Design Rules for NBD – Network Based Defence

Slides:



Advertisements
Similar presentations
Integrated EA conference London March
Advertisements

2 Introduction A central issue in supporting interoperability is achieving type compatibility. Type compatibility allows (a) entities developed by various.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
MASTER - FP From High-level Regulations to Compliance Management Policies Beatriz Gallego – Nicasio Crespo PoFI 2011 June 9, Pisa, Italy.
Technical Report Writing
Information Systems Security Computer System Life Cycle Security.
1 Process Engineering A Systems Approach to Process Improvement Jeffrey L. Dutton Jacobs Sverdrup Advanced Systems Group Engineering Performance Improvement.
Oracle9i Performance Tuning Chapter 1 Performance Tuning Overview.
UML Diagrams: Class Diagrams The Static Analysis Model Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Chapter 7 Applying UML and Patterns Craig Larman
Lecture 7: Requirements Engineering
27/3/2008 1/16 A FRAMEWORK FOR REQUIREMENTS ENGINEERING PROCESS DEVELOPMENT (FRERE) Dr. Li Jiang School of Computer Science The.
Security Patterns Template and Tutorial - Darrell M. Kienzle, Ph.D., Matthew C. Elder, Ph.D., David S. Tyree, James Edwards-Hewitt Presented by Dan Frohlich.
NFV Configuration Problem Statements Haibin Song Georgios Karagiannis
Slide 1 2/22/2016 Policy-Based Management With SNMP SNMPCONF Working Group - Interim Meeting May 2000 Jon Saperia.
CIS-2005 : Xi’an - China 1 A New Conceptual Framework within Information Privacy: Meta Privacy Mr. Geoff Skinner Dr Song Han Prof. Elizabeth Chang Curtin.
Daniel Amyot, University of Ottawa Based on slides by Gunter Mussbacher (2009) and Stéphane Somé (2008) with material from these standards: IEEE ,
LedsystT Design Rules – Results and experiences
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
ITIL: Service Transition
Security analysis of COM with Alloy
Issues need harmonization
UML Diagrams: Class Diagrams The Static Analysis Model
Chapter 5 – Requirements Engineering
Trust Anchor Management Problem Statement
Software Configuration Management
Chapter 5:Design Patterns
Overview of TSG-X Femto Standardization Activities
EA framework service description Swedish Defence Materiel Administration Examples & technical approach Enterprice Architecture By Peder Blomqvist.
Proposed SFD Text for ai Link Setup Procedure
Software Life Cycle “What happens in the ‘life’ of software”
WP1: D 1.3 Standards Framework Status June 25, 2015
SysML 2.0 Model Lifecycle Management (MLM) Working Group
Modernization Maturity Model
Architecture Design Rules in LedsystT
CS 501: Software Engineering Fall 1999
TGai Guideline for Submissions to TGai Template Slides
Validation & conformity testing
The design process Software engineering and the design process for interactive systems Standards and guidelines as design rules Usability engineering.
The design process Software engineering and the design process for interactive systems Standards and guidelines as design rules Usability engineering.
CS 790M Project preparation (I)
Chapter 3: The Requirements Workflow
Engineering Processes
Data Stewardship Interest Group WGISS-45 Meeting
Introduction to Design Patterns Part 1
How to Read Research Papers?
Patterns.
Collaboration Adoption Framework
Analysis models and design models
Session 8 Performance and security aspects
An Introduction to Software Architecture
Collaboration Adoption Framework
Welcome to Corporate Training -1
ESS Standardisation State of play
HART Technologies Process Overview
e-Invoicing – e-Ordering 20/11/2008
AMI Security Roadmap April 13, 2007.
Appropriate Access InCommon Identity Assurance Profiles
30 JANUARY 2019 PRIVATE HEALTH ESTABLISHMENTS
Requirements Document
“This presentation is for informational purposes only and may not be incorporated into a contract or agreement.”
Dr. Jiacun Wang Department of Software Engineering Monmouth University
HP Team in OASIS WSDM TC Date: July 29, 2003
28 NOVEMBER 2018 PRIVATE HEALTH ESTABLISHMENTS
Subject Name: SOFTWARE ENGINEERING Subject Code:10IS51
Chapter 5 SNMP Management
CS 426 CS 791z Topics on Software Engineering
Chapter 5 SNMP Management
ICAO ACP Working Group M Iridium Sub Group Overview
CS 426 CS 791z Topics on Software Engineering
Presentation transcript:

Design Rules for NBD – Network Based Defence Development Status: [Identified, Draft, Proposal, Verified, Rejected, Obsolete] Validity for each referenced DR: [Normative, Descriptive, Emerging] Problem Context Solution Requirements Meta data DRP Product VDD Domain DR and DRP references Status Identifier DR References Validity = Descriptive 0..n Verification Method Result Analysis DR Consequence DR product Version Date 1 +Owner +Refers Each association between DR:s configured in different DRP:s must also have a corresponding dependency between the involved DRP:s. 1..n Design Rules for NBD – Network Based Defence

Definition A design rule is a solution to a problem in a specific context with at least one of the following properties (why’s): make design NBD compliant solve frequently shown problems be part of the corporate memory (solutions to difficult problems) improve quality

Characteristics Packages knowledge in a re-usable form Provides a way of standardizing the solutions to design problems within NBD May solve both high and low level problems. Value to the re-user is the most important aspect Belongs to a design rule package – i.e. a problem domain

Development Conditions When: Problems specific to NBD When not: Simple problems Problems where established solutions already exist and are used A unique problem which is not likely to occur again

Relationships Design Rules Methods Architectural Frameworks prescribes frameworks Architectural Frameworks Technical Design Rules Harvest from design Improvements from design Uses Methods Design Uses Design rules Uses Methods

Rejection can appear anywhere Design Rule Life Cycle Improvement proposals Candidate Harvesting, ideas etc. Development In use Phase out Obsolete status Identified Draft Proposed Verified Rejection can appear anywhere in the maturing chain

The Formal Design Rule Model Problem domain Not part of the DR product. THE design rule Refered DR is mandatory or recommended

Design Rule Template Outline overview General Unique Identity Status Target Group . Description Context Problem Solution Motivation Consequences Meta Data Appendix with Rejected Solutions Status

Design Rule Product Structure Design Rule Package Product e.g. Information Management Design Rule Package products keeps structural and version (release) information. Design Rule Package Product e.g. Information Quality Abstraction level Design Rule Product Description: Context Problem Solution Other artifacts: Consequences Analysis Verification info Design Rule products are always leafs in the structure Relations to other DRs needed for the solution. Validity [Normative, Descriptive, Emerging] is always an relation parameter.

Example of a relation between Design Rules communication System Configuration Infrastructure Policies Architecture Convergence Plane Policy A Descriptive Control Plane Policy B ... ... .... Normative Security Mechanisms ...

Use of Technical Design Rules Example Security Applications Service Implementation Information Management Technical Administration Communication MSI System Configuration Policies Mainy composite design rules Associations Basic Systems Mainly singular design rules Rules for a system to develop: Appropriate design rule for a Basic System product Policy design rule product governed by the environment of use. e.g. a C3I for a FHQ