Lifecycle Models for Survivable Systems

Size: px
Start display at page:

Download "Lifecycle Models for Survivable Systems"

Transcription

1 Lifecycle Models for Survivable s Rick Linger Carnegie Mellon University Pittsburgh, PA Sponsored by the U.S. Department of Defense 2000 by Carnegie Mellon University Version 2 SNA Tutorial - page 1

2 Survivability Concepts 2000 by Carnegie Mellon University Version 1 ISW page 2

3 Survivability Defined Survivability is the ability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents. No amount of security can guarantee systems will not be penetrated Survivability focus is on mission continuity under adverse conditions 2000 by Carnegie Mellon University Version 1 ISW page 3

4 The Three Rs of Survivability Resistance capability to deter attacks Recognition capability to recognize attacks and damage Recovery capability to provide essential services during attack and recover full services after attack 2000 by Carnegie Mellon University Version 1 ISW page 4

5 Survivable Network Analysis SYSTEM: Essential services Essential service usage scenarios Essential architecture components ENVIRONMENT: Intrusion strategies Intrusion usage scenarios Architecture softspots 3Rs analysis Survivability Map recommendations Compromisible architecture components 2000 by Carnegie Mellon University Version 1 ISW page 5

6 Survivability Impact on Traditional Development Life Cycle 2000 by Carnegie Mellon University Version 1 ISW page 6

7 Survivability Impact - 1 Lifecycle Activities Mission Definition Concept of Operations Key Survivability Elements Analysis of mission criticality and consequences of failure Definition of system capabilities in adverse environments Examples Estimation of cost impact of denial of service attacks Enumeration of critical mission functions that must withstand attacks Project Planning Integration of survivability into lifecycle activities and work products Identification of defensive coding techniques for implementation Definition Specification Definition of survivability requirements from mission perspective Specification of essential service and intrusion scenarios Definition of access requirements for critical system assets during attacks Definition of steps that compose critical system transactions 2000 by Carnegie Mellon University Version 1 ISW page 7

8 Survivability Impact - 2 Lifecycle Key Survivability Elements Examples Activities Architecture Design Implementation Testing Evolution Integration of survivability strategies into architecture definition Development and verification of survivability strategies Application of survivability coding and implementation techniques Treatment of intruders as users in testing and certification Improvement of survivability to prevent degradation over time Creation of network facilities for replication of critical data assets Correctness verification of data encryption algorithms Definition of methods to avoid buffer overflow vulnerabilities Addition of intrusion usage to usage models for statistical testing Evolution of architecture in response to changing threat environment 2000 by Carnegie Mellon University Version 1 ISW page 8

9 Survivability Impact Survivability Develop/Test Survivability Operations Development/ Evolution Traditional Life Cycle / Survivability Legacy Software, Survivability Strategies Testing/ Evaluation Operation/ Administration Usage/ Intrusion Usage Model Development/ Evolution Survivability Evolution 2000 by Carnegie Mellon University Version 1 ISW page 9

10 Survivability Impact on Contemporary Development Life Cycle 2000 by Carnegie Mellon University Version 1 ISW page 10

11 Contemporary Life Cycle Iteration of customer requirements, COTS market capabilities, and system architecture Customer Context Architecture and Engineering Cycle Integration Market Context Reconciliation Life cycle of continuous system evolution Iteration 1 Iteration 2 Iteration 3 Iteration by Carnegie Mellon University Version 1 ISW page 11

12 Survivability Impact Reconcile mission survivability with COTS capabilities Assess COTS vendors for survivability focus Evaluate survivability of COTS products Achieve survivability in system integration Treat architecture as survivability integrator Maintain survivability as COTS products evolve 2000 by Carnegie Mellon University Version 1 ISW page 12

Sustaining Software-Intensive Systems - A Conundrum

Sustaining Software-Intensive Systems - A Conundrum Pittsburgh, PA 15213-3890 Sustaining Software-Intensive Systems - A Conundrum Mary Ann Lapham Sponsored by the U.S. Department of Defense 2006 by Carnegie Mellon University Version 2 GSAW 2006 - page 1

More information

Revising the National Strategy for Homeland Security

Revising the National Strategy for Homeland Security Revising the National Strategy for Homeland Security September 2007 The Need for a Revised Strategy Reflect the evolution of the homeland security enterprise since the National Strategy for Homeland Security

More information

Vacancy Announcement

Vacancy Announcement Vacancy Announcement ***When applying for this position, refer to "POSITION # 5345" on your application package.*** POSITION: Cybersecurity Senior Specialist (#5345) DEPARTMENT: Cybersecurity / Systems

More information

Supply Chain Risk Management

Supply Chain Risk Management Supply Chain Risk Management 731 07 December 2013 A. AUTHORITY: The National Security Act of 1947, as amended; 50 USC 3329, note (formerly 50 USC 403-2, note); the Counterintelligence Enhancement Act of

More information

Procedure: 3.4.1p2. (II.D.2a.) Business Continuity Planning

Procedure: 3.4.1p2. (II.D.2a.) Business Continuity Planning Procedure: 3.4.1p2. (II.D.2a.) Business Continuity Planning Revised: January 17, 2017; November 7, 2013 Last Reviewed: January 17, 2017; October 14, 2016 Adopted: November 7, 2013 I. PURPOSE: The Business

More information

CMMI: The DoD Perspective

CMMI: The DoD Perspective Sponsored by the U.S. Department of Defense 2006 by Carnegie Mellon University CMMI: The DoD Perspective Rick Barbour Chief Engineer Navy, Acquisition Support Program page 1 Acknowledgement Presentation

More information

The Journey of Commercialization

The Journey of Commercialization The Journey of Commercialization, Partner, Sell Mike Broeker April, 2018 The Intelligent Workplace The Robert L. Preger Intelligent Workplace, built in 1997, is a 7000 square foot living laboratory of

More information

8. Data Acquisition: Provide self-monitoring facility environments that become a source of research data and information.

8. Data Acquisition: Provide self-monitoring facility environments that become a source of research data and information. EXECUTIVE SUMMARY Transformation to 21 st -century care delivery presents the Department of Veterans Affairs (VA) with critical challenges similar to those confronting private sector healthcare facility

More information

CYBER ATTACK SCENARIO

CYBER ATTACK SCENARIO SCENARIO A disgruntled former hospital employee with exceptional computer skills hacks into the hospital network from their home computer and plants a very aggressive computer virus into the Computer-Aided

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Navy Date: February 2015 1319: Research, Development, Test & Evaluation, Navy / BA 3: Advanced Development (ATD) COST ($ in Millions) Prior Years FY

More information

Cyber Resiliency FAQ

Cyber Resiliency FAQ Cyber Resiliency FAQ This FAQ document fosters knowledge by providing commonality in cyber resiliency terms and concepts. Cyber resiliency supports mission assurance goals for systems and systems-of-systems

More information

Test and Evaluation of Highly Complex Systems

Test and Evaluation of Highly Complex Systems Guest Editorial ITEA Journal 2009; 30: 3 6 Copyright 2009 by the International Test and Evaluation Association Test and Evaluation of Highly Complex Systems James J. Streilein, Ph.D. U.S. Army Test and

More information

Mission Threads: Bridging Mission and Systems Engineering

Mission Threads: Bridging Mission and Systems Engineering Mission Threads: Bridging Mission and Systems Engineering Dr. Greg Butler Engility Corp Dr. Carol Woody Software Engineering Institute SoSECIE Webinar June 20, 2017 Any opinions, findings and conclusions,

More information

The State of US Voting System Security DEFCON Voting Machine Hacking Village July 2017

The State of US Voting System Security DEFCON Voting Machine Hacking Village July 2017 The State of US Voting System Security DEFCON Voting Machine Hacking Village July 2017 Joshua M Franklin National Institute of Standards and Technology Election Fraud Types - 1934 Registration fraud Repeating

More information

Bay Area UASI. Introduction to the Bay Area UASI (Urban Areas Security Initiative) Urban Shield Task Force Meeting

Bay Area UASI. Introduction to the Bay Area UASI (Urban Areas Security Initiative) Urban Shield Task Force Meeting Bay Area UASI Introduction to the Bay Area UASI (Urban Areas Security Initiative) Urban Shield Task Force Meeting 1221 Oak Street Room 225, Oakland, CA March 10, 2017 About the Bay Area UASI Its mission

More information

Integrating Software Architecture Evaluation in a DoD System Acquisition

Integrating Software Architecture Evaluation in a DoD System Acquisition Pittsburgh, PA 15213-3890 Integrating Software Architecture Evaluation in a DoD System Acquisition John Bergey Timothy Morrow April 2005 Sponsored by the U.S. Department of Defense 2005 by Carnegie Mellon

More information

Cybersecurity TEMP Body Example

Cybersecurity TEMP Body Example ybersecurity TEMP Body Example 1.3. System Description (...) A unit equipped with TGVS performs armed reconnaissance missions and provides operators with sensors and weapons to observe and engage enemies.

More information

Risk themes from ATAM data: preliminary results

Risk themes from ATAM data: preliminary results Pittsburgh, PA 15213-3890 Risk themes from ATAM data: preliminary results Len Bass Rod Nord Bill Wood Software Engineering Institute Sponsored by the U.S. Department of Defense 2006 by Carnegie Mellon

More information

Unit 2: Requirements for Continuity Planning

Unit 2: Requirements for Continuity Planning : Requirements for Continuity Planning Objectives At the end of this unit, you should be able to: 1. Describe the requirements of National Security Presidential Directive (NSPD) 51/Homeland Security Presidential

More information

Overview of the New Introduction to CMMI Course and Changes to the Intermediate Concepts and Instructor Training Courses

Overview of the New Introduction to CMMI Course and Changes to the Intermediate Concepts and Instructor Training Courses Pittsburgh, PA 15213-3890 Overview of the New Introduction to Course and Changes to the Intermediate Concepts and Instructor Training Courses SM CMM Integration, IDEAL, and SCAMPI are service marks of

More information

Applying CMMI for Services (CMMI-SVC) to Health Care

Applying CMMI for Services (CMMI-SVC) to Health Care Applying CMMI for Services (CMMI-SVC) to Health Care Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Eileen Forrester October 2008 Contact information The next few slides

More information

UNCLASSIFIED. FY 2017 Base FY 2017 OCO. Quantity of RDT&E Articles Program MDAP/MAIS Code: 493

UNCLASSIFIED. FY 2017 Base FY 2017 OCO. Quantity of RDT&E Articles Program MDAP/MAIS Code: 493 Exhibit R-2, RDT&E Budget Item Justification: PB 2017 Air Force : February 2016 COST ($ in Millions) Years PE 0605230F / Ground d Strategic Deterrent FY 2018 FY 2019 FY 2020 FY 2021 To Program Element

More information

Reducing System Acquisition Risk with Software Architecture Analysis and Evaluation

Reducing System Acquisition Risk with Software Architecture Analysis and Evaluation Reducing System Acquisition Risk with Software and Evaluation Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-3890 Sponsored by the U.S. Department of Defense 2003 by Carnegie

More information

COTS Selection and Adoption in a Small Business Environment. How Do You Downsize the Process?

COTS Selection and Adoption in a Small Business Environment. How Do You Downsize the Process? Pittsburgh, PA 15213-3890 COTS Selection and Adoption in a Small Business Environment How Do You Downsize the Process? Bill Anderson, MTS, SEI Sponsored by the U.S. Department of Defense 2003 by Carnegie

More information

Rapid Innovation Fund (RIF) Program

Rapid Innovation Fund (RIF) Program Rapid Innovation Fund (RIF) Program Cyber Security Workshop January 2015 Dan Cundiff Deputy Director, Comparative Technology Office OASD (R&E) Emerging Capabilities & Prototyping E-mail: thomas.d.cundiff.civ@mail.mil

More information

Keep on Keepin On Arkansas Continuity of Operations Program

Keep on Keepin On Arkansas Continuity of Operations Program Buiness Continuity Keep on Keepin On Arkansas Continuity of Operations Program Planning to continue critical operations in the event of a disaster should be as commonplace as securing insurance on buildings

More information

Pittsburgh, /7/2014. Cyber Vulnerabilities in the Intangible World

Pittsburgh, /7/2014. Cyber Vulnerabilities in the Intangible World Cyber Vulnerabilities in the Intangible World MACPA 2014 Government and Not for Profit Conference Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Robert Behler, Deputy Director

More information

SEVEN SEVEN. Credentialing tips designed to help keep costs down and ensure a healthier bottom line.

SEVEN SEVEN. Credentialing tips designed to help keep costs down and ensure a healthier bottom line. Seven Tips to Succeed in the Evolving Credentialing Landscape SEVEN SEVEN Credentialing tips designed to help keep costs down and ensure a healthier bottom line. 7The reimbursement shift from fee-for-service

More information

DOD INSTRUCTION ACCOUNTABILITY AND MANAGEMENT OF INTERNAL USE SOFTWARE (IUS)

DOD INSTRUCTION ACCOUNTABILITY AND MANAGEMENT OF INTERNAL USE SOFTWARE (IUS) DOD INSTRUCTION 5000.76 ACCOUNTABILITY AND MANAGEMENT OF INTERNAL USE SOFTWARE (IUS) Originating Component: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics Effective:

More information

Applying the Goal-Question-Indicator- Metric (GQIM) Method to Perform Military Situational Analysis

Applying the Goal-Question-Indicator- Metric (GQIM) Method to Perform Military Situational Analysis Applying the Goal-Question-Indicator- Metric (GQIM) Method to Perform Military Situational Analysis Douglas Gray May 2016 TECHNICAL NOTE CMU/SEI-2016-TN-003 CERT Division http://www.sei.cmu.edu REV-03.18.2016.0

More information

When and Where to Apply the Family of Architecture- Centric Methods

When and Where to Apply the Family of Architecture- Centric Methods When and Where to Apply the Family of - Centric Methods Mike Gagliardi Tim Morrow Bill Wood Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Copyright 2015 Carnegie Mellon

More information

The CMMI Product Suite and International Standards

The CMMI Product Suite and International Standards Pittsburgh, PA 15213-3890 The CMMI Product Suite and International Standards Dave Kitson, Jeanie Kitson, Terry Rout and Pedro Sousa CMMI is registered in the US Patent & Trademark Office by Carnegie Mellon

More information

Lessons Learned from the MSG- 128 Study on Incremental Implementation of NATO Mission Training through Distributed Simulation Operations

Lessons Learned from the MSG- 128 Study on Incremental Implementation of NATO Mission Training through Distributed Simulation Operations Lessons Learned from the MSG- 128 Study on Incremental Implementation of NATO Mission Training through Distributed Simulation Operations Jean-Pierre FAYE (Behalf the MSG-128 TG) MSG-143 Symposium, Bucharest,

More information

Guide to the SEI Partner Network

Guide to the SEI Partner Network Guide to the SEI Partner Network January 2018 Your Guide to Delivering SEI Services The SEI Partner Network is a premier group of organizations that deliver time-tested, proven services developed by the

More information

Success through Offshore Outsourcing. Kartik Jayaraman Director Enterprise Relationships (Strategic Accounts)

Success through Offshore Outsourcing. Kartik Jayaraman Director Enterprise Relationships (Strategic Accounts) Success through Offshore Outsourcing Kartik Jayaraman Director Enterprise Relationships (Strategic Accounts) Offshore Outsourcing Today Outsourcing Viewed as Strategic Value Target set Higher Multi-year

More information

School Earthquake Preparedness Guidebook

School Earthquake Preparedness Guidebook School Earthquake Preparedness Guidebook State of Arkansas TABLE OF CONTENTS Introduction Section 1 Section 2 Section 3 Section 4 Section 5 Section 6 Appendix 1 Appendix 2 Appendix 3 Administrator The

More information

AGI Technology for EW and AD Dominance

AGI Technology for EW and AD Dominance AGI Technology for EW and AD Dominance Singapore 2015 Content Overview of Air Defense Overview of Electronic Warfare A practical example Value proposition Summary AMD - a multidisciplinary challenge Geography

More information

Intelligence Operations (HMSY 1340) Online. Credit: 3 semester credit hours (3 hours lecture)

Intelligence Operations (HMSY 1340) Online. Credit: 3 semester credit hours (3 hours lecture) Operations (HMSY 1340) Online Credit: 3 semester credit hours (3 hours lecture) Prerequisite/Co-requisite: Complete the Online Orientation and answer yes to 7+ questions on the Online Learner Self-Assessment:

More information

WARFIGHTER MODELING, SIMULATION, ANALYSIS AND INTEGRATION SUPPORT (WMSA&IS)

WARFIGHTER MODELING, SIMULATION, ANALYSIS AND INTEGRATION SUPPORT (WMSA&IS) EXCERPT FROM CONTRACTS W9113M-10-D-0002 and W9113M-10-D-0003: C-1. PERFORMANCE WORK STATEMENT SW-SMDC-08-08. 1.0 INTRODUCTION 1.1 BACKGROUND WARFIGHTER MODELING, SIMULATION, ANALYSIS AND INTEGRATION SUPPORT

More information

[Discussion Draft] [DISCUSSION DRAFT] SEPTEMBER 9, H. R. ll

[Discussion Draft] [DISCUSSION DRAFT] SEPTEMBER 9, H. R. ll F:\M\JOHNGA\JOHNGA_03.XML [Discussion Draft] 4TH CONGRESS 2D SESSION [DISCUSSION DRAFT] SEPTEMBER, H. R. ll To direct the Secretary of Homeland Security to conduct research and development to mitigate

More information

Cyber Attack: The Department Of Defense s Inability To Provide Cyber Indications And Warning

Cyber Attack: The Department Of Defense s Inability To Provide Cyber Indications And Warning Cyber Attack: The Department Of Defense s Inability To Provide Cyber Indications And Warning Subject Area DOD EWS 2006 CYBER ATTACK: THE DEPARTMENT OF DEFENSE S INABILITY TO PROVIDE CYBER INDICATIONS AND

More information

New DoD Approaches on the Cyber Survivability of Weapon Systems

New DoD Approaches on the Cyber Survivability of Weapon Systems New DoD Approaches on the Cyber Survivability of Weapon Systems Colonel Dean Data Clothier Chief, Cyberspace Division Joint Staff/J-6 CSE is the Critical Foundation for Ensuring Cyber Survivability is

More information

HIE Implications in Meaningful Use Stage 1 Requirements

HIE Implications in Meaningful Use Stage 1 Requirements s in Meaningful Use Stage 1 Requirements HIMSS Health Information Exchange Steering Committee March 2010 2010 Healthcare Information and Management Systems Society (HIMSS). 1 An HIE Overview Health Information

More information

Towards faster implementation and uptake of open government

Towards faster implementation and uptake of open government Towards faster implementation and uptake of open government EXECUTIVE SUMMARY ENGLISH A study prepared for the European Commission DG Communications Networks, Content & Technology by: Digital Single Market

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5210.88 February 11, 2004 USD(I) SUBJECT: Safeguarding Biological Select Agents and Toxins References: (a) Directive-Type Memorandum, "Safeguarding Biological Select

More information

Coflight efdp Angelo Corsaro, Ph.D. Software Technologies Scientist

Coflight efdp Angelo Corsaro, Ph.D. Software Technologies Scientist Coflight efdp Angelo Corsaro, Ph.D. Software Technologies Scientist Strategic and Technological Planning Directorate SELEX-SI [angelo.corsaro@selex-si.com] Agenda Group Overview Coflight Programme DDS

More information

Why Isn t Someone Coding Yet (WISCY)? Avoiding Ineffective Requirements

Why Isn t Someone Coding Yet (WISCY)? Avoiding Ineffective Requirements Why Isn t Someone Coding Yet (WISCY)? Avoiding Ineffective Charlene Gross, Sr Member Technical Staff Software Engineering Institute Presented at the SEPG, May 2004, in Orlando, Florida 2003 by Carnegie

More information

Subj: INFORMATION MANAGEMENT/INFORMATION TECHNOLOGY POLICY FOR FIELDING OF COMMERCIAL OFF THE SHELF SOFTWARE

Subj: INFORMATION MANAGEMENT/INFORMATION TECHNOLOGY POLICY FOR FIELDING OF COMMERCIAL OFF THE SHELF SOFTWARE D E PAR TME NT OF THE N A VY OFFICE OF T HE SECRET ARY 1000 NAVY PENT AGON WASHINGT ON D C 20350-1000 SECNAVINST 5230.15 DON CIO SECNAV INSTRUCTION 5230.15 From: Secretary of the Navy Subj: INFORMATION

More information

Department of Defense INSTRUCTION. SUBJECT: Physical Security Equipment (PSE) Research, Development, Test, and Evaluation (RDT&E)

Department of Defense INSTRUCTION. SUBJECT: Physical Security Equipment (PSE) Research, Development, Test, and Evaluation (RDT&E) Department of Defense INSTRUCTION NUMBER 3224.03 October 1, 2007 USD(AT&L) SUBJECT: Physical Security Equipment (PSE) Research, Development, Test, and Evaluation (RDT&E) References: (a) DoD Directive 3224.3,

More information

Patient Safety Reporting System for Nursing Homes Patient Safety Authority Commonwealth of Pennsylvania. Government to Business (G to B)

Patient Safety Reporting System for Nursing Homes Patient Safety Authority Commonwealth of Pennsylvania. Government to Business (G to B) Patient Safety Reporting System for Nursing Homes Patient Safety Authority Commonwealth of Pennsylvania Government to Business (G to B) Prepared by: Howard Newstadt, JD, MBA CIO/Finance Manager Pennsylvania

More information

UNCLASSIFIED. UNCLASSIFIED Army Page 1 of 7 R-1 Line #9

UNCLASSIFIED. UNCLASSIFIED Army Page 1 of 7 R-1 Line #9 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Army Date: March 2014 2040:, Development, Test & Evaluation, Army / BA 2: Applied COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY

More information

Title IV E Eligibility CPI Specialty Track

Title IV E Eligibility CPI Specialty Track Module 1: Introduction to Child Protective Investigations Learning Objectives: Unit 1.1: Reviewing the Child Welfare Practice Model Describe the Child Protective Investigation process and the types of

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 3150.02 April 24, 2013 USD(AT&L) SUBJECT: DoD Nuclear Weapons Surety Program References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD)

More information

UNCLASSIFIED. UNCLASSIFIED Navy Page 1 of 7 R-1 Line #16

UNCLASSIFIED. UNCLASSIFIED Navy Page 1 of 7 R-1 Line #16 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Navy Date: March 2014 1319: Research, Development, Test & Evaluation, Navy / BA 3: Advanced Development (ATD) COST ($ in Millions) Prior Years FY 2013

More information

Outsourced Product Development

Outsourced Product Development Outsourced Product Development - An Overview Outsourced Product Development - An Overview 2 ABSTRACT: Outsourced Product Development (OPD) is a rapidly emerging niche as more product companies consider

More information

Mission Thread Workshop (MTW): Preparation and Execution

Mission Thread Workshop (MTW): Preparation and Execution Mission Thread Workshop (MTW): Preparation and Execution Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Tim Morrow Mike Gagliardi Bill Wood SATURN 2013 May 2, 2013 Outline

More information

Community Emergency Management Program

Community Emergency Management Program City of Greater Sudbury Community Emergency Management Program Tim P. Beadman, Director Emergency Planning & Strategic Services December 15, 2004 1 Why the need for an Emergency Management Program? Presentation

More information

Meeting Today s Healthcare Security Challenges with Integrated Technologies

Meeting Today s Healthcare Security Challenges with Integrated Technologies Meeting Today s Healthcare Security Challenges with Integrated Technologies Steve Nibbelink, CHPA October, 2013 Our Agenda _ The Hospital Basics _ Impact Organizations in Healthcare Security _ Security

More information

Information Technology Management

Information Technology Management February 24, 2006 Information Technology Management Select Controls for the Information Security of the Ground-Based Midcourse Defense Communications Network (D-2006-053) Department of Defense Office of

More information

December 17, 2003 Homeland Security Presidential Directive/Hspd-8

December 17, 2003 Homeland Security Presidential Directive/Hspd-8 Page 1 of 7 For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-8 Subject: National Preparedness Purpose (1) This directive

More information

9/10/2016. What is a Cycle? Learning Objectives

9/10/2016. What is a Cycle? Learning Objectives Keep the Cycle Going: Maintaining a Healthy Long Term Care Revenue Cycle and Key Strategies for Successful Reimbursement Management September 29, 2016 What is a Cycle? By law of periodical repetition,

More information

CHAMPS. Community Hazard Assessment & Mitigation Planning System. An Introduction

CHAMPS. Community Hazard Assessment & Mitigation Planning System. An Introduction CHAMPS Community Hazard Assessment & Mitigation Planning System An Introduction How did CHAMPS evolve? PARTNERS Kentucky Division of Emergency Management Department for Local Government Center for Hazards

More information

Human Systems Integration (HSI)

Human Systems Integration (HSI) Human Systems Integration (HSI) Human-System Metrics Applied to Optimize AF Warfighter Capability 13 March 2018 Integrity Service Excellence NDIA Human Systems Conference Ms. Sarah Orr Human Systems Integration

More information

CYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy

CYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy CYBER SECURITY PROTECTION Section III of the DOD Cyber Strategy Overview Build and maintain ready forces and capabilities to conduct cyberspace operations Defend the DOD information network, secure DOD

More information

Countering Weapons of Mass Destruction Other Transaction Agreement

Countering Weapons of Mass Destruction Other Transaction Agreement Joint Program Executive Office for Chemical and Biological Defense Joint Program Executive Office for Chemical and Biological Defense Countering Weapons of Mass Destruction Other Transaction Agreement

More information

ICT and Disaster Risk Reduction Division ESCAP

ICT and Disaster Risk Reduction Division ESCAP E-RESILIENCE FOR SUSTAINABLE DEVELOPMENT Ms. Atsuko Okuda, Chief IDS ICT and Development Section ICT and Disaster Risk Reduction Division ESCAP Introduction What is E-Resilience? ICT plays a pivotal role

More information

HealthCare IT Solutions. Supporting Medicaid from Start to Future

HealthCare IT Solutions. Supporting Medicaid from Start to Future HealthCare IT Solutions Supporting Medicaid from Start to Future The success of any state s Medicaid strategy relies on selecting a core partner with a proven, next-generation, certified system; Medicaid-proficient

More information

KSBCL/SYS 2 020/ Date: 22/03/2014. Notice for Time Extension. Sub: Information Security Management System Implementation

KSBCL/SYS 2 020/ Date: 22/03/2014. Notice for Time Extension. Sub: Information Security Management System Implementation KARNATAKA STATE BEVERAGES CORPORATION LIMITED (A Govt. of Karnataka Enterprise) 78, Seethalakshmi Towers, Mission Road, Bangalore-560 027. Ph: 22483638/ 39 Fax: 22483645 KSBCL/SYS 2 020/2013-14 Date: 22/03/2014

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE

UNCLASSIFIED R-1 ITEM NOMENCLATURE Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Army DATE: April 2013 COST ($ in Millions) All Prior FY 2014 Years FY 2012 FY 2013 # Base FY 2014 FY 2014 OCO ## Total FY 2015 FY 2016 FY 2017 FY 2018

More information

Carnegie Mellon University Notice

Carnegie Mellon University Notice Carnegie Mellon University Notice This video and all related information and materials ( materials ) are owned by Carnegie Mellon University. These materials are provided on an as-is as available basis

More information

Quality Assurance (QA) Work Plan. Advance Corrections Initiative

Quality Assurance (QA) Work Plan. Advance Corrections Initiative Quality Assurance (QA) Work Plan for the State of Washington Department of Corrections Advance Corrections Initiative Prepared by Page i Table of Contents 1. QA OBJECTIVES... 1 2. QA APPROACH... 2 2.1

More information

Joint Staff J7 Cyberspace Environment Division / Joint Information Operations Range (JIOR) Overview

Joint Staff J7 Cyberspace Environment Division / Joint Information Operations Range (JIOR) Overview Joint Staff J7 Cyberspace Environment Division / Joint Information Operations Range (JIOR) Overview Approved for Public Release by Joint Staff Public Affairs - Hampton Roads 18 Dec 15 JIOR Background DoD

More information

SCAMPI B&C Tutorial. Software Engineering Process Group Conference SEPG Will Hayes Gene Miluk Jack Ferguson

SCAMPI B&C Tutorial. Software Engineering Process Group Conference SEPG Will Hayes Gene Miluk Jack Ferguson Pittsburgh, PA 15213-3890 SCAMPI B&C Tutorial Software Engineering Process Group Conference SEPG 2004 Will Hayes Gene Miluk Jack Ferguson CMMI is registered in the U.S. Patent and Trademark Office by Carnegie

More information

University of Pittsburgh

University of Pittsburgh University of Pittsburgh Graduate School of Public Health Center for Bio- Terrorism Response 130 DeSoto Street Pittsburgh, Pennsylvania 1526 412-383-7985/7475 31 October 2000 The Honorable James S. Gilmore

More information

UNCLASSIFIED. UNCLASSIFIED Army Page 1 of 12 P-1 Line #51

UNCLASSIFIED. UNCLASSIFIED Army Page 1 of 12 P-1 Line #51 Exhibit P-40, Budget Line Item Justification: PB 2017 Army : February 2016 2035A: Other Procurement, Army / BA 02: Communications and Electronics Equipment / BSA 64: Information Security ID Code (A=Service

More information

John R. Harrald, Ph.D. Director, Institute for Crisis, Disaster, and Risk Management The George Washington University.

John R. Harrald, Ph.D. Director, Institute for Crisis, Disaster, and Risk Management The George Washington University. John R. Harrald, Ph.D. Director, Institute for Crisis, Disaster, and Risk Management The George Washington University Testimony for the Senate Homeland Security Government Affairs Committee Hurricane Katrina:

More information

Software Architecture and Product Quality

Software Architecture and Product Quality Software Architecture and Product Quality Linda Northrop Director, Product Line Systems Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Presentation for the Boston SPIN May

More information

SAFE SCHOOL ZONE EMERGENCY RESPONSE AND CRISIS MANAGEMENT FOR SCHOOLS AND COMMUNITIES

SAFE SCHOOL ZONE EMERGENCY RESPONSE AND CRISIS MANAGEMENT FOR SCHOOLS AND COMMUNITIES EMERGENCY RESPONSE AND CRISIS MANAGEMENT FOR SCHOOLS AND COMMUNITIES SAFE SCHOOL ZONE TRAINING & CONSULTATION To schedule a training or consultation, contact the Center at SafeSchools@csc.csiu.org or (717)

More information

Training and Evaluation Outline Report

Training and Evaluation Outline Report Training and Evaluation Outline Report Status: Approved 19 Jun 2017 Effective Date: 02 Jan 2018 Task Number: 14-EAC-8027 Task Title: Conduct Paying Agent Operations (Financial Management Support Detachment

More information

Training and Evaluation Outline Report

Training and Evaluation Outline Report Training and Evaluation Outline Report Status: 20 Jun 2012 Effective Date: 28 Feb 2018 Task Number: 14-EAC-8008 Task Title: Provide Military Pay Support (Financial Management Support Unit (FMSU)) Distribution

More information

UNCLASSIFIED. UNCLASSIFIED R-1 Line Item #152 Page 1 of 15

UNCLASSIFIED. UNCLASSIFIED R-1 Line Item #152 Page 1 of 15 Exhibit R-2, PB 2010 DoD Human Resources Activity RDT&E Budget Item Justification DATE: May 2009 6 - RDT&E Management Support COST ($ in Millions) FY 2008 Actual FY 2009 FY 2010 FY 2011 FY 2012 FY 2013

More information

Air Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force

Air Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force Air Force Science & Technology Strategy 2010 F AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff ~~~ Secretary of the Air Force REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188

More information

130 FERC 61,211 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION

130 FERC 61,211 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION 130 FERC 61,211 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION Before Commissioners: Jon Wellinghoff, Chairman; Marc Spitzer, Philip D. Moeller, and John R. Norris. Mandatory Reliability

More information

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 7 R-1 Line #198

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 7 R-1 Line #198 Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Air Force : February 2015 3600: Research, Development, Test & Evaluation, Air Force / BA 7: Operational Systems Development COST ($ in Millions) FY

More information

Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information

Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information Mr. Brian D. Hughes Office of the Deputy Assistant Secretary of Defense for

More information

Future Force Capabilities

Future Force Capabilities Future Force Capabilities Presented by: Mr. Rickey Smith US Army Training and Doctrine Command Win in a Complex World Unified Land Operations Seize, retain, and exploit the initiative throughout the range

More information

Chapter FM 3-19

Chapter FM 3-19 Chapter 5 N B C R e c o n i n t h e C o m b a t A r e a During combat operations, NBC recon units operate throughout the framework of the battlefield. In the forward combat area, NBC recon elements are

More information

CYBERWAR: Strategic Information Warfare By Robert K. Hiltbrand Originally published Spring 1999

CYBERWAR: Strategic Information Warfare By Robert K. Hiltbrand Originally published Spring 1999 CYBERWAR: Strategic Information Warfare By Robert K. Hiltbrand Originally published Spring 1999 INTRODUCATION Before I begin this discussion, I must add this disclaimer. The research information I have

More information

Outsourcing Risk Management. UniCredit Group Experience

Outsourcing Risk Management. UniCredit Group Experience Risk UniCredit Group Experience Stefano Alberigo Unicredit Head of Operational & Reputational Risk Oversight Francesco Mottola Manager Accenture Finance & Risk Rome, 23 th June 2015 Agenda A Context &

More information

1. Definitions. See AFI , Air Force Nuclear Weapons Surety Program (formerly AFR 122-1).

1. Definitions. See AFI , Air Force Nuclear Weapons Surety Program (formerly AFR 122-1). Template modified: 27 May 1997 14:30 BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 91-103 11 FEBRUARY 1994 Safety AIR FORCE NUCLEAR SAFETY CERTIFICATION PROGRAM COMPLIANCE WITH THIS

More information

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 5 R-1 Line #199

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 5 R-1 Line #199 COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY 2015 FY 2015 OCO # Total FY 2016 FY 2017 FY 2018 FY 2019 Cost To Complete Total Program Element - 0.343 0.195 0.498-0.498 0.475 0.412 0.421

More information

Army IAMD Modular Open Systems Approach

Army IAMD Modular Open Systems Approach Army IAMD Modular Open Systems Approach Presented to the Defense Daily OA Summit The Power of Modularity and New Open Business Models Panel Presented by Mr. Charley Robinson, Director, System Engineering,

More information

Air Force Institute of Technology

Air Force Institute of Technology Air Force Institute of Technology I n t e g r i t y - S e r v i c e - E x c e l l e n c e Educating the Future Leaders of America s Armed Forces AFIT Information Assurance Education and Research Gregg

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE POLICY DIRECTIVE 10-25 26 SEPTEMBER 2007 Operations EMERGENCY MANAGEMENT ACCESSIBILITY: COMPLIANCE WITH THIS PUBLICATION IS MANDATORY Publications and

More information

Castles in the Clouds: Do we have the right battlement? (Cyber Situational Awareness)

Castles in the Clouds: Do we have the right battlement? (Cyber Situational Awareness) Castles in the Clouds: Do we have the right battlement? (Cyber Situational Awareness) The Nation's Army in Cyberspace OVERALL CLASSIFICATION: US Army Cyber Command and Second Army 1 COL Mark Schonberg,

More information

Training and Evaluation Outline Report

Training and Evaluation Outline Report Training and Evaluation Outline Report Status: Approved 10 Oct 2007 Effective Date: 02 Jan 2018 Task Number: 14-EAC-8004 Task Title: Conduct Commercial Vendor Pay Operations (Financial Management Support

More information

OEM & Police. FY 2017 Proposed Budget Work Session. Tuesday, March 22, 2:30 4:30 pm

OEM & Police. FY 2017 Proposed Budget Work Session. Tuesday, March 22, 2:30 4:30 pm OEM & Police FY 2017 Proposed Budget Work Session Tuesday, March 22, 2:30 4:30 pm Agenda Related FAAC Report: Police Tuesday, March 22, 2016 2:30 4:30 PM Department / Topic Book pgs Web pgs Web Link Office

More information

The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen,

The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen, The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen, Marines, and Civilians who serve each day and are either involved in war, preparing for war, or executing

More information

Joint Information Environment. White Paper. 22 January 2013

Joint Information Environment. White Paper. 22 January 2013 White Paper "To fight and conquer in all bottles is not supreme excellence; supreme excellence consists in breaking the enemy's resistance without fighting." -Sun Tzu "Some people think design means how

More information

Advanced Explosive Ordnance Disposal Robotic System (AEODRS)

Advanced Explosive Ordnance Disposal Robotic System (AEODRS) Advanced Explosive Ordnance Disposal Robotic System (AEODRS) NDIA Meeting DISTRIBUTION UNLIMITED 22 MARCH 2017 Mr. Jim Ryan Assistant Program Manager Joint Service EOD 22 March 2017 Purpose Provide JEOD

More information