ISA 201 Information System Acquisition

Slides:



Advertisements
Similar presentations
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Advertisements

1 Process Engineering A Systems Approach to Process Improvement Jeffrey L. Dutton Jacobs Sverdrup Advanced Systems Group Engineering Performance Improvement.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Quality Activity Matrix Presented by Sandra Toalston President, SanSeek 1.
IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],
Course Overview Stephen M. Thebaut, Ph.D. University of Florida Software Engineering Foundations.
March 2004 At A Glance NASA’s GSFC GMSEC architecture provides a scalable, extensible ground and flight system approach for future missions. Benefits Simplifies.
Defense Business Systems (CLE077) Sprint November 9, 2015 DRAFT1 Sprint Working Group Toni Freeland Kevin Hamilton Lee Hewitt Tom Hickok Len Nale Bob Ramsey.
Table of Contents – Module 0 Overview of files associated with the Cloud CLM CLE - Module 0 - CLM Table of Contents1.
Module 4: Effect of Agile on the DoD Program Office TLO: Given a DoD program involved in software development using Agile philosophy methodologies, the.
FOR MORE CLASSES VISIT HCS 483 Entire Course (2 Set) FOR MORE CLASSES VISIT This Tutorial contains 2 Papers for each.
ISA 201 Intermediate Information Systems Acquisition
Tower CONOPS The Bull Dog Unmanned Ground Vehicle was originally planned for infantry combat patrols. Base security forces have come in with a requirement.
Office 365 Security Assessment Workshop
5 – Effect of Agile on Engineering & Test Staff
HCS 483 AID Perfect Education/hcs483aid.com
ISA 201 Intermediate Information Systems Acquisition
Software Risk Management
DoD SE Processes (DAG section)
ISA 201 Intermediate Information Systems Acquisition
ISA201 Version June 2017 Deployment Overview
ISA 201 Information System Acquisition
ISA 201 Information System Acquisition
DoD Lifecycle Changes that affect you!
ISA 201 Information System Acquisition
HCS 455 EDU Inspiring Minds/hcs455edu.com
Identify the Risk of Not Doing BA
ISA 301 Advanced Enterprise Information Systems Acquisition
Quality Exercise 2 Instructions
ISA 201 Intermediate Information Systems Acquisition
DT249/4 Information Systems Engineering Lecture 0
ISA 301: Advanced Enterprise Information Systems Acquisition
Programme Board 6th Meeting May 2017 Craig Larlee
ISA 201 Intermediate Information Systems Acquisition
ISA 201 Intermediate Information Systems Acquisition
Advanced Software Acquisition Management ISA 320
Security Engineering.
Quality Exercise 2 Instructions
ISA 201 Information System Acquisition
Today we will learn to: Describe emerging and advanced information technologies. Identify the basic concepts, threats, and best practices associated with.
Cybersecurity EXERCISE (CE) ATD Scenario intro
Quality Exercise 2 Instructions
Defense Business Systems (CLE077) Sprint
Microsoft SAM Managed Service Program
CMGT 445 Competitive Success/snaptutorial.com
HCS 483 Education for Service-- snaptutorial.com.
Download Latest CompTIA CAS-002 Exam Dumps PDF Questions - CAS-002 Best Study Material - Realexamdumps.com
HCS 483 Competitive Success/tutorialrank.com
HCS 483 Education for Service-- tutorialrank.com.
CMGT 445 Education for Service/snaptutorial.com
HCS 455 TUTORS Lessons in Excellence -- hcs455tutors.com.
CYB 100 Teaching Effectively-- snaptutorial.com
HCS 483 Teaching Effectively-- snaptutorial.com
CMGT 445 Teaching Effectively-- snaptutorial.com.
I have many checklists: how do I get started with cyber security?
Managing Change and Other Keys to Successful Implementation
Systems analysis and design, 6th edition Dennis, wixom, and roth
Improve Phase Wrap Up and Action Items
Systems analysis and design, 6th edition Dennis, wixom, and roth
Section 2.0 Project Management Overview
Microsoft SAM Managed Service Program
©Joan Sedita, Kinds of PD Follow Up ©Joan Sedita,
Joint Planning and Development Office “Where new ideas are welcome”
Employee engagement Delivery guide
Senior Project - Part II
Lecturette 2: Planning Change
Digital Acquisition Pilot Iteration 1.B Planning Meeting
*Separate register for CTF at:
The prospecting rulebook, A 4-WEEK strategy document
Presentation transcript:

ISA 201 Information System Acquisition

Lesson 18 Student Panels LESSON INFORMATION*************************************************************************************************** Lesson Point of Contact: Name: Sterling Mullis Phone: 703.805.5410 Email: sterling.mullis@dau.mil Read Ahead: None Length of Presentation: 3.5 Presentation: 3.5 hours Exercise: 0 hours *ELO ID: ELO 99.201.18.1 Describe emerging and advanced information technologies. ELO 26.1.1.2 Identify the basic concepts, threats, and best practices associated with cybersecurity in the DoD. ELO 24.1.1.10 Given acquisition scenarios with several software-reliant program issues, analyze how each issue may affect achieving the program's software quality objectives ELO 24.1.1.14 Identify quality issues unique to software ELO 31.1.1.4 Recognize the benefits of consuming cloud services. ELO 31.1.1.14 Recognize public, private, community and hybrid cloud deployment models (NIST). ELO 31.1.1.5 Recognize some DoD Concerns of Using Cloud Services ELO 99.201.13.1 Compare and contrast the major DoD software development paradigms and recognize new development paradigms and trends. ELO 99.201.6.1 Track how the DoD information technology systems engineering process supports DoD Acquisition Management processes ELO 99.201.19.3 Describe the keys to successful software sustainment and support. ****************************************************************************************************************************

Today we will learn to: Describe emerging and advanced information technologies. Identify the basic concepts, threats, and best practices associated with cybersecurity in the DoD. Given acquisition scenarios with several software-reliant program issues, analyze how each issue may affect achieving the program's software quality objectives; Identify quality issues unique to software Compare and contrast the major DoD software development paradigms and recognize new development paradigms and trends Track how the DoD information technology systems engineering process supports DoD Acquisition Management processes Describe the keys to successful software sustainment and support. Recognize the benefits of consuming cloud services; Recognize public, private, community and hybrid cloud deployment models (NIST); Recognize some DoD Concerns of Using Cloud Services SLIDE INFORMATION*************************************************************************************************************************** *Slide Type: Exercise (Content or Exercise) *Supporting ELOs ID: ELO 99.201.18.1 Describe emerging and advanced information technologies ELO ID: ELO 99.201.18.1 Describe emerging and advanced information technologies. ELO 26.1.1.2 Identify the basic concepts, threats, and best practices associated with cybersecurity in the DoD. ELO 24.1.1.10 Given acquisition scenarios with several software-reliant program issues, analyze how each issue may affect achieving the program's software quality objectives ELO 24.1.1.14 Identify quality issues unique to software ELO 31.1.1.4 Recognize the benefits of consuming cloud services. ELO 31.1.1.14 Recognize public, private, community and hybrid cloud deployment models (NIST). ELO 31.1.1.5 Recognize some DoD Concerns of Using Cloud Services ELO 99.201.13.1 Compare and contrast the major DoD software development paradigms and recognize new development paradigms and trends. ELO 99.201.6.1 Track how the DoD information technology systems engineering process supports DoD Acquisition Management processes ELO 99.201.19.3 Describe the keys to successful software sustainment and support. *Policy / Directive / Standard / DTM ID: ********************************************************************************************************************************************************** Key Points: Key Questions to Ask and Anticipated Answers: Terms \ Definitions \ Acronyms: Student Panels IRM 202 Financial Management October 2009

Panel Rules and Possible Approaches Lesson Plan Panel Rules and Possible Approaches Potential Panel Topics SLIDE INFORMATION*************************************************************************************************************************** *Slide Type: Exercise (Content or Exercise) *Supporting ELOs ID: None at this time *Policy / Directive / Standard / DTM ID: ********************************************************************************************************************************************************** Key Points: Key Questions to Ask and Anticipated Answers: Terms \ Definitions \ Acronyms: Student Panels IRM 202 Financial Management October 2009

Student-led Discussion Panels Sign up before Lunch Tomorrow for a specific topic Cybersecurity Software Development / Quality Software / Systems Engineering Cloud Computing Software Support Emerging Technology SLIDE INFORMATION*************************************************************************************************************************** *Slide Type: Content (Content or Exercise) *Supporting ELOs ID: None at this time *Policy / Directive / Standard / DTM ID: ********************************************************************************************************************************************************** Key Points: This is an opportunity to share your knowledge in a specific topic area! On the last Thursday of the course you will be presenting information on a specific topic area of your choice (with some constraints). You will be working in teams to present on a specific topic area but these teams are NOT the same teams you will be working with for the rest of the course! The instructor will write specific topic areas on the white board (Systems Engineering, Software Development, etc…) and you will individually sign up under a topic of your choice! Maybe you are already an expert in the area or maybe you want to learn more about a specific area – either is fine. Please sign up for a specific topic by tomorrow morning! Write the topics on a white board or butcher paper so they are able to sign up by COB on the first day of class! Ensure that at least one group does choose Emerging Technology as their topic. Exploration of Emerging Technologies is a course Learning Objective Key Questions to Ask and Anticipated Answers: Terms \ Definitions \ Acronyms: More information is available in the Student panel directory on the Student Compact Disk (CD) You can also get information in the references folders of each class (also on your CD) Introduction

Student Panel Rules Rule Number 1: Format is your call Within bounds of Good Taste and Propriety! Related to topics covered in class or at least associated with Information Technology (IT) or Software Intensive System (SIS) areas of interest. You can replace an existing topic with one of your choice provided it meets the requirements (min of 4 team members); however, it has to replace another topic. 30-minute maximum time. Rule Number 2: Coordinated Effort Minimum of 4, Maximum of 6 per team. Class time will be made available throughout the two weeks for preparation. Rule Number 3: Opportunity Make this a Learning/Teaching experience for the entire class. SLIDE INFORMATION*************************************************************************************************************************** *Slide Type: Content (Content or Exercise) *Supporting ELOs ID: None at this time *Policy / Directive / Standard / DTM ID: ********************************************************************************************************************************************************** Key Points: These are the basic rules for the discussion panels. If the students decide to come up with their own topic it has to replace another topic or I have found there is not enough time to perform the brief backs at 30-minutes per presentation. However, whatever you think is best. I have also found that cutting them off at 30-minutes is best and then making a “parking lot” for the questions work well and just visiting this after all the presentations are complete works well. If I don’t do this it seems some go 45+ minutes and by the last presentation the class is ready to go and participation goes down.. But again wherever you think is best given the climate of the class! Key Questions to Ask and Anticipated Answers: Terms \ Definitions \ Acronyms: Introduction IRM 202 Financial Management October 2009 6

Possible Ways to Approach Student Panel Discussion Standard Presentation format Individual Panel member throws out a topic for discussion and then elicits class responses Panel members present topic pros and cons and then involve class in discussion Role play—e.g., One panel member is PM, another is an cybersecurity professional—then discuss Point/counterpoint format Game Format (like "Jeopardy", or "Are You Smarter than a Fifth Grader?", or "Who Wants to be a Millionaire?") SLIDE INFORMATION*************************************************************************************************************************** *Slide Type: Content (Content or Exercise) *Supporting ELOs ID: None at this time *Policy / Directive / Standard / DTM ID: ********************************************************************************************************************************************************** Key Points: More ideas for the panel formats… You can also note that more information is available in the Student panel directory on the Student CD Key Questions to Ask and Anticipated Answers: Terms \ Definitions \ Acronyms: Introduction

Potential Panel Topics Lesson Plan Status Panel Rules and Possible Approaches Potential Panel Topics SLIDE INFORMATION*************************************************************************************************************************** *Slide Type: Exercise (Content or Exercise) *Supporting ELOs ID: ELO 99.201.18.1 Describe emerging and advanced information technologies *Policy / Directive / Standard / DTM ID: ********************************************************************************************************************************************************** Key Points: Key Questions to Ask and Anticipated Answers: Terms \ Definitions \ Acronyms: Student Panels IRM 202 Financial Management October 2009

Wearable User Interfaces Emerging Technology Unclassified info-brief about projects on which you are currently working Discussion of other emerging IT related capabilities and their impact to the DoD Next-Gen Robotics Biochips SLIDE INFORMATION*************************************************************************************************************************** **Slide Type: Exercise (Content or Exercise) *Supporting ELOs ID: ELO 99.201.18.1 Describe emerging and advanced information technologies *Policy / Directive / Standard / DTM ID: ********************************************************************************************************************************************************** Key Points: Key Questions to Ask and Anticipated Answers: Terms \ Definitions \ Acronyms: Big Data Quantum Computing Wearable User Interfaces 3D/4D Printing Student Panels

Cybersecurity Biggest Cyber problem within DoD State of DoD Cyber compared to private sector Confidentiality, Integrity, Availability (CIA)—what does DoD value the most? Least? Software Assurance—What is it? Is it utilized as needed within DoD or is it an afterthought? Software vulnerabilities Emerging Cyber Technologies Cyber Policy and guidance Types of Cyber Attacks Access Control On-line Cyber Resources Number 1 security threat Cyber espionage / terrorism Insider threat Cyber Tools Recent Cyber Trends Effectiveness of common security tactics Cyber Best Practices SLIDE INFORMATION*************************************************************************************************************************** **Slide Type: Exercise (Content or Exercise) *Supporting ELOs ID: ELO 26.1.1.2 Identify the basic concepts, threats, and best practices associated with cybersecurity in the DoD. *Policy / Directive / Standard / DTM ID: ********************************************************************************************************************************************************** Key Points: Key Questions to Ask and Anticipated Answers: Terms \ Definitions \ Acronyms: Student Panels

Cloud Computing Cloud Policy and guidance Cloud Resources Cloud Tools Recent Cloud Trends Cloud Best Practices Limitations in transitioning to Cloud Personal experiences with Cloud implementations Mission-related considerations with transitioning to Cloud Biggest Cloud problem within DoD State of DoD Cloud compared to private sector Emerging Cloud Technologies Cloud providers Cloud transition strategies Benefits of transitioning to Cloud Cloud terminology SLIDE INFORMATION*************************************************************************************************************************** **Slide Type: Exercise (Content or Exercise) *Supporting ELOs ID: ELO 99.201.18.1 None at this time *Policy / Directive / Standard / DTM ID: ********************************************************************************************************************************************************** Key Points: Key Questions to Ask and Anticipated Answers: Terms \ Definitions \ Acronyms: Student Panels

Software Quality Defining and measuring software quality (metrics) Software quality initiatives Practical Software and Systems Measurement (PSM) Relating developer process maturity to software quality ISO 9000 series Other quality initiatives Software quality Processes Lean Six Sigma Continuous Process improvement Software engineering Software Cleanroom Engineering Software Quality factors (ilities—reliability, portability, …) Software quality best practices Preventing common types of software errors SLIDE INFORMATION*************************************************************************************************************************** **Slide Type: Exercise (Content or Exercise) *Supporting ELOs ID: None at this time *Policy / Directive / Standard / DTM ID: ********************************************************************************************************************************************************** Key Points: Key Questions to Ask and Anticipated Answers: Terms \ Definitions \ Acronyms: Student Panels

Software Development Software development paradigms and the relative success or failure: Rapid Application Development (RAD) Agile Extreme Programming (XP), Scrum, Crystal, Feature Driven Development, Open Source Software Development, … Software Assurance Vulnerabilities Best Practices Capability Maturity Model Integrated (CMMI) As a predictor of quality As a predictor of schedule and cost overruns COTS Software benefits and challenges Data Management Data Rights SLIDE INFORMATION*************************************************************************************************************************** **Slide Type: Exercise (Content or Exercise) *Supporting ELOs ID: None at this time *Policy / Directive / Standard / DTM ID: ********************************************************************************************************************************************************** Key Points: Key Questions to Ask and Anticipated Answers: Terms \ Definitions \ Acronyms: Student Panels

Software Support Software Support best practices Software maintenance and maintenance process The Software Support Plan and other planning considerations The importance of support planning throughout the acquisition lifecycle Commercial Off The Shelf (COTS) Software support considerations Software reuse and software support System transition critical success factors Software deployment strategies System disposal issues The Software Transition Plan The Software Installation Plan SLIDE INFORMATION*************************************************************************************************************************** **Slide Type: Exercise (Content or Exercise) *Supporting ELOs ID: None at this time *Policy / Directive / Standard / DTM ID: ********************************************************************************************************************************************************** Key Points: Key Questions to Ask and Anticipated Answers: Terms \ Definitions \ Acronyms: Student Panels

Software / Systems Engineering Systems Engineering and Software engineering Applying the systems engineering process to software Systems engineering technical management processes Decision Analysis Technical Planning Technical Assessment Requirements Management Risk Management Configuration Management Technical Data Management Interface Management Systems Engineering and technical reviews Architectures Systems engineering technical processes Stakeholders Requirements Definition Requirements Analysis Architectural Design Implementation Integration Verification Validation Transition SLIDE INFORMATION*************************************************************************************************************************** **Slide Type: Exercise (Content or Exercise) *Supporting ELOs ID: None at this time *Policy / Directive / Standard / DTM ID: ********************************************************************************************************************************************************** Key Points: Key Questions to Ask and Anticipated Answers: Terms \ Definitions \ Acronyms: Student Panels

Today we will learned to: Describe emerging and advanced information technologies. Identify the basic concepts, threats, and best practices associated with cybersecurity in the DoD. Given acquisition scenarios with several software-reliant program issues, analyze how each issue may affect achieving the program's software quality objectives; Identify quality issues unique to software Compare and contrast the major DoD software development paradigms and recognize new development paradigms and trends Track how the DoD information technology systems engineering process supports DoD Acquisition Management processes Describe the keys to successful software sustainment and support. Recognize the benefits of consuming cloud services; Recognize public, private, community and hybrid cloud deployment models (NIST); Recognize some DoD Concerns of Using Cloud Services SLIDE INFORMATION*************************************************************************************************************************** *Slide Type: Exercise (Content or Exercise) *Supporting ELOs ID: ELO 99.201.18.1 Describe emerging and advanced information technologies *Policy / Directive / Standard / DTM ID: ********************************************************************************************************************************************************** Key Points: Key Questions to Ask and Anticipated Answers: Terms \ Definitions \ Acronyms: Student Panels IRM 202 Financial Management October 2009