then uses this analysis to review the contractual PKI performance measures and data collected from commercial PKI vendors. It recommends changes to these performance measures and provides additional performance criteria that should be included in the N/MCI contract. Finally, this thesis analyses how the N/MCI contract, specifically the PKI, impact DON members. DoD KEY TECHNOLOGY AREA: Computing and Software, Other (Public Key Infrastructure) KEYWORDS: Public Key Infrastructure, Public Key Cryptography, Navy Marine Corps Intranet, Service Level Agreements, Performance Measures, PKI, N/MCI USING KNOWLEDGE MANAGEMENT TO INNOVATE USCG COMMAND CENTER PROCESSES Randall J. Navarro-Lieutenant, United States Coast Guard B.S., California State Polytechnic University, 1991 Advisors: Mark E. Nissen, Graduate School of Business and Public Policy Daniel R. Dolk, Information Systems Academic Group The U.S. Coast Guard (USCG) responds to thousands of alerts received each year from the Search and Rescue Satellite-Aided Tracking (SARSAT) system. Each alert requires an efficient and effective response to assist a potential mariner in distress. This thesis provides an in-depth analysis of the process employed by USCG Command Centers in responding to SARSAT alerts. The purpose of this analysis is to identify alternatives that can improve the knowledge work performed in the process. This thesis builds on recent work that focuses on knowledge management and system design from three integrated perspectives: 1) reengineering, 2) expert systems knowledge acquisition and representation, and 3) information systems analysis and design. The integrated framework covers the gamut of design considerations from the enterprise process at large, through alternative classes of knowledge in the middle, and on to specific systems in detail. The SARSAT response process is examined using this integrated framework and identifies five technological and organizational alternatives that offer significant potential to improve the overall performance of the process. DoD KEY TECHNOLOGY AREAS: Command, Control and Communications, Other (Knowledge Management) KEYWORDS: Knowledge Management, Process Analysis, Process Re-engineering, Information Systems USING MULTIPLE COLLABORATIVE AGENTS FOR ADAPTIVE QUALITY OF SERVICE MANAGEMENT OF C4ISR NETWORKS Raymond A. Rivera-Lieutenant, United States Navy B.S., United States Naval Academy, 1994 Master of Science in Systems Technology-June 2001 Advisors: Alex B. Bordetsky, Information Systems Academic Group John S. Osmundson, Command, Control, Communications, Computers, and Intelligence Academic Group This research explores the potential of agent technology for adaptive quality of service (QOS) management of c4isr networks. With the growing emphasis on information superiority, any time savings or additional utilization of resources enabled by effective network management becomes increasingly important. 45
4 Intelligent agents are ideal for assessing information, adapting to dynamic conditions, and predicting future network conditions. In the kernel of the proposed multiple agent system (MAS) testbed are agent shared memory and majority rule architectures for agent conflict resolution. The case based reasoning (CBR) technique provides the foundation for building the agents shared memory of qos management solutions and allows the individual agents to share their associations of feedback controls in response to application and user qos profiles. Based on the telecommunications management network (TMN) functionality, we use this agent architecture to effectively translate the warfighter s service layer application requirements across the network. The fundamental frameworks of service level management (SLM) and policy based management (PBM) serve as cornerstones in effectively gathering and applying specific application requirements. Finally, we utilize these techniques to investigate an actual C4I application at the pacific region network operating center (PRNOC) in Wahiawa, Hawaii as the real-world focal point of the thesis. DoD KEY TECHNOLOGY AREA: Command, Control, and Communications KEYWORDS: Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR), Agent Technology, Quality of Service (QoS), Case Based Reasoning (CBR), Service Level Management (SLM), Policy Based Management (PBM), Telecommunications Management Network (TMN) DEFINING AND VALIDATING A COVERT ANALYSIS DETECTION (CAD) SYSTEM AND ITS STEALTHY DATA CAPTURE, CONTROL AND ANALYSIS CAPABILITIES Glen F. Sharlun-Captain, United States Marine Corps B.S., United States Naval Academy, 1992 Advisors: John C. McEachen, Department of Electrical and Computer Engineering Dan Boger, Information Systems Academic Group A Covert Analysis Detection (CAD) system is an operationalized honeypot or honeynet that is designed to covertly capture, control and provide analysis capabilities of all traffic that flows through it. It was found that the covert data capture capability not only revealed the attackers tools (captured as source code) and tactics (collection of compromised systems), but also over time it revealed that that attacker s actual motive was the creation of a distributed denial of service (DDoS) network. The discovery of this lethal network tool and all the signatures of its creation and maintenance, proved the validity of the CAD s capabilities to aid in the enhancement of our information protection resources. DoD KEY TECHNOLOGY AREA: Command, Control and Communications, Computing and Software KEYWORDS: Network Security, Information Protection, Intrusion Detection, Deception, Deterrence, Honeypot, Honeynet, Distributed denial of service (DDoS) THE COAST GUARD KNOWLEDGE BASE: BUILDING ONLINE COMMUNITIES, TEAMS AND EXPERTS TO FACILITATE RAPID CREATION, CAPTURE AND SHARING OF SERVICE RELATED KNOWLEDGE Andrew J. Sorenson-Lieutenant Commander, United States Coast Guard B.S., United States Coast Guard Academy, 1988 Advisor: Mark E. Nissen, Graduate School of Business and Public Policy Associate Advisor: Roger D. Evered, Graduate School of Business and Public Policy The U.S. Coast Guard is reaching the limits of incrementalism. Extending aircraft and cutter service-lives, increasing work hours to compensate for reduced manpower, responding to data calls faster and squeezing another penny out of costs are the challenges of leaders today. But pursuing incremental improvements is similar to paving over cow paths. Today s technology provides the Coast Guard with the opportunity to 46
5 make exponential improvements in processes for managing knowledge, and to revolutionize business practices. This thesis presents a knowledge management architecture that addresses articulable limits to fast, efficient, knowledge management within the cutter community. Building upon a foundation of messaging and collaboration, the architecture provides modules maximizing the ability to manage informal and formal knowledge. The results are a transparent interface for the creation, sharing and capture of organizational knowledge. Successful implementation is dependent upon the improvement of the Coast Guard s IT infrastructure and the creation of a culture friendly to knowledge sharing. DoD KEY TECHNOLOGY AREAS: Battlespace Environments, Command Control and Communications, Computing and Software, Human Systems Interface, Manpower Personnel and Training KEYWORDS: Coast Guard, Knowledge Management, Information Technology, Knowledge Architecture, High Endurance Cutters, Medium Endurance Cutters REQUIREMENTS FOR THE DEPLOYMENT OF PUBLIC KEY INFRASTRUCTURE (PKI) IN THE USMC TACTICAL ENVIRONMENT Alan R. Stocks-Major, United States Marine Corps M.S., Troy State University, 1996 Advisors: Daniel F. Warren, Department of Computer Science Cynthia E. Irvine, Department of Computer Science Marine forces are expeditionary in nature yet require the full range of Public Key Infrastructure (PKI) services at deployed sites with limited bandwidth and access to their respective Registration Authority (RA). The development of a PKI solution for the tactical arena is a fluid and complex challenge that needs to be answered in order to ensure the best support of tactically deployed forces. Deployed Marine forces will need the capability to issue and re-issue certificates, perform certificate revocation, and perform key recovery within the command element of the deployed unit. Since the current United States Marine Corps (USMC) PKI was not designed with the tactical environment in mind, the full extent of PKI deficiencies for field operation is unknown. This thesis begins by describing public key cryptography, the implementation and objectives of a USMC PKI, and the components necessary to operate a PKI. Next, tactical issues that have been identified as areas of concern along with their proposed solutions are presented. Supporting material describes design issues, such as scalability and interoperability, and technical challenges, such as certificate revocation lists (CRL), key escrow and management of tokens DoD KEY TECHNOLOGY AREA: Other (Public Key Management) KEYWORDS: Public Key Infrastructure (PKI), Computer Security, Navy Marine Corps Intranet (NMCI) 47
6 DYNAMIC ASSEMBLY FOR SYSTEM ADAPTABILITY, DEPENDABILITY AND ASSURANCE (DASADA) PROJECT ANALYSIS Charles A. Stowell, II-Lieutenant Commander, United States Naval Reserve B.S., The Citadel, 1985 M.S., Central Michigan University, 1997 and Wayne S. Mandak-Major, United States Marine Corps B.S., Allegheny College, 1983 Master of Science in Computer Science-June 2001 Advisors: Luqi, Department of Computer Science Man-Tak Shing, Department of Computer Science John S. Osmundson, Command, Control, Communications, Computers, and Intelligence Academic Group Richard Riehle, Department of Computer Science This thesis focuses on an analysis of the dynamic behavior of software designed for future Department of Defense systems. The DoD is aware that as software becomes more complex, it will become extremely critical to have the ability for components to change themselves by swapping or modifying components, changing interaction protocols, or changing its topology. The Defense Advanced Research Programs Agency formed the Dynamic Assembly for Systems Adaptability, Dependability, and Assurance (DASADA) program in order to task academia and industry to develop dynamic gauges that can determine run-time composition, allow for the continual monitoring of software for adaptation, and ensure that all user defined properties remain stable before and after composition and deployment. Through the study, a review of all the DASADA technologies were identified as well as a thorough analysis of all 19 project demonstrations. This thesis includes a template built using the object-oriented methodologies of the Unified Modeling Language (UML) that will allow for functional and non-functional decomposition of any DASADA software technology project. In addition, this thesis includes insightful conclusions and recommendations on those DASADA projects that warrant further study and review. DoD KEY TECHNOLOGY AREA: Computing and Software KEYWORDS: Computing, Software, Software Engineering, Software Demonstration HUMAN FACTORS IN COAST GUARD COMPUTER SECURITY - AN ANALYSIS OF CURRENT AWARENESS AND POTENTIAL TECHNIQUES TO IMPROVE SECURITY PROGRAM VIABILITY Timothy J. Whalen-Lieutenant, U.S. Coast Guard B.S., United States Merchant Marine Academy, 1990 Advisors: Cynthia Irvine, Department of Computer Science Douglas E. Brinkley, Graduate School of Business and Public Policy The Coast Guard is becoming increasingly reliant upon our nation's information infrastructure. As such, our ability to ensure the security of those systems is also increasing in import. Traditional information security measures tend to be system-oriented and often fail to address the human element that is critical to system success. In order to ensure information system security, both system and human factors requirements must be addressed. This thesis attempts to identify both the susceptibility of Coast Guard information systems to human factors-based security risks and possible means for increasing user awareness of those risks. This research is meant to aid the Coast Guard in continuing to capitalize on emerging technologies while simultaneously providing a secure information systems environment. DoD KEY TECHNOLOGY AREA: Command, Control and Communication, Computing and Software, Human Systems Interface 48
7 KEYWORDS: Computer Security, Human Factors, Human Computer Interaction, Coast Guard, Trust, INFOSEC THE USE OF INTELLIGENT REAL TIME TECHNOLOGIES TO IMPLEMENT, MONITOR AND FORECAST MEDICAL READINESS Michael Whitecar-Lieutenant, United States Navy B.S., Park University, 1991 Advisors: John Osmundson, Command, Control, Communications, Computers, and Intelligence Academic Group Gary Porter, Command, Control, Communications, Computers, and Intelligence Academic Group One of the various essentials of military readiness is the administering and continual execution of medical immunizing agents. Service members and civilian personnel working under contract are required to maintain a satisfactory level of medical readiness pursuant to the environment or platform they are assigned to. However, the guidance that oversees and classifies this satisfactory level is numerous in volume, broad in terms of definition, and difficult to interpret in terms of the methodology used to assign a specific rating. Because of the many interpretations of medical readiness, receiving a designated rating of C2 is considered to be acceptable in wartime interactions. Therefore, annual immunization requirements may be neglected throughout one s tenure while still engaging in a wartime environment with the risk of becoming exposed to influenza infection. The collection, tracking, and analyzing of medical readiness data is interpreted differently thereby prohibiting the facilitation and compilation of adequate information. Medical systems are developed using many different technologies that omit the ability to interface with one another, are in adaptive to change, and do not provide an interactive gateway to permit service members to become proactive and responsible for their own medical readiness state. DoD KEY TECHNOLOGY AREA: Computing and Software, Manpower, Personnel, and Training KEYWORDS: Medical, Readiness, Intelligent, Technologies, Web Application 49
8 50
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement 1.0 INTRODUCTION The Department of the Navy Space and Naval Warfare Systems
Reliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
Flexible, Life-Cycle Support for Unique Mission Requirements
Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF
NFX FOR MSP SOLUTION BRIEF SP Monitor Jump Start Security-as-a-Service Designed to give you everything you need to get started immediately providing security-as-a service, SP Monitor is a real-time event
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
RAVEN, Network Security and Health for the Enterprise
RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations
Network Systems Integration
Network Systems Integration Strong Networks for Mission-Critical Services Turnkey Solutions for Today s Large-Scale Networks Government and business enterprises turn to General Dynamics Information Technology
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
MASTER OF SCIENCE IN INFORMATION TECHNOLOGY MANAGEMENT
MASTER OF SCIENCE IN INFORMATION TECHNOLOGY MANAGEMENT INFORMATION SYSTEMS STRATEGIC PLANNING FOR KOSOVO PEACEKEEPING FORCE Nuh Altinsoy-First Lieutenant, Turkish Army B.S., Turkish Military Academy, 1996
Fight the Network. Presented By Kevin Jacobs On Behalf of WIN-T TMD and CERDEC S&TCD CyberOps Branches [email protected]. Briefing name l Date (1)
Fight the Network Presented By Kevin Jacobs On Behalf of WIN-T TMD and CERDEC S&TCD CyberOps Branches [email protected] Briefing name l Date (1) Problem Army Strategy for Net-Centric Fighting Force
Welcome to Modulo Risk Manager Next Generation. Solutions for GRC
Welcome to Modulo Risk Manager Next Generation Solutions for GRC THE COMPLETE SOLUTION FOR GRC MANAGEMENT GRC MANAGEMENT AUTOMATION EASILY IDENTIFY AND ADDRESS RISK AND COMPLIANCE GAPS INTEGRATED GRC SOLUTIONS
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS 18068-67H CH-63
CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS 18068-67H CH-63 Updated: July 2015 TABLE OF CONTENTS INFORMATION SYSTEMS TECHNICIAN SUBMARINES (ITS) SCOPE OF RATING GENERAL INFORMATION INFORMATION
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
MASTER OF SCIENCE IN COMPUTER SCIENCE
MASTER OF SCIENCE IN COMPUTER SCIENCE WEB PORTAL DESIGN, EXECUTION, AND SUSTAINABILITY FOR NAVAL WEBSITES AND WEB SERVICES Saundra L. Amsden-Lieutenant Commander, United States Navy B.S., University of
Space and Naval Warfare Systems Center Atlantic
Space and Naval Warfare Systems Center Atlantic Business and Force Support Portfolio Industry Opportunities SSC Atlantic Small Business and Industry Outreach Initiative Gulf Coast Government Contractor
Total Exploration & Production: Field Monitoring Case Study
Total Exploration & Production: Field Monitoring Case Study 1 Summary TOTAL S.A. is a word-class energy producer and provider, actually part of the super majors, i.e. the worldwide independent oil companies.
Realize Your Strategy Actuate Solutions for the Balanced Scorecard
Realize Your Strategy Actuate Solutions for the Balanced Scorecard Creating Synergies Through Organizational Alignment How is your organization performing? Why, and what should you do about it? See how
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
IBM Unstructured Data Identification and Management
IBM Unstructured Data Identification and Management Discover, recognize, and act on unstructured data in-place Highlights Identify data in place that is relevant for legal collections or regulatory retention.
Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.
ANZSCO Descriptions This ANZSCO description document has been created to assist applicants in nominating an occupation for an ICT skill assessment application. The document lists all the ANZSCO codes that
Address IT costs and streamline operations with IBM service desk and asset management.
Asset management and service desk solutions To support your IT objectives Address IT costs and streamline operations with IBM service desk and asset management. Highlights Help improve the value of IT
Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)
Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction
IT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
INTELLIGENCE AND HOMELAND DEFENSE INSIGHT
I N D U S T R Y INTELLIGENCE AND HOMELAND DEFENSE INSIGHT INTELLIGENCE AND HOMELAND DEFENSE CHALLENGES The Intelligence Community (IC) needs the right information, in real time, to make critical decisions.
DISTRIBUTION: ASSISTANT G-1 FOR CIVILIAN PERSONNEL POLICY, DEPARTMENT OF THE ARMY DIRECTOR, PLANS, PROGRAMS, AND DIVERSITY, DEPARTMENT OF THE NAVY
DISTRIBUTION: ASSISTANT G-1 FOR CIVILIAN PERSONNEL POLICY, DEPARTMENT OF THE ARMY DIRECTOR, PLANS, PROGRAMS, AND DIVERSITY, DEPARTMENT OF THE NAVY DEPUTY DIRECTOR, PERSONNEL FORCE MANAGEMENT, DEPARTMENT
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
MASTER OF SCIENCE IN INFORMATION TECHNOLOGY MANAGEMENT
MASTER OF SCIENCE IN INFORMATION TECHNOLOGY MANAGEMENT DISSEMINATION AND STORAGE OF TACTICAL UNMANNED AERIAL VEHICLE DIGITAL VIDEO IMAGERY AT THE ARMY BRIGADE LEVEL Andreas K. Apostolopoulos-Major, Hellenic
Symantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
Chapter 18. Network Management Basics
Network Management Basics > FCAPS Model Chapter 18. Network Management Basics This chapter covers the following topics: FCAPS Model Network Management Architecture Network Management Protocols An Introduction
Coordinated Operation Capability Using Scalable C2
Coordinated Operation Capability Using Scalable C2 Authors: Hüseyin KUTLUCA, İbrahim AKSU, Arda ÜNAL MilSOFT Yazılım Teknolojileri A.Ş. Teknokent, 06800 ODTU Ankara / TURKEY [email protected] [email protected]
Best Practices for Building a Security Operations Center
OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,
HONEYPOT SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
HONEYPOT SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK
HANDBOOK VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK CONSIDERATIONS FOR SERVICE ADOPTION Version 1.0 July 2014 VerisignInc.com CONTENTS 1. WHAT IS A DDOS PROTECTION SERVICE? 3 2. HOW CAN VERISIGN
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How
Injazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
User Registration Tutorial
Navy Knowledge On-Line (NKO) User Registration Tutorial NKO Document #: 20090504-URT-NKO-V4.2 04 May 2009 Prepared for: NKO Program Management Office William R. Johnson NETPDTC N623 Table of Contents Table
OPNAVINST 3000.15A USFF/CNO N3/N5 10 Nov 2014
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3000.15A USFF/CNO N3/N5 OPNAV INSTRUCTION 3000.15A From: Chief of Naval Operations
NASCIO 2015 State IT Recognition Awards
NASCIO 2015 State IT Recognition Awards Title: State of Georgia Private Security Cloud Implementation Category: Cybersecurity Contact: Mr. Calvin Rhodes CIO, State of Georgia Executive Director, GTA [email protected]
Meeting Cyber Security Challenges
Meeting Cyber Security Challenges Presented to Naval Postgraduate School Cyber Summit 29 October 2009 Cynthia Irvine, PhD, Professor Naval Postgraduate School UNCLASSIFIED Overview Challenges in Cyber
Oracle s Primavera P6 Enterprise Project Portfolio Management
Oracle s Primavera P6 Enterprise Project Portfolio Management Oracle s Primavera P6 Enterprise Project Portfolio Management is the most powerful, robust and easy-to-use solution for prioritizing, planning,
DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC 20350 3000
DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC 20350 3000 MCO 3030.1 POC MARINE CORPS ORDER 3030.1 From : To: Commandant of the Marine Corps Distribution
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Breaking down silos of protection: An integrated approach to managing application security
IBM Software Thought Leadership White Paper October 2013 Breaking down silos of protection: An integrated approach to managing application security Protect your enterprise from the growing volume and velocity
ReMilNet Service Experience Overview
ReMilNet Service Experience Overview ReMilNet s knowledge across all functional service areas enables us to provide qualified personnel with knowledge across the spectrum of support services. This well
The Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
Effective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
Endpoint Security for DeltaV Systems
DeltaV Systems Service Data Sheet Endpoint Security for DeltaV Systems Essential protection that consolidates endpoint and data security. Reduces the time and effort spent deploying and managing security
BlackStratus for Managed Service Providers
BLACKSTRATUS FOR MSP SOLUTION GUIDE PAGE TM BlackStratus for Managed Service Providers With BlackStratus MSP suite of solutions, you can quickly and effectively ramp up customer security offerings and
Information Systems Security Certificate Program
Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate
HIPAA Security Regulations: Assessing Vendor Capabilities and Negotiating Agreements re: PKI and Security
HIPAA Security Regulations: Assessing Vendor Capabilities and Negotiating Agreements re: PKI and Security March 2, 2001 Cy D. Ardoin, Ph.D. 2 Agenda Quick View of Security Strategy for Security Quick View
White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
Simulation and Training Solutions
Simulation and Training Solutions Strong Learning Experiences Available Nowhere Else Advancing Operational Readiness with Leading-Edge Simulation and Training The rapid evolution of military missions,
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense By: Daniel Harkness, Chris Strasburg, and Scott Pinkerton The Challenge The Internet is an integral part of daily
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.
SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,
WHITE PAPER. iet ITSM Enables Enhanced Service Management
iet ITSM Enables Enhanced Service Management iet ITSM Enables Enhanced Service Management Need for IT Service Management The focus within the vast majority of large and medium-size companies has shifted
The Purview Solution Integration With Splunk
The Purview Solution Integration With Splunk Integrating Application Management and Business Analytics With Other IT Management Systems A SOLUTION WHITE PAPER WHITE PAPER Introduction Purview Integration
The Nationwide Automatic Identification System Newsletter Issue #1 3 rd Quarter FY 2007
June 2007 Issue 1 The Nationwide Automatic Identification System Newsletter Issue #1 3 rd Quarter FY 2007 W elcome to the first issue of The Guardian, a quarterly newsletter issued by the Nationwide Automatic
Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee
Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting
nfx One for Managed Service Providers
NFX FOR MSP SOLUTION GUIDE nfx One for Managed Service Providers With netforensics MSP suite of solutions, you can quickly and effectively ramp up customer security offerings and increase your bottom line
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
Improvements Needed With Host-Based Intrusion Detection Systems
Report No. DODIG-2012-050 February 3, 2012 Improvements Needed With Host-Based Intrusion Detection Systems Warning This report is a product of the Inspector General of the Department of Defense. Its contents
2011 Forrester Research, Inc. Reproduction Prohibited
1 2011 Forrester Research, Inc. Reproduction Prohibited Information Security Metrics Present Information that Matters to the Business Ed Ferrara, Principal Research Analyst July 12, 2011 2 2009 2011 Forrester
PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING
BACKGROUNDER Point of Contact: Mr. James L. Lindsey (703) 704-0194 [email protected] PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING Product Director, Enterprise Content,
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper
ADVANCED THREATS IN THE ENTERPRISE Finding an Evil in the Haystack with RSA ECAT White Paper With thousands of workstations and servers under management, most enterprises have no way to effectively make
CA Process Automation for System z 3.1
PRODUCT SHEET CA Process Automation for System z CA Process Automation for System z 3.1 CA Process Automation for System z helps enable enterprise organizations to design, deploy and administer automation
The National Security Act of 1947 July 26, 1947
The National Security Act of 1947 July 26, 1947 Public Law 253, 80th Congress; Chapter 343, 1st Session; S. 758. AN ACT To promote the national security by providing for a Secretary of Defense; for a National
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
Network Mission Assurance
Network Mission Assurance Michael F. Junod, Patrick A. Muckelbauer, PhD, Todd C. Hughes, PhD, Julius M. Etzl, and James E. Denny Lockheed Martin Advanced Technology Laboratories Camden, NJ 08102 {mjunod,pmuckelb,thughes,jetzl,jdenny}@atl.lmco.com
ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst
ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the
Enterprise Information Management
WHITE PAPER Enterprise Information Management Financial, Material and Production Systems Intergraph Government Solutions designed and deployed a very large Extract-Transform- Load Enterprise Information
Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process
Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Overcoming Active Directory Audit Log Limitations. Written by Randy Franklin Smith President Monterey Technology Group, Inc.
Overcoming Active Directory Audit Log Limitations Written by Randy Franklin Smith President Monterey Technology Group, Inc. White Paper 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5000.70 May 10, 2012 Incorporating Change 1, Effective March 19, 2014 USD(AT&L) SUBJECT: Management of DoD Modeling and Simulation (M&S) Activities References:
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
FEDERAL RÉSUMÉ. Client Name PROFILE SUMMARY
A d d r e s s C i t y, S t a t e Z i p FEDERAL RÉSUMÉ Client Name E m a i l A d d r e s s P h o n e N u m b e r Citizenship: U.S. Citizen Veteran Status: Retired Job Announcement Number: ABDC-4894892 Job
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
