Lifecycle Models for Survivable Systems
|
|
- Julia Howard
- 6 years ago
- Views:
Transcription
1 Lifecycle Models for Survivable s Rick Linger Carnegie Mellon University Pittsburgh, PA Sponsored by the U.S. Department of Defense 2000 by Carnegie Mellon University Version 2 SNA Tutorial - page 1
2 Survivability Concepts 2000 by Carnegie Mellon University Version 1 ISW page 2
3 Survivability Defined Survivability is the ability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents. No amount of security can guarantee systems will not be penetrated Survivability focus is on mission continuity under adverse conditions 2000 by Carnegie Mellon University Version 1 ISW page 3
4 The Three Rs of Survivability Resistance capability to deter attacks Recognition capability to recognize attacks and damage Recovery capability to provide essential services during attack and recover full services after attack 2000 by Carnegie Mellon University Version 1 ISW page 4
5 Survivable Network Analysis SYSTEM: Essential services Essential service usage scenarios Essential architecture components ENVIRONMENT: Intrusion strategies Intrusion usage scenarios Architecture softspots 3Rs analysis Survivability Map recommendations Compromisible architecture components 2000 by Carnegie Mellon University Version 1 ISW page 5
6 Survivability Impact on Traditional Development Life Cycle 2000 by Carnegie Mellon University Version 1 ISW page 6
7 Survivability Impact - 1 Lifecycle Activities Mission Definition Concept of Operations Key Survivability Elements Analysis of mission criticality and consequences of failure Definition of system capabilities in adverse environments Examples Estimation of cost impact of denial of service attacks Enumeration of critical mission functions that must withstand attacks Project Planning Integration of survivability into lifecycle activities and work products Identification of defensive coding techniques for implementation Definition Specification Definition of survivability requirements from mission perspective Specification of essential service and intrusion scenarios Definition of access requirements for critical system assets during attacks Definition of steps that compose critical system transactions 2000 by Carnegie Mellon University Version 1 ISW page 7
8 Survivability Impact - 2 Lifecycle Key Survivability Elements Examples Activities Architecture Design Implementation Testing Evolution Integration of survivability strategies into architecture definition Development and verification of survivability strategies Application of survivability coding and implementation techniques Treatment of intruders as users in testing and certification Improvement of survivability to prevent degradation over time Creation of network facilities for replication of critical data assets Correctness verification of data encryption algorithms Definition of methods to avoid buffer overflow vulnerabilities Addition of intrusion usage to usage models for statistical testing Evolution of architecture in response to changing threat environment 2000 by Carnegie Mellon University Version 1 ISW page 8
9 Survivability Impact Survivability Develop/Test Survivability Operations Development/ Evolution Traditional Life Cycle / Survivability Legacy Software, Survivability Strategies Testing/ Evaluation Operation/ Administration Usage/ Intrusion Usage Model Development/ Evolution Survivability Evolution 2000 by Carnegie Mellon University Version 1 ISW page 9
10 Survivability Impact on Contemporary Development Life Cycle 2000 by Carnegie Mellon University Version 1 ISW page 10
11 Contemporary Life Cycle Iteration of customer requirements, COTS market capabilities, and system architecture Customer Context Architecture and Engineering Cycle Integration Market Context Reconciliation Life cycle of continuous system evolution Iteration 1 Iteration 2 Iteration 3 Iteration by Carnegie Mellon University Version 1 ISW page 11
12 Survivability Impact Reconcile mission survivability with COTS capabilities Assess COTS vendors for survivability focus Evaluate survivability of COTS products Achieve survivability in system integration Treat architecture as survivability integrator Maintain survivability as COTS products evolve 2000 by Carnegie Mellon University Version 1 ISW page 12
Sustaining Software-Intensive Systems - A Conundrum
Pittsburgh, PA 15213-3890 Sustaining Software-Intensive Systems - A Conundrum Mary Ann Lapham Sponsored by the U.S. Department of Defense 2006 by Carnegie Mellon University Version 2 GSAW 2006 - page 1
More informationRevising the National Strategy for Homeland Security
Revising the National Strategy for Homeland Security September 2007 The Need for a Revised Strategy Reflect the evolution of the homeland security enterprise since the National Strategy for Homeland Security
More informationVacancy Announcement
Vacancy Announcement ***When applying for this position, refer to "POSITION # 5345" on your application package.*** POSITION: Cybersecurity Senior Specialist (#5345) DEPARTMENT: Cybersecurity / Systems
More informationSupply Chain Risk Management
Supply Chain Risk Management 731 07 December 2013 A. AUTHORITY: The National Security Act of 1947, as amended; 50 USC 3329, note (formerly 50 USC 403-2, note); the Counterintelligence Enhancement Act of
More informationProcedure: 3.4.1p2. (II.D.2a.) Business Continuity Planning
Procedure: 3.4.1p2. (II.D.2a.) Business Continuity Planning Revised: January 17, 2017; November 7, 2013 Last Reviewed: January 17, 2017; October 14, 2016 Adopted: November 7, 2013 I. PURPOSE: The Business
More informationCMMI: The DoD Perspective
Sponsored by the U.S. Department of Defense 2006 by Carnegie Mellon University CMMI: The DoD Perspective Rick Barbour Chief Engineer Navy, Acquisition Support Program page 1 Acknowledgement Presentation
More informationThe Journey of Commercialization
The Journey of Commercialization, Partner, Sell Mike Broeker April, 2018 The Intelligent Workplace The Robert L. Preger Intelligent Workplace, built in 1997, is a 7000 square foot living laboratory of
More information8. Data Acquisition: Provide self-monitoring facility environments that become a source of research data and information.
EXECUTIVE SUMMARY Transformation to 21 st -century care delivery presents the Department of Veterans Affairs (VA) with critical challenges similar to those confronting private sector healthcare facility
More informationCYBER ATTACK SCENARIO
SCENARIO A disgruntled former hospital employee with exceptional computer skills hacks into the hospital network from their home computer and plants a very aggressive computer virus into the Computer-Aided
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Navy Date: February 2015 1319: Research, Development, Test & Evaluation, Navy / BA 3: Advanced Development (ATD) COST ($ in Millions) Prior Years FY
More informationCyber Resiliency FAQ
Cyber Resiliency FAQ This FAQ document fosters knowledge by providing commonality in cyber resiliency terms and concepts. Cyber resiliency supports mission assurance goals for systems and systems-of-systems
More informationTest and Evaluation of Highly Complex Systems
Guest Editorial ITEA Journal 2009; 30: 3 6 Copyright 2009 by the International Test and Evaluation Association Test and Evaluation of Highly Complex Systems James J. Streilein, Ph.D. U.S. Army Test and
More informationMission Threads: Bridging Mission and Systems Engineering
Mission Threads: Bridging Mission and Systems Engineering Dr. Greg Butler Engility Corp Dr. Carol Woody Software Engineering Institute SoSECIE Webinar June 20, 2017 Any opinions, findings and conclusions,
More informationThe State of US Voting System Security DEFCON Voting Machine Hacking Village July 2017
The State of US Voting System Security DEFCON Voting Machine Hacking Village July 2017 Joshua M Franklin National Institute of Standards and Technology Election Fraud Types - 1934 Registration fraud Repeating
More informationBay Area UASI. Introduction to the Bay Area UASI (Urban Areas Security Initiative) Urban Shield Task Force Meeting
Bay Area UASI Introduction to the Bay Area UASI (Urban Areas Security Initiative) Urban Shield Task Force Meeting 1221 Oak Street Room 225, Oakland, CA March 10, 2017 About the Bay Area UASI Its mission
More informationIntegrating Software Architecture Evaluation in a DoD System Acquisition
Pittsburgh, PA 15213-3890 Integrating Software Architecture Evaluation in a DoD System Acquisition John Bergey Timothy Morrow April 2005 Sponsored by the U.S. Department of Defense 2005 by Carnegie Mellon
More informationCybersecurity TEMP Body Example
ybersecurity TEMP Body Example 1.3. System Description (...) A unit equipped with TGVS performs armed reconnaissance missions and provides operators with sensors and weapons to observe and engage enemies.
More informationRisk themes from ATAM data: preliminary results
Pittsburgh, PA 15213-3890 Risk themes from ATAM data: preliminary results Len Bass Rod Nord Bill Wood Software Engineering Institute Sponsored by the U.S. Department of Defense 2006 by Carnegie Mellon
More informationUnit 2: Requirements for Continuity Planning
: Requirements for Continuity Planning Objectives At the end of this unit, you should be able to: 1. Describe the requirements of National Security Presidential Directive (NSPD) 51/Homeland Security Presidential
More informationOverview of the New Introduction to CMMI Course and Changes to the Intermediate Concepts and Instructor Training Courses
Pittsburgh, PA 15213-3890 Overview of the New Introduction to Course and Changes to the Intermediate Concepts and Instructor Training Courses SM CMM Integration, IDEAL, and SCAMPI are service marks of
More informationApplying CMMI for Services (CMMI-SVC) to Health Care
Applying CMMI for Services (CMMI-SVC) to Health Care Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Eileen Forrester October 2008 Contact information The next few slides
More informationUNCLASSIFIED. FY 2017 Base FY 2017 OCO. Quantity of RDT&E Articles Program MDAP/MAIS Code: 493
Exhibit R-2, RDT&E Budget Item Justification: PB 2017 Air Force : February 2016 COST ($ in Millions) Years PE 0605230F / Ground d Strategic Deterrent FY 2018 FY 2019 FY 2020 FY 2021 To Program Element
More informationReducing System Acquisition Risk with Software Architecture Analysis and Evaluation
Reducing System Acquisition Risk with Software and Evaluation Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-3890 Sponsored by the U.S. Department of Defense 2003 by Carnegie
More informationCOTS Selection and Adoption in a Small Business Environment. How Do You Downsize the Process?
Pittsburgh, PA 15213-3890 COTS Selection and Adoption in a Small Business Environment How Do You Downsize the Process? Bill Anderson, MTS, SEI Sponsored by the U.S. Department of Defense 2003 by Carnegie
More informationRapid Innovation Fund (RIF) Program
Rapid Innovation Fund (RIF) Program Cyber Security Workshop January 2015 Dan Cundiff Deputy Director, Comparative Technology Office OASD (R&E) Emerging Capabilities & Prototyping E-mail: thomas.d.cundiff.civ@mail.mil
More informationKeep on Keepin On Arkansas Continuity of Operations Program
Buiness Continuity Keep on Keepin On Arkansas Continuity of Operations Program Planning to continue critical operations in the event of a disaster should be as commonplace as securing insurance on buildings
More informationPittsburgh, /7/2014. Cyber Vulnerabilities in the Intangible World
Cyber Vulnerabilities in the Intangible World MACPA 2014 Government and Not for Profit Conference Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Robert Behler, Deputy Director
More informationSEVEN SEVEN. Credentialing tips designed to help keep costs down and ensure a healthier bottom line.
Seven Tips to Succeed in the Evolving Credentialing Landscape SEVEN SEVEN Credentialing tips designed to help keep costs down and ensure a healthier bottom line. 7The reimbursement shift from fee-for-service
More informationDOD INSTRUCTION ACCOUNTABILITY AND MANAGEMENT OF INTERNAL USE SOFTWARE (IUS)
DOD INSTRUCTION 5000.76 ACCOUNTABILITY AND MANAGEMENT OF INTERNAL USE SOFTWARE (IUS) Originating Component: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics Effective:
More informationApplying the Goal-Question-Indicator- Metric (GQIM) Method to Perform Military Situational Analysis
Applying the Goal-Question-Indicator- Metric (GQIM) Method to Perform Military Situational Analysis Douglas Gray May 2016 TECHNICAL NOTE CMU/SEI-2016-TN-003 CERT Division http://www.sei.cmu.edu REV-03.18.2016.0
More informationWhen and Where to Apply the Family of Architecture- Centric Methods
When and Where to Apply the Family of - Centric Methods Mike Gagliardi Tim Morrow Bill Wood Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Copyright 2015 Carnegie Mellon
More informationThe CMMI Product Suite and International Standards
Pittsburgh, PA 15213-3890 The CMMI Product Suite and International Standards Dave Kitson, Jeanie Kitson, Terry Rout and Pedro Sousa CMMI is registered in the US Patent & Trademark Office by Carnegie Mellon
More informationLessons Learned from the MSG- 128 Study on Incremental Implementation of NATO Mission Training through Distributed Simulation Operations
Lessons Learned from the MSG- 128 Study on Incremental Implementation of NATO Mission Training through Distributed Simulation Operations Jean-Pierre FAYE (Behalf the MSG-128 TG) MSG-143 Symposium, Bucharest,
More informationGuide to the SEI Partner Network
Guide to the SEI Partner Network January 2018 Your Guide to Delivering SEI Services The SEI Partner Network is a premier group of organizations that deliver time-tested, proven services developed by the
More informationSuccess through Offshore Outsourcing. Kartik Jayaraman Director Enterprise Relationships (Strategic Accounts)
Success through Offshore Outsourcing Kartik Jayaraman Director Enterprise Relationships (Strategic Accounts) Offshore Outsourcing Today Outsourcing Viewed as Strategic Value Target set Higher Multi-year
More informationSchool Earthquake Preparedness Guidebook
School Earthquake Preparedness Guidebook State of Arkansas TABLE OF CONTENTS Introduction Section 1 Section 2 Section 3 Section 4 Section 5 Section 6 Appendix 1 Appendix 2 Appendix 3 Administrator The
More informationAGI Technology for EW and AD Dominance
AGI Technology for EW and AD Dominance Singapore 2015 Content Overview of Air Defense Overview of Electronic Warfare A practical example Value proposition Summary AMD - a multidisciplinary challenge Geography
More informationIntelligence Operations (HMSY 1340) Online. Credit: 3 semester credit hours (3 hours lecture)
Operations (HMSY 1340) Online Credit: 3 semester credit hours (3 hours lecture) Prerequisite/Co-requisite: Complete the Online Orientation and answer yes to 7+ questions on the Online Learner Self-Assessment:
More informationWARFIGHTER MODELING, SIMULATION, ANALYSIS AND INTEGRATION SUPPORT (WMSA&IS)
EXCERPT FROM CONTRACTS W9113M-10-D-0002 and W9113M-10-D-0003: C-1. PERFORMANCE WORK STATEMENT SW-SMDC-08-08. 1.0 INTRODUCTION 1.1 BACKGROUND WARFIGHTER MODELING, SIMULATION, ANALYSIS AND INTEGRATION SUPPORT
More information[Discussion Draft] [DISCUSSION DRAFT] SEPTEMBER 9, H. R. ll
F:\M\JOHNGA\JOHNGA_03.XML [Discussion Draft] 4TH CONGRESS 2D SESSION [DISCUSSION DRAFT] SEPTEMBER, H. R. ll To direct the Secretary of Homeland Security to conduct research and development to mitigate
More informationCyber Attack: The Department Of Defense s Inability To Provide Cyber Indications And Warning
Cyber Attack: The Department Of Defense s Inability To Provide Cyber Indications And Warning Subject Area DOD EWS 2006 CYBER ATTACK: THE DEPARTMENT OF DEFENSE S INABILITY TO PROVIDE CYBER INDICATIONS AND
More informationNew DoD Approaches on the Cyber Survivability of Weapon Systems
New DoD Approaches on the Cyber Survivability of Weapon Systems Colonel Dean Data Clothier Chief, Cyberspace Division Joint Staff/J-6 CSE is the Critical Foundation for Ensuring Cyber Survivability is
More informationHIE Implications in Meaningful Use Stage 1 Requirements
s in Meaningful Use Stage 1 Requirements HIMSS Health Information Exchange Steering Committee March 2010 2010 Healthcare Information and Management Systems Society (HIMSS). 1 An HIE Overview Health Information
More informationTowards faster implementation and uptake of open government
Towards faster implementation and uptake of open government EXECUTIVE SUMMARY ENGLISH A study prepared for the European Commission DG Communications Networks, Content & Technology by: Digital Single Market
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5210.88 February 11, 2004 USD(I) SUBJECT: Safeguarding Biological Select Agents and Toxins References: (a) Directive-Type Memorandum, "Safeguarding Biological Select
More informationCoflight efdp Angelo Corsaro, Ph.D. Software Technologies Scientist
Coflight efdp Angelo Corsaro, Ph.D. Software Technologies Scientist Strategic and Technological Planning Directorate SELEX-SI [angelo.corsaro@selex-si.com] Agenda Group Overview Coflight Programme DDS
More informationWhy Isn t Someone Coding Yet (WISCY)? Avoiding Ineffective Requirements
Why Isn t Someone Coding Yet (WISCY)? Avoiding Ineffective Charlene Gross, Sr Member Technical Staff Software Engineering Institute Presented at the SEPG, May 2004, in Orlando, Florida 2003 by Carnegie
More informationSubj: INFORMATION MANAGEMENT/INFORMATION TECHNOLOGY POLICY FOR FIELDING OF COMMERCIAL OFF THE SHELF SOFTWARE
D E PAR TME NT OF THE N A VY OFFICE OF T HE SECRET ARY 1000 NAVY PENT AGON WASHINGT ON D C 20350-1000 SECNAVINST 5230.15 DON CIO SECNAV INSTRUCTION 5230.15 From: Secretary of the Navy Subj: INFORMATION
More informationDepartment of Defense INSTRUCTION. SUBJECT: Physical Security Equipment (PSE) Research, Development, Test, and Evaluation (RDT&E)
Department of Defense INSTRUCTION NUMBER 3224.03 October 1, 2007 USD(AT&L) SUBJECT: Physical Security Equipment (PSE) Research, Development, Test, and Evaluation (RDT&E) References: (a) DoD Directive 3224.3,
More informationPatient Safety Reporting System for Nursing Homes Patient Safety Authority Commonwealth of Pennsylvania. Government to Business (G to B)
Patient Safety Reporting System for Nursing Homes Patient Safety Authority Commonwealth of Pennsylvania Government to Business (G to B) Prepared by: Howard Newstadt, JD, MBA CIO/Finance Manager Pennsylvania
More informationUNCLASSIFIED. UNCLASSIFIED Army Page 1 of 7 R-1 Line #9
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Army Date: March 2014 2040:, Development, Test & Evaluation, Army / BA 2: Applied COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY
More informationTitle IV E Eligibility CPI Specialty Track
Module 1: Introduction to Child Protective Investigations Learning Objectives: Unit 1.1: Reviewing the Child Welfare Practice Model Describe the Child Protective Investigation process and the types of
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 3150.02 April 24, 2013 USD(AT&L) SUBJECT: DoD Nuclear Weapons Surety Program References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD)
More informationUNCLASSIFIED. UNCLASSIFIED Navy Page 1 of 7 R-1 Line #16
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Navy Date: March 2014 1319: Research, Development, Test & Evaluation, Navy / BA 3: Advanced Development (ATD) COST ($ in Millions) Prior Years FY 2013
More informationOutsourced Product Development
Outsourced Product Development - An Overview Outsourced Product Development - An Overview 2 ABSTRACT: Outsourced Product Development (OPD) is a rapidly emerging niche as more product companies consider
More informationMission Thread Workshop (MTW): Preparation and Execution
Mission Thread Workshop (MTW): Preparation and Execution Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Tim Morrow Mike Gagliardi Bill Wood SATURN 2013 May 2, 2013 Outline
More informationCommunity Emergency Management Program
City of Greater Sudbury Community Emergency Management Program Tim P. Beadman, Director Emergency Planning & Strategic Services December 15, 2004 1 Why the need for an Emergency Management Program? Presentation
More informationMeeting Today s Healthcare Security Challenges with Integrated Technologies
Meeting Today s Healthcare Security Challenges with Integrated Technologies Steve Nibbelink, CHPA October, 2013 Our Agenda _ The Hospital Basics _ Impact Organizations in Healthcare Security _ Security
More informationInformation Technology Management
February 24, 2006 Information Technology Management Select Controls for the Information Security of the Ground-Based Midcourse Defense Communications Network (D-2006-053) Department of Defense Office of
More informationDecember 17, 2003 Homeland Security Presidential Directive/Hspd-8
Page 1 of 7 For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-8 Subject: National Preparedness Purpose (1) This directive
More information9/10/2016. What is a Cycle? Learning Objectives
Keep the Cycle Going: Maintaining a Healthy Long Term Care Revenue Cycle and Key Strategies for Successful Reimbursement Management September 29, 2016 What is a Cycle? By law of periodical repetition,
More informationCHAMPS. Community Hazard Assessment & Mitigation Planning System. An Introduction
CHAMPS Community Hazard Assessment & Mitigation Planning System An Introduction How did CHAMPS evolve? PARTNERS Kentucky Division of Emergency Management Department for Local Government Center for Hazards
More informationHuman Systems Integration (HSI)
Human Systems Integration (HSI) Human-System Metrics Applied to Optimize AF Warfighter Capability 13 March 2018 Integrity Service Excellence NDIA Human Systems Conference Ms. Sarah Orr Human Systems Integration
More informationCYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy
CYBER SECURITY PROTECTION Section III of the DOD Cyber Strategy Overview Build and maintain ready forces and capabilities to conduct cyberspace operations Defend the DOD information network, secure DOD
More informationCountering Weapons of Mass Destruction Other Transaction Agreement
Joint Program Executive Office for Chemical and Biological Defense Joint Program Executive Office for Chemical and Biological Defense Countering Weapons of Mass Destruction Other Transaction Agreement
More informationICT and Disaster Risk Reduction Division ESCAP
E-RESILIENCE FOR SUSTAINABLE DEVELOPMENT Ms. Atsuko Okuda, Chief IDS ICT and Development Section ICT and Disaster Risk Reduction Division ESCAP Introduction What is E-Resilience? ICT plays a pivotal role
More informationHealthCare IT Solutions. Supporting Medicaid from Start to Future
HealthCare IT Solutions Supporting Medicaid from Start to Future The success of any state s Medicaid strategy relies on selecting a core partner with a proven, next-generation, certified system; Medicaid-proficient
More informationKSBCL/SYS 2 020/ Date: 22/03/2014. Notice for Time Extension. Sub: Information Security Management System Implementation
KARNATAKA STATE BEVERAGES CORPORATION LIMITED (A Govt. of Karnataka Enterprise) 78, Seethalakshmi Towers, Mission Road, Bangalore-560 027. Ph: 22483638/ 39 Fax: 22483645 KSBCL/SYS 2 020/2013-14 Date: 22/03/2014
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE
Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Army DATE: April 2013 COST ($ in Millions) All Prior FY 2014 Years FY 2012 FY 2013 # Base FY 2014 FY 2014 OCO ## Total FY 2015 FY 2016 FY 2017 FY 2018
More informationCarnegie Mellon University Notice
Carnegie Mellon University Notice This video and all related information and materials ( materials ) are owned by Carnegie Mellon University. These materials are provided on an as-is as available basis
More informationQuality Assurance (QA) Work Plan. Advance Corrections Initiative
Quality Assurance (QA) Work Plan for the State of Washington Department of Corrections Advance Corrections Initiative Prepared by Page i Table of Contents 1. QA OBJECTIVES... 1 2. QA APPROACH... 2 2.1
More informationJoint Staff J7 Cyberspace Environment Division / Joint Information Operations Range (JIOR) Overview
Joint Staff J7 Cyberspace Environment Division / Joint Information Operations Range (JIOR) Overview Approved for Public Release by Joint Staff Public Affairs - Hampton Roads 18 Dec 15 JIOR Background DoD
More informationSCAMPI B&C Tutorial. Software Engineering Process Group Conference SEPG Will Hayes Gene Miluk Jack Ferguson
Pittsburgh, PA 15213-3890 SCAMPI B&C Tutorial Software Engineering Process Group Conference SEPG 2004 Will Hayes Gene Miluk Jack Ferguson CMMI is registered in the U.S. Patent and Trademark Office by Carnegie
More informationUniversity of Pittsburgh
University of Pittsburgh Graduate School of Public Health Center for Bio- Terrorism Response 130 DeSoto Street Pittsburgh, Pennsylvania 1526 412-383-7985/7475 31 October 2000 The Honorable James S. Gilmore
More informationUNCLASSIFIED. UNCLASSIFIED Army Page 1 of 12 P-1 Line #51
Exhibit P-40, Budget Line Item Justification: PB 2017 Army : February 2016 2035A: Other Procurement, Army / BA 02: Communications and Electronics Equipment / BSA 64: Information Security ID Code (A=Service
More informationJohn R. Harrald, Ph.D. Director, Institute for Crisis, Disaster, and Risk Management The George Washington University.
John R. Harrald, Ph.D. Director, Institute for Crisis, Disaster, and Risk Management The George Washington University Testimony for the Senate Homeland Security Government Affairs Committee Hurricane Katrina:
More informationSoftware Architecture and Product Quality
Software Architecture and Product Quality Linda Northrop Director, Product Line Systems Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Presentation for the Boston SPIN May
More informationSAFE SCHOOL ZONE EMERGENCY RESPONSE AND CRISIS MANAGEMENT FOR SCHOOLS AND COMMUNITIES
EMERGENCY RESPONSE AND CRISIS MANAGEMENT FOR SCHOOLS AND COMMUNITIES SAFE SCHOOL ZONE TRAINING & CONSULTATION To schedule a training or consultation, contact the Center at SafeSchools@csc.csiu.org or (717)
More informationTraining and Evaluation Outline Report
Training and Evaluation Outline Report Status: Approved 19 Jun 2017 Effective Date: 02 Jan 2018 Task Number: 14-EAC-8027 Task Title: Conduct Paying Agent Operations (Financial Management Support Detachment
More informationTraining and Evaluation Outline Report
Training and Evaluation Outline Report Status: 20 Jun 2012 Effective Date: 28 Feb 2018 Task Number: 14-EAC-8008 Task Title: Provide Military Pay Support (Financial Management Support Unit (FMSU)) Distribution
More informationUNCLASSIFIED. UNCLASSIFIED R-1 Line Item #152 Page 1 of 15
Exhibit R-2, PB 2010 DoD Human Resources Activity RDT&E Budget Item Justification DATE: May 2009 6 - RDT&E Management Support COST ($ in Millions) FY 2008 Actual FY 2009 FY 2010 FY 2011 FY 2012 FY 2013
More informationAir Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force
Air Force Science & Technology Strategy 2010 F AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff ~~~ Secretary of the Air Force REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188
More information130 FERC 61,211 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION
130 FERC 61,211 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION Before Commissioners: Jon Wellinghoff, Chairman; Marc Spitzer, Philip D. Moeller, and John R. Norris. Mandatory Reliability
More informationUNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 7 R-1 Line #198
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Air Force : February 2015 3600: Research, Development, Test & Evaluation, Air Force / BA 7: Operational Systems Development COST ($ in Millions) FY
More informationProtecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information
Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information Mr. Brian D. Hughes Office of the Deputy Assistant Secretary of Defense for
More informationFuture Force Capabilities
Future Force Capabilities Presented by: Mr. Rickey Smith US Army Training and Doctrine Command Win in a Complex World Unified Land Operations Seize, retain, and exploit the initiative throughout the range
More informationChapter FM 3-19
Chapter 5 N B C R e c o n i n t h e C o m b a t A r e a During combat operations, NBC recon units operate throughout the framework of the battlefield. In the forward combat area, NBC recon elements are
More informationCYBERWAR: Strategic Information Warfare By Robert K. Hiltbrand Originally published Spring 1999
CYBERWAR: Strategic Information Warfare By Robert K. Hiltbrand Originally published Spring 1999 INTRODUCATION Before I begin this discussion, I must add this disclaimer. The research information I have
More informationOutsourcing Risk Management. UniCredit Group Experience
Risk UniCredit Group Experience Stefano Alberigo Unicredit Head of Operational & Reputational Risk Oversight Francesco Mottola Manager Accenture Finance & Risk Rome, 23 th June 2015 Agenda A Context &
More information1. Definitions. See AFI , Air Force Nuclear Weapons Surety Program (formerly AFR 122-1).
Template modified: 27 May 1997 14:30 BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 91-103 11 FEBRUARY 1994 Safety AIR FORCE NUCLEAR SAFETY CERTIFICATION PROGRAM COMPLIANCE WITH THIS
More informationUNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 5 R-1 Line #199
COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY 2015 FY 2015 OCO # Total FY 2016 FY 2017 FY 2018 FY 2019 Cost To Complete Total Program Element - 0.343 0.195 0.498-0.498 0.475 0.412 0.421
More informationArmy IAMD Modular Open Systems Approach
Army IAMD Modular Open Systems Approach Presented to the Defense Daily OA Summit The Power of Modularity and New Open Business Models Panel Presented by Mr. Charley Robinson, Director, System Engineering,
More informationAir Force Institute of Technology
Air Force Institute of Technology I n t e g r i t y - S e r v i c e - E x c e l l e n c e Educating the Future Leaders of America s Armed Forces AFIT Information Assurance Education and Research Gregg
More informationCOMPLIANCE WITH THIS PUBLICATION IS MANDATORY
BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE POLICY DIRECTIVE 10-25 26 SEPTEMBER 2007 Operations EMERGENCY MANAGEMENT ACCESSIBILITY: COMPLIANCE WITH THIS PUBLICATION IS MANDATORY Publications and
More informationCastles in the Clouds: Do we have the right battlement? (Cyber Situational Awareness)
Castles in the Clouds: Do we have the right battlement? (Cyber Situational Awareness) The Nation's Army in Cyberspace OVERALL CLASSIFICATION: US Army Cyber Command and Second Army 1 COL Mark Schonberg,
More informationTraining and Evaluation Outline Report
Training and Evaluation Outline Report Status: Approved 10 Oct 2007 Effective Date: 02 Jan 2018 Task Number: 14-EAC-8004 Task Title: Conduct Commercial Vendor Pay Operations (Financial Management Support
More informationOEM & Police. FY 2017 Proposed Budget Work Session. Tuesday, March 22, 2:30 4:30 pm
OEM & Police FY 2017 Proposed Budget Work Session Tuesday, March 22, 2:30 4:30 pm Agenda Related FAAC Report: Police Tuesday, March 22, 2016 2:30 4:30 PM Department / Topic Book pgs Web pgs Web Link Office
More informationThe best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen,
The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen, Marines, and Civilians who serve each day and are either involved in war, preparing for war, or executing
More informationJoint Information Environment. White Paper. 22 January 2013
White Paper "To fight and conquer in all bottles is not supreme excellence; supreme excellence consists in breaking the enemy's resistance without fighting." -Sun Tzu "Some people think design means how
More informationAdvanced Explosive Ordnance Disposal Robotic System (AEODRS)
Advanced Explosive Ordnance Disposal Robotic System (AEODRS) NDIA Meeting DISTRIBUTION UNLIMITED 22 MARCH 2017 Mr. Jim Ryan Assistant Program Manager Joint Service EOD 22 March 2017 Purpose Provide JEOD
More information