The Security Plan: Effectively Teaching How To Write One
|
|
- Ethan Francis
- 1 years ago
- Views:
Transcription
1 The Security Plan: Effectively Teaching How To Write One Paul C. Clark Naval Postgraduate School 833 Dyer Rd., Code CS/Cp Monterey, CA Abstract The United States government requires all federal systems to have a customized security plan. In addition, the National Training Standard for Information Systems Security (INFOSEC) Professionals requires programs that meet this standard to produce students capable of developing a security plan. The Naval Postgraduate School (NPS) teaches courses that comply with several CNSS standards, and therefore requires students to develop a security plan for a hypothetical scenario. Experience in these courses has shown that the same strategies for teaching high school students how to write a research report can successfully be used to teach university students how to write a security plan that is compliant with NIST guidelines. KEYWORDS: Education, Information assurance, Computer security, Security Plan Introduction The purpose of the security plan is to provide an overview of the security requirements of the system and describe the controls in place or planned for meeting those requirements. [1] In order to ensure security in Information Systems, the Office of Management and Budget (OMB) has declared that all United States (U.S.) federal agencies must incorporate a security plan that is consistent with NIST guidance on security planning. [2] To further emphasize its importance, the Computer Security Act of 1987 makes it a legal requirement for federal systems to have a security plan. [3] It would therefore be desirable for all college graduates with a desire to work in Information Assurance (IA) careers in the U.S. Government to be able to read, understand, and execute the policies and standards of a security plan. In addition, at some point, IA professionals may need to write or modify a security plan, so there is a benefit to teaching students how to formulate a security plan. Of course, this education would also benefit those who intend to work in the private sector, where security plans may not be required, but are considered a good foundation to an effective computer security program. In addition to the hard requirement to maintain a security plan, the Committee for National Security Systems (CNSS), formerly known as the National Security Telecommunications and Information Security Committee (NSTISSC), has issued educational standards for Information-Assurance-related positions, many of which require some level of ability 1
2 Report Documentation Page Form Approved OMB No Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE MAR REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE The Security Plan: Effectively Teaching How To Write One 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School 833 Dyer Rd., Code CS/Cp Monterey, CA PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR S ACRONYM(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release, distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 11. SPONSOR/MONITOR S REPORT NUMBER(S) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified 18. NUMBER OF PAGES 5 19a. NAME OF RESPONSIBLE PERSON Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18
3 with respect to security plans. For example, Issuance No. 4011, National Training Standard for Information Systems Security (INFOSEC) Professionals, expects graduates of compliant courses to be able to build a security plan. [4] The Naval Postgraduate School (NPS) Center for Information Systems Security Studies and Research (CISR) supports the teaching of many courses in the Computer Science department that are dedicated to Information Assurance education. [5] One of these courses, Secure Management of Systems, is the capstone of a series of courses that meet the educational requirements of three CNSS training standards, including No Therefore, one of the projects in this course is the development of a security plan. This paper describes our experience and lessons learned from requiring students to write a security plan as part of Secure Management of Systems. Educational Expectations and Roadmap A project as big as a security plan should be started early in the term, which at NPS is a 12- week quarter. Starting such a project in the first or second week of class would not be possible if the students did not already have some IA education or background. For Secure Management of Systems, the following courses are prerequisites: Computer Architecture Computer Communications and Networks Introduction to Information Assurance The purpose, scope, and content of a security plan are covered in the first week of lecture. Several outlines for a security plan are shown from the following sources: OMB Circular A-130 [2] NIST Special Publication [1] Director of Central Intelligence Directive (DCID) 6/3 [6] This provides a framework for the remainder of the course. Lectures cover material not addressed in prerequisite courses, filling in the gaps not covered, such as contingency planning and physical security. The Scenario Secure Management of Systems has been taught for many years, but the security plan assignment has been in place since the Spring quarter of Over 200 students have completed the course since then, providing a wealth of experience, for both the students and their instructor. In order to write a security plan, one needs a site to study. This can be done at an operational facility close to the school, but this is difficult to manage when many students are enrolled in the course, and can be timeintensive for the employees of the site. There is also the site s concern about the compromise of real data, and the impact on its reputation if the site does not have very good security to begin with. Therefore, it is often easier to develop a hypothetical written scenario, or an anonymized written description of a real site. The current method of choice for the instructors at NPS is to use a hypothetical scenario. The students prefer the live site. Developing a hypothetical scenario is no small feat. It requires a written description that has sufficient detail to allow the students to analyze the security of the site without constantly sending the instructor questions via , or taking up too much time in class. The scenario minimally requires the following details: Agency name. 2
4 Agency mission. High-level network diagram. A description of hardware and software assets. A description of the physical and logical security currently in place. Floor diagram(s). Organization chart(s). Some recent bad experiences. The description that was used most recently at NPS was nearly 1,400 words long. It produced a manageable number of student questions during the quarter. It was written from the point of view that the student has been hired as a contractor to write the required security plan. For debugging purposes, it was helpful for the instructor to actually sketch out a security plan for the draft scenario to see where the holes were in the description that might prevent the student from completing each part of the plan. An unintended benefit of the scenario is the ability to reference the hypothetical site while discussing security topics throughout the quarter. Template The first time the security plan was assigned, no particular outline for the completed project was made mandatory. That was a mistake. First, some students could not handle that much leeway and required more guidance to get started. Second, it made grading much more difficult and time consuming because each plan was unique. For example, it was much harder to determine if all aspects of the security plan were covered adequately. The second time the security plan was assigned, a template was provided to the students. It contained a mandatory outline, constructed by the instructor, to be followed by all students. This resulted in a big improvement, but there were still too many questions from the students about details of the security plan s structure. For the fourth iteration of the assignment, the outline from the NIST Guide [1] was used as the mandatory format. This not only provided the students with a standard format that they may encounter in their careers, but it came with a textbook on what needed to go in each section. It still required some interpretation from time to time, but it allowed the students to work independently from the instructor, which reduced stress for both sides. However, to make sure that there was a consistent look and feel across all submissions, a template of the NIST outline was still provided by the instructor. Assignments Another lesson learned through the first two installments of the security plan assignment was that, left on their own, most students waited until the end of the quarter to do any significant work on the quarter-long project, despite constant urgings and warnings. This resulted in lower quality work from the students, and therefore lower grades than they were otherwise capable of earning. In addition, it lessened the learning experience. Therefore, in the fourth iteration, the project was divided into seven smaller units, with established due dates. This forced the procrastinators to work on the project throughout the quarter, and it gave them feedback as they were going. The drawback to the instructor was an increase in work that had to be graded, recorded and returned. However, this is an approach that is used to teach high school students how to write a research paper: it breaks down the problem until it is manageable, and requires intermediate work along the way. 3
5 With respect to grading, the intermediate assignments were not assigned large point values, nor were they heavily scrutinized. They were treated as low value homework assignments because, otherwise, the security plans would have been graded twice: once for each intermediate deliverable, and once for the final complete version. With a smaller number of students it might have been possible to assign grades to the intermediate work that were more indicative of the quality of work. With respect to the NIST Guide and the standard security plan outline, the following is a short description of the seven intermediate assignments: 1. Read the scenario description, look over the template, and read the Executive summary and Section 1 of the NIST Guide. The students were then required to turn in answers to several questions relative to the above reading. 2. Read Section 2 of the NIST Guide. Determine whether the system described in the scenario is a Major Application or a General Support System. How this question is answered determines which NIST outline is used. 3. Read Section 3 of the NIST Guide. Complete section 1 (System Identification) of the security plan. 4. Read Section 4 of the NIST Guide. While referring to appendix C of the Guide, complete the following sections of the security plan: 2.2, Review of Security Controls; 2.3, Rules of Behavior; and 2.5, Authorize Processing. 5. Read Sections 5 and 6 of the NIST Guide. For only those controls currently in place, complete the following sections of the security plan: Section 3, Operational Controls; 4.1, Identification and Authentication; and 4.2, Logical Access Controls. 6. Complete the following sections of the security plan: Section 2.1, Risk Assessment and Management; and 2.4, Planning for Security in the Life Cycle. 7. Complete any subsections that were not already assigned, and add in all other controls necessary for secure operation of the site. The 7 th assignment produces a completed security plan. For the students to be able to identify the controls that need to be added to the system in assignment 7, they need to be taught some kind of risk management methodology. The methodology used by the student to decide what controls to add, and what to leave out, is described in section 2.1 (assignment 6) of the security plan. One approach to use is a checklist-based method, such as that provided by the combination of Department of Defense Directive [7] and Department of Defense Instruction [8]. This is an easy approach for the students, but it does not require any real analysis or critical thinking on their part. The security plan may end up with all the controls the site might need, but it may not address current bad practices that need to be eliminated. The descriptions of the seven student assignments required some occasional interpretation of the NIST Guide, and other hints or requirements to help them succeed. 4
6 Summary The security plan has become a required and important part of the U.S. federal government toolset for improving security. Prospective IA professionals can be given a good education about how to write a security plan if they have the appropriate educational background. In addition, the learning experience can be improved with a little careful planning about how the security plan assignment is handled. NPS has had positive experiences, and the students have produced professional-quality security plans. By following the NIST Guide, the workload on the instructor is reduced, and the student is given additional tools for success. 7. Information Assurance (IA), Department of Defense Directive Number , October 24, Information Assurance (IA) Implementation, Department of Defense Instruction Number , February 6, References 1. Swanson, M., Guide for Developing Security Plans for Information Technology Systems, NIST Special Publication , December Circular No. A-130, Revised, Office of Management and Budget, November 28, th Congress, Computer Security Act, Public Law , National Training Standard for Information Systems Security (INFOSEC) Professionals, NSTISSI No. 4011, National Security Telecommunications and Information Security Committee, June 20, Irvine, C., Warren, D., Clark, P., The NPS CISR Graduate Program in INFOSEC: Six Years of Experience, National Information Systems Security Conference, NIST / NCSC, Volume 1, pp , October Protecting Sensitive Compartmented Information (SC) within Information Systems, Director of Central Intelligence Directive (DCID) 6/3. 5
Improving the Quality of Patient Care Utilizing Tracer Methodology
2011 Military Health System Conference Improving the Quality of Patient Care Utilizing Tracer Methodology Sharing The Quadruple Knowledge: Aim: Working Achieving Together, Breakthrough Achieving Performance
DDESB Seminar Explosives Safety Training
U.S. Army Defense Ammunition Center DDESB Seminar Explosives Safety Training Mr. William S. Scott Distance Learning Manager (918) 420-8238/DSN 956-8238 william.s.scott@us.army.mil 13 July 2010 Report Documentation
Independent Auditor's Report on the Attestation of the Existence, Completeness, and Rights of the Department of the Navy's Aircraft
Report No. DODIG-2012-097 May 31, 2012 Independent Auditor's Report on the Attestation of the Existence, Completeness, and Rights of the Department of the Navy's Aircraft Report Documentation Page Form
Mission Assurance Analysis Protocol (MAAP)
Pittsburgh, PA 15213-3890 Mission Assurance Analysis Protocol (MAAP) Sponsored by the U.S. Department of Defense 2004 by Carnegie Mellon University page 1 Report Documentation Page Form Approved OMB No.
For the Period June 1, 2014 to June 30, 2014 Submitted: 15 July 2014
Contractor s Progress Report (Technical and Financial) CDRL A001 For: Safe Surgery Trainer Prime Contract: N00014-14-C-0066 For the Period June 1, 2014 to June 30, 2014 Submitted: 15 July 2014 Prepared
Biometrics in US Army Accessions Command
Biometrics in US Army Accessions Command LTC Joe Baird Mr. Rob Height Mr. Charles Dossett THERE S STRONG, AND THEN THERE S ARMY STRONG! 1-800-USA-ARMY goarmy.com Report Documentation Page Form Approved
Contemporary Issues Paper EWS Submitted by K. D. Stevenson to
Combat Service support MEU Commanders EWS 2005 Subject Area Logistics Contemporary Issues Paper EWS Submitted by K. D. Stevenson to Major B. T. Watson, CG 5 08 February 2005 Report Documentation Page Form
Make or Buy: Cost Impacts of Additive Manufacturing, 3D Laser Scanning Technology, and Collaborative Product Lifecycle Management on Ship Maintenance
Make or Buy: Cost Impacts of Additive Manufacturing, 3D Laser Scanning Technology, and Collaborative Product Lifecycle Management on Ship Maintenance and Modernization David Ford Sandra Hom Thomas Housel
Required PME for Promotion to Captain in the Infantry EWS Contemporary Issue Paper Submitted by Captain MC Danner to Major CJ Bronzi, CG 12 19
Required PME for Promotion to Captain in the Infantry EWS Contemporary Issue Paper Submitted by Captain MC Danner to Major CJ Bronzi, CG 12 19 February 2008 Report Documentation Page Form Approved OMB
Engineering, Operations & Technology Phantom Works. Mark A. Rivera. Huntington Beach, CA Boeing Phantom Works, SD&A
EOT_PW_icon.ppt 1 Mark A. Rivera Boeing Phantom Works, SD&A 5301 Bolsa Ave MC H017-D420 Huntington Beach, CA. 92647-2099 714-896-1789 714-372-0841 mark.a.rivera@boeing.com Quantifying the Military Effectiveness
Electronic Attack/GPS EA Process
Electronic Attack/GPS EA Process USN/USMC Spectrum Management Conference March 01-05 2010 Distribution A: Approved for public release Johnnie Best NMSC Telecommunications Specialist Report Documentation
Financial Management
August 17, 2005 Financial Management Defense Departmental Reporting System Audited Financial Statements Report Map (D-2005-102) Department of Defense Office of the Inspector General Constitution of the
INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems
United States Government Accountability Office Report to Congressional Committees June 2015 INSIDER THREATS DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems GAO-15-544
World-Wide Satellite Systems Program
Report No. D-2007-112 July 23, 2007 World-Wide Satellite Systems Program Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated
Army Aviation and Missile Command (AMCOM) Corrosion Program Update. Steven F. Carr Corrosion Program Manager
Army Aviation and Missile Command (AMCOM) Corrosion Program Update Steven F. Carr Corrosion Program Manager Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection
Laboratory Accreditation Bureau (L-A-B)
Laboratory Accreditation Bureau (L-A-B) Recognized by: 2011 EMDQ Workshop Arlington, VA Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information
User Manual and Source Code for a LAMMPS Implementation of Constant Energy Dissipative Particle Dynamics (DPD-E)
User Manual and Source Code for a LAMMPS Implementation of Constant Energy Dissipative Particle Dynamics (DPD-E) by James P. Larentzos, John K. Brennan, Joshua D. Moore, and William D. Mattson ARL-SR-290
Army Modeling and Simulation Past, Present and Future Executive Forum for Modeling and Simulation
Army Modeling and Simulation Past, Present and Future Executive Forum for Modeling and Simulation LTG Paul J. Kern Director, Army Acquisition Corps May 30, 2001 REPORT DOCUMENTATION PAGE Form Approved
Development of a Hover Test Bed at the National Hover Test Facility
Development of a Hover Test Bed at the National Hover Test Facility Edwina Paisley Lockheed Martin Space Systems Company Authors: Jason Williams 1, Olivia Beal 2, Edwina Paisley 3, Randy Riley 3, Sarah
New Tactics for a New Enemy By John C. Decker
Over the last century American law enforcement has a successful track record of investigating, arresting and severely degrading the capabilities of organized crime. These same techniques should be adopted
Cyber Attack: The Department Of Defense s Inability To Provide Cyber Indications And Warning
Cyber Attack: The Department Of Defense s Inability To Provide Cyber Indications And Warning Subject Area DOD EWS 2006 CYBER ATTACK: THE DEPARTMENT OF DEFENSE S INABILITY TO PROVIDE CYBER INDICATIONS AND
Software Intensive Acquisition Programs: Productivity and Policy
Software Intensive Acquisition Programs: Productivity and Policy Naval Postgraduate School Acquisition Symposium 11 May 2011 Kathlyn Loudin, Ph.D. Candidate Naval Surface Warfare Center, Dahlgren Division
WEATHER. User's Manual. January 1986 CPD-52. Generalized Computer Program. US Army Corps of Engineers Hydrologic Engineering Center
US Army Corps of Engineers Hydrologic Engineering Center Generalized Computer Program WEATHER User's Manual January 1986 Approved for Public Release. Distribution Unlimited. CPD-52 REPORT DOCUMENTATION
The Air Force's Evolved Expendable Launch Vehicle Competitive Procurement
441 G St. N.W. Washington, DC 20548 March 4, 2014 The Honorable Carl Levin Chairman The Honorable John McCain Ranking Member Permanent Subcommittee on Investigations Committee on Homeland Security and
Research to advance the Development of River Information Services (RIS) Technologies
Research to advance the Development of River Information Services (RIS) Technologies 1st interim report Reporting period 09/2014 09/2015 Approved for public release; distribution unlimited Contract number:
DoD Scientific & Technical Information Program (STIP) 18 November Shari Pitts
DoD Scientific & Technical Information Program (STIP) 18 November 2008 Shari Pitts Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is
Aviation Logistics Officers: Combining Supply and Maintenance Responsibilities. Captain WA Elliott
Aviation Logistics Officers: Combining Supply and Maintenance Responsibilities Captain WA Elliott Major E Cobham, CG6 5 January, 2009 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting
Defense Acquisition Review Journal
Defense Acquisition Review Journal 18 Image designed by Jim Elmore Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average
SIMULATOR SYSTEMS GROUP
SIMULATOR SYSTEMS GROUP Donna Hatfield 677 AESG/SYK DSN: 937-255-4871 Donna.Hatfield@wpafb.af.mil 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection
THE GUARDIA CIVIL AND ETA
THE GUARDIA CIVIL AND ETA Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the
Evolutionary Acquisition an Spiral Development in Programs : Policy Issues for Congress
Order Code RS21195 Updated April 8, 2004 Summary Evolutionary Acquisition an Spiral Development in Programs : Policy Issues for Congress Gary J. Pagliano and Ronald O'Rourke Specialists in National Defense
February 8, The Honorable Carl Levin Chairman The Honorable James Inhofe Ranking Member Committee on Armed Services United States Senate
United States Government Accountability Office Washington, DC 20548 February 8, 2013 The Honorable Carl Levin Chairman The Honorable James Inhofe Ranking Member Committee on Armed Services United States
Battle Captain Revisited. Contemporary Issues Paper Submitted by Captain T. E. Mahar to Major S. D. Griffin, CG 11 December 2005
Battle Captain Revisited Subject Area Training EWS 2006 Battle Captain Revisited Contemporary Issues Paper Submitted by Captain T. E. Mahar to Major S. D. Griffin, CG 11 December 2005 1 Report Documentation
Test and Evaluation of Highly Complex Systems
Guest Editorial ITEA Journal 2009; 30: 3 6 Copyright 2009 by the International Test and Evaluation Association Test and Evaluation of Highly Complex Systems James J. Streilein, Ph.D. U.S. Army Test and
Veterans Affairs: Gray Area Retirees Issues and Related Legislation
Veterans Affairs: Gray Area Retirees Issues and Related Legislation Douglas Reid Weimer Legislative Attorney June 21, 2010 Congressional Research Service CRS Report for Congress Prepared for Members and
AFRL-VA-WP-TP
AFRL-VA-WP-TP-2007-301 A FLEXIBLE HYPERSONIC VEHICLE MODEL DEVELOPED WITH PISTON THEORY (PREPRINT) Michael W. Oppenheimer and David B. Doman DECEMBER 2006 Approved for public release; distribution unlimited.
United States Military Casualty Statistics: Operation Iraqi Freedom and Operation Enduring Freedom
Order Code RS22452 Updated 9, United States Military Casualty Statistics: Operation Iraqi Freedom and Operation Enduring Freedom Summary Hannah Fischer Information Research Specialist Knowledge Services
Conservation Law Enforcement Program Standardization
Headquarters U.S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e Conservation Law Enforcement Program Standardization Mr. Stan Rogers HQ AFSPC/CEVP 26 Aug 04 As of: 1 Report Documentation
Navy CVN-21 Aircraft Carrier Program: Background and Issues for Congress
Order Code RS20643 Updated January 17, 2007 Summary Navy CVN-21 Aircraft Carrier Program: Background and Issues for Congress Ronald O Rourke Specialist in National Defense Foreign Affairs, Defense, and
Developmental Test and Evaluation Is Back
Guest Editorial ITEA Journal 2010; 31: 309 312 Developmental Test and Evaluation Is Back Edward R. Greer Director, Developmental Test and Evaluation, Washington, D.C. W ith the Weapon Systems Acquisition
IMPROVING SPACE TRAINING
IMPROVING SPACE TRAINING A Career Model for FA40s By MAJ Robert A. Guerriero Training is the foundation that our professional Army is built upon. Starting in pre-commissioning training and continuing throughout
MILITARY MUNITIONS RULE (MR) and DoD EXPLOSIVES SAFETY BOARD (DDESB)
MILITARY MUNITIONS RULE (MR) and DoD EXPLOSIVES SAFETY BOARD (DDESB) Colonel J. C. King Chief, Munitions Division Office of the Deputy Chief of Staff for Logistics Headquarters, Department of the Army
Improving ROTC Accessions for Military Intelligence
Improving ROTC Accessions for Military Intelligence Van Deman Program MI BOLC Class 08-010 2LT D. Logan Besuden II 2LT Besuden is currently assigned as an Imagery Platoon Leader in the 323 rd MI Battalion,
Infantry Companies Need Intelligence Cells. Submitted by Captain E.G. Koob
Infantry Companies Need Intelligence Cells Submitted by Captain E.G. Koob Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated
Determining and Developing TCM-Live Future Training Requirements. COL Jeffrey Hill TCM-Live Fort Eustis, VA June 2010
Determining and Developing TCM-Live Future Training Requirements COL Jeffrey Hill TCM-Live Fort Eustis, VA June 2010 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for
The Use of Sikes Act Cooperative Agreements for Implementing INRMP Projects
The Use of Sikes Act Cooperative Agreements for Implementing INRMP Projects Presented to the Department of Defense Conservation Conference INRMP Workshop Tommy Wright, NAVAFAC WASHINGTON Natural Resource
UNITED STATES ARMY AVIATION and MISSILE LIFE CYCLE MANAGEMENT COMMAND CORROSION PROGRAM
UNITED STATES ARMY AVIATION and MISSILE LIFE CYCLE MANAGEMENT COMMAND CORROSION PROGRAM Presented by: Ted Wiesner AMCOM Corrosion Program Office Corrosion Prevention and Control Center of Excellence Steven
Fleet Logistics Center, Puget Sound
Naval Supply Systems Command Fleet Logistics Center, Puget Sound FLEET & INDUSTRIAL SUPPLY CENTER, PUGET SOUND Gold Coast Small Business Conference August 2012 Report Documentation Page Form Approved OMB
Drinking Water Operator Certification and Certificate to Operate Criteria/Requirements for US Navy Overseas Drinking Water Systems
Drinking Water Operator Certification and Certificate to Operate Criteria/Requirements for US Navy Overseas Drinking Water Systems James F. Harris, PE Naval Facilities Engineering Command 22 May 2012 Report
Impact of Corrosion on Ground Vehicles: Program Review, Issues and Solutions
1 Impact of Corrosion on Ground Vehicles: Program Review, Issues and Solutions Ali Baziari Program Manager TACOM/TARDEC Corrosion Prevention and Control (CPAC) Program RDTA-EN/ME Office: (586) 282-8818
Intelligence, Surveillance, Target Acquisition and Reconnaissance
Canadian Forces Project Land Force ISTAR Mr David Connell Department of National Defence Intelligence, Surveillance, Target Acquisition and Reconnaissance Report Documentation Page Form Approved OMB No.
Staffing Cyber Operations (Presentation)
INSTITUTE FOR DEFENSE ANALYSES Staffing Cyber Operations (Presentation) Thomas H. Barth Stanley A. Horowitz Mark F. Kaye Linda Wu May 2015 Approved for public release; distribution is unlimited. IDA Document
The U.S. military has successfully completed hundreds of Relief-in-Place and Transfers of
The LOGCAP III to LOGCAP IV Transition in Northern Afghanistan Contract Services Phase-in and Phase-out on a Grand Scale Lt. Col. Tommie J. Lucius, USA n Lt. Col. Mike Riley, USAF The U.S. military has
The Affect of Division-Level Consolidated Administration on Battalion Adjutant Sections
The Affect of Division-Level Consolidated Administration on Battalion Adjutant Sections EWS 2005 Subject Area Manpower Submitted by Captain Charles J. Koch to Major Kyle B. Ellison February 2005 Report
Comparison of Navy and Private-Sector Construction Costs
Logistics Management Institute Comparison of Navy and Private-Sector Construction Costs NA610T1 September 1997 Jordan W. Cassell Robert D. Campbell Paul D. Jung mt *Ui assnc Approved for public release;
The DoD Siting Clearinghouse. Dave Belote Director, Siting Clearinghouse Office of the Secretary of Defense
The DoD Siting Clearinghouse Dave Belote Director, Siting Clearinghouse Office of the Secretary of Defense 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection
Redefining how Relative Values are determined on Fitness Reports EWS Contemporary Issues Paper Submitted by Captain S.R. Walsh to Maj Tatum 19 Feb 08
Redefining how Relative Values are determined on Fitness Reports EWS Contemporary Issues Paper Submitted by Captain S.R. Walsh to Maj Tatum 19 Feb 08 1 Report Documentation Page Form Approved OMB No. 0704-0188
Introduction to Section 106 of the National Historic Preservation Act. GSA Region 10 Northwest/ Arctic June 22-23, 2004
Introduction to Section 106 of the National Historic Preservation Act GSA Region 10 Northwest/ Arctic June 22-23, 2004 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden
Infections Complicating the Care of Combat Casualties during Operations Iraqi Freedom and Enduring Freedom
2011 Military Health System Conference Infections Complicating the Care of Combat Casualties during Operations Iraqi Freedom and Enduring Freedom The Quadruple Aim: Working Together, Achieving Success
Report No. D July 25, Guam Medical Plans Do Not Ensure Active Duty Family Members Will Have Adequate Access To Dental Care
Report No. D-2011-092 July 25, 2011 Guam Medical Plans Do Not Ensure Active Duty Family Members Will Have Adequate Access To Dental Care Report Documentation Page Form Approved OMB No. 0704-0188 Public
Navy Ford (CVN-78) Class (CVN-21) Aircraft Carrier Program: Background and Issues for Congress
Order Code RS20643 Updated December 5, 2007 Navy Ford (CVN-78) Class (CVN-21) Aircraft Carrier Program: Background and Issues for Congress Summary Ronald O Rourke Specialist in National Defense Foreign
Small Business Innovation Research (SBIR) Program
Small Business Innovation Research (SBIR) Program Wendy H. Schacht Specialist in Science and Technology Policy August 4, 2010 Congressional Research Service CRS Report for Congress Prepared for Members
Click to edit Master title style. How to Submit a Proposal to ONR Navy Gold Coast Small Business Procurement Event August 2012
Click to edit Master title style How to Submit a Proposal to ONR Navy Gold Coast Small Business Procurement Event August 2012 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting
Google Pilot / WEdge Viewer
Google Pilot / WEdge Viewer Andrew Berry Institute for Information Technology Applications United States Air Force Academy Colorado Technical Report TR-09-4 July 2009 Approved for public release. Distribution
The Uniformed and Overseas Citizens Absentee Voting Act: Background and Issues
Order Code RS20764 Updated March 8, 2007 The Uniformed and Overseas Citizens Absentee Voting Act: Background and Issues Summary Kevin J. Coleman Analyst in American National Government Government and Finance
Choose to Lose. Tammy Lindberg, Lt Col, USAF, BSC
Choose to Lose Tammy Lindberg, Lt Col, USAF, BSC Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response,
Spectrum Certification
32 nd Annual USN-USMC Spectrum Management Conference San Diego, CA 07-11 March 2011 Spectrum Certification DISTRIBUTION A: Approved for public release Mrs. Thu Luu NMSC Engineering Team Manager Thu.A.Luu@navy.mil
The Need for a Common Aviation Command and Control System in the Marine Air Command and Control System. Captain Michael Ahlstrom
The Need for a Common Aviation Command and Control System in the Marine Air Command and Control System Captain Michael Ahlstrom Expeditionary Warfare School, Contemporary Issue Paper Major Kelley, CG 13
Air Education and Training Command
Air Education and Training Command Sustaining the Combat Capability of America s Air Force Occupational Survey Report AFSC VEHICLE OPERATIONS Adriana G. Rodriguez 12 May 2004 I n t e g r i t y - S e r
Procedural Guidance for Conducting DoD Classified Conferences
Procedural Guidance for Conducting DoD Classified Conferences Prepared By July 2008 Security professionals may find this guidance useful when they are involved in hosting/coordinating DoD classified conferences.
USMC Identity Operations Strategy. Major Frank Sanchez, USMC HQ PP&O
USMC Identity Operations Strategy Major Frank Sanchez, USMC HQ PP&O Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average
The Shake and Bake Noncommissioned Officer. By the early-1960's, the United States Army was again engaged in conflict, now in
Ayers 1 1SG Andrew Sanders Ayers U.S. Army Sergeants Major Course 22 May 2007 The Shake and Bake Noncommissioned Officer By the early-1960's, the United States Army was again engaged in conflict, now in
U.S. ARMY AVIATION AND MISSILE LIFE CYCLE MANAGEMENT COMMAND
U.S. ARMY AVIATION AND MISSILE LIFE CYCLE MANAGEMENT COMMAND AVIATION AND MISSILE CORROSION PREVENTION AND CONTROL Presented by: Robert A. Herron AMCOM Corrosion Program Deputy Program Manager AMCOM CORROSION
Battlemind Training: Building Soldier Resiliency
Carl Andrew Castro Walter Reed Army Institute of Research Department of Military Psychiatry 503 Robert Grant Avenue Silver Spring, MD 20910 USA Telephone: (301) 319-9174 Fax: (301) 319-9484 carl.castro@us.army.mil
BW Threat & Vulnerability
BW Threat & Vulnerability Dr. F. Prescott Ward Phone: (407) 953-3060 FAX: (407) 953-6742 e-mail:fpward@msn.com Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the
Veterans Benefits: Federal Employment Assistance
Veterans Benefits: Federal Employment Assistance Christine Scott Specialist in Social Policy April 9, 2010 Congressional Research Service CRS Report for Congress Prepared for Members and Committees of
TITLE: Early ICU Standardized Rehabilitation Therapy for the Critically Injured Burn Patient
AWARD NUMBER: W81XWH-12-1-0550 TITLE: Early ICU Standardized Rehabilitation Therapy for the Critically Injured Burn Patient PRINCIPAL INVESTIGATOR: Peter E. Morris, M.D. CONTRACT ORGANIZATION: University
Occupational Survey Report AFSC 4A1X1 Medical Materiel
Sustaining the Combat Capability of America s Air Force Occupational Survey Report AFSC Medical Materiel 1Lt Mary Hrynyk 8 September 2003 I n t e g r i t y - S e r v i c e - E x c e l l e n c e Report
CONTRACTING ORGANIZATION: Landstuhl Regional Medical Center Germany
*» AD Award Number: MIPR 1DCB8E1066 TITLE: ERMC Remote Teleoptometry Project PRINCIPAL INVESTIGATOR: Erik Joseph Kobylarz CONTRACTING ORGANIZATION: Landstuhl Regional Medical Center Germany REPORT DATE:
Adapting the Fitness Report: Evolving an intangible quality into a tangible evaluation to
Adapting the Fitness Report: Evolving an intangible quality into a tangible evaluation to further emphasize the importance of adaptive leadership we must bring it to a measurable format to aid combat leaders
PEO Missiles and Space Overview Briefing for the 2010 Corrosion Summit February 2010 Huntsville, AL
PEO Missiles and Space Overview Briefing for the 2010 Corrosion Summit 9 11 February 2010 Huntsville, AL Presented by: Program Executive Office Missiles and Space PEO MS Corrosion Summit Brief {Slide 1}
CONTRACTING ORGANIZATION: Walter Reed Army Medical Center Washington, DC
AD Award Number: MIPR 0EC5DRM0077 TITLE: Oncology Outreach Evaluation PRINCIPAL INVESTIGATOR: Brian Goldsmith CONTRACTING ORGANIZATION: Walter Reed Army Medical Center Washington, DC 20307-5001 REPORT
Using Spoken Language to Facilitate Military Transportation Planning
Using Spoken Language to Facilitate Military Transportation Planning Madeleine Bates, Dan Ellard, Pat Peterson, Varda Shaked BBN Systems and Technologies 10 Moulton Street. Cambridge, MA 02138 ABSTRACT
C-Band Working Group Update. Steve O'Neal AIR FORCE FLIGHT TEST CENTER EDWARDS AFB, CA 2/20/13
AFFTC-PA-12286 C-Band Working Group Update Steve O'Neal A F F T C m AIR FORCE FLIGHT TEST CENTER EDWARDS AFB, CA 2/20/13 Approved for public release; distribution is unlimited. AIR FORCE FLIGHT TEST CENTER
A Military C2 Professional s Thoughts on Visualization
A Military C2 Professional s Thoughts on Visualization Colonel (Retired) Randy G. Alward Consulting and Audit Canada, Information Security 112 Kent St, Tower B Ottawa, Ontario K1A 0S5 CANADA 1.0 INTRODUCTION
Report No. D June 17, Long-term Travel Related to the Defense Comptrollership Program
Report No. D-2009-088 June 17, 2009 Long-term Travel Related to the Defense Comptrollership Program Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection
Report No. D April 9, Training Requirements for U.S. Ground Forces Deploying in Support of Operation Iraqi Freedom
Report No. D-2008-078 April 9, 2008 Training Requirements for U.S. Ground Forces Deploying in Support of Operation Iraqi Freedom Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting
A system overview of the Electronic Surveillance System for the Early Notification of Community-based Epidemics
A system overview of the Electronic System for the Early Notification of Community-based Epidemics Presented at the 24 Scientific Conference on Chemical & Biological Defense Research 15 November 24 Joe
Report No. D July 30, Data Migration Strategy and Information Assurance for the Business Enterprise Information Services
Report No. D-2009-097 July 30, 2009 Data Migration Strategy and Information Assurance for the Business Enterprise Information Services Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting
AMCOM Corrosion Program
UNCLASSIFIED UNCLASSIFIED U.S. Army Aviation & Missile Life Cycle Management Command, G-3 AF Corrosion Conference August 2011 AMCOM Corrosion Program Overview Report Documentation Page Form Approved OMB
ENDANGERED SPECIES ENCROACHMENT RELIEF
ENDANGERED SPECIES ENCROACHMENT RELIEF Operator s Wants and Needs CAPT D. R. Landon 25 AUG 04 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information
Joint Committee on Tactical Shelters Bi-Annual Meeting with Industry & Exhibition. November 3, 2009
Joint Committee on Tactical Shelters Bi-Annual Meeting with Industry & Exhibition November 3, 2009 Darell Jones Team Leader Shelters and Collective Protection Team Combat Support Equipment 1 Report Documentation
The Need for a New Battery Option. Subject Area General EWS 2006
The Need for a New Battery Option Subject Area General EWS 2006 Contemporary Issues Paper EWS Writing Assignment The Need for a New Battery Option Submitted by Captain GM Marshall to Major R.A. Martinez,
Product Manager Force Sustainment Systems
Product Manager Force Sustainment Systems Contingency Basing and Operational Energy Initiatives SUSTAINING WARFIGHTERS AWAY FROM HOME LTC(P) James E. Tuten Product Manager PM FSS Report Documentation Page
On 10 July 2008, the Training and Readiness Authority
By Lieutenant Colonel Diana M. Holland On 10 July 2008, the Training and Readiness Authority (TRA) policy took effect for the 92d Engineer Battalion (also known as the Black Diamonds). The policy directed
Report No. D June 9, Controls Over the Contractor Common Access Card Life Cycle in the Republic of Korea
Report No. D-2009-086 June 9, 2009 Controls Over the Contractor Common Access Card Life Cycle in the Republic of Korea Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden
Screening for Attrition and Performance
Screening for Attrition and Performance with Non-Cognitive Measures Presented ed to: Military Operations Research Society Workshop Working Group 2 (WG2): Retaining Personnel 27 January 2010 Lead Researchers:
Blue on Blue: Tracking Blue Forces Across the MAGTF Contemporary Issue Paper Submitted by Captain D.R. Stengrim to: Major Shaw, CG February 2005
Blue on Blue: Tracking Blue Forces Across the MAGTF EWS 2005 Subject Area WArfighting Blue on Blue: Tracking Blue Forces Across the MAGTF Contemporary Issue Paper Submitted by Captain D.R. Stengrim to:
Analysis of the Operational Effect of the Joint Chemical Agent Detector Using the Infantry Warrior Simulation (IWARS) MORS: June 2008
Analysis of the Operational Effect of the Joint Chemical Agent Detector Using the Infantry Warrior Simulation (IWARS) MORS: David Gillis Approved for PUBLIC RELEASE; Distribution is UNLIMITED Report Documentation