Rapid acquisition and fielding for information assurance and cyber security in the Navy

SummaryApproach -- Key findings and recommendations from the analysis xiii -- Acknowledgments -- Abbreviations -- Introduction -- Mitigating the cyber threat through rapid acquisition -- Study approach -- Organization of this report -- Testing (certification and accreditation) challenges, best pract...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Porche, Isaac R. (VerfasserIn)
Körperschaft: National Defense Research Institute (BerichterstatterIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: Santa Monica, Calif. u.a. 2012
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:SummaryApproach -- Key findings and recommendations from the analysis xiii -- Acknowledgments -- Abbreviations -- Introduction -- Mitigating the cyber threat through rapid acquisition -- Study approach -- Organization of this report -- Testing (certification and accreditation) challenges, best practices -- And recommendations -- Testing in the new IT acquisition strategy -- Navy modernization process challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Budgeting, funding, and contracts challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Governance, integration and training, and emergent needs challenges -- Best practices, and recommendations -- Challenges -- Recommendations -- Summary and conclusions -- Future work -- Appendix A: Survey of RAPID acquisition processes -- Appendix B: Navy RAPID acquisition options -- Appendix C: Case studies of successful RAPID/IT acquisition -- Navy case study: A-RCI -- Army case study: DRRS-A -- Marine Corps case study: Commercial hunter -- Appendix D: JCIDS and incremental acquisition background information -- Exceptions to JCIDS -- Description of "IT box" -- Appendix E: review of cyber and IT acquisition literature -- Legislation -- National research council report -- Defense Science Board report -- Other reports -- Appendix f: Air Force cyber acquisition -- Appendix G: Worms -- Worm attacks are an increasing problem -- Worm attacks require fast and frequent responses.
Summary -- Approach -- Key findings and recommendations from the analysis xiii -- Acknowledgments -- Abbreviations -- Introduction -- Mitigating the cyber threat through rapid acquisition -- Study approach -- Organization of this report -- Testing (certification and accreditation) challenges, best practices -- And recommendations -- Testing in the new IT acquisition strategy -- Navy modernization process challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Budgeting, funding, and contracts challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Governance, integration and training, and emergent needs challenges -- Best practices, and recommendations -- Challenges -- Recommendations -- Summary and conclusions -- Future work -- Appendix A: Survey of RAPID acquisition processes -- Appendix B: Navy RAPID acquisition options -- Appendix C: Case studies of successful RAPID/IT acquisition -- Navy case study: A-RCI -- Army case study: DRRS-A -- Marine Corps case study: Commercial hunter -- Appendix D: JCIDS and incremental acquisition background information -- Exceptions to JCIDS -- Description of "IT box" -- Appendix E: review of cyber and IT acquisition literature -- Legislation -- National research council report -- Defense Science Board report -- Other reports -- Appendix f: Air Force cyber acquisition -- Appendix G: Worms -- Worm attacks are an increasing problem -- Worm attacks require fast and frequent responses.
Beschreibung:Includes bibliographical references
Beschreibung:XXIII, 78 S
Ill., graph. Darst
ISBN:9780833078551
978-0-8330-7855-1