UNCLASSIFIED 1 Joint Net-Centric Operations Strawman Joint Net-Centric Operations: The ability to exploit all human and technical elements of the joint.

Slides:



Advertisements
Similar presentations
1 Susan Alexander Chief Technology Officer for Information and Identity Assurance Office of the Assistant Secretary of Defense, Networks and Information.
Advertisements

IBM SMB Software Group ® ibm.com/software/smb Maintain Hardware Platform Health An IT Services Management Infrastructure Solution.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Chapter 19: Network Management Business Data Communications, 5e.
Introduction to Information Operations Attaché Corps- SEP 09
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
ITIL: Service Transition
I-Room : Integrating Intelligent Agents and Virtual Worlds.
4/29/2009Michael J. Cohen1 Practical DIACAP Implementation CS526 Research Project by Michael J. Cohen 4/29/2009.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
The Business Value of CA Solutions Ovidiu VALEANU Senior Consultant DNA Software – CA Regional Representative.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Chapter 19: Network Management Business Data Communications, 4e.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
0 AT&L Service-oriented Architecture (SOA) Demonstration Briefing Presented: DAMIR Conference - October 30 and 31, 2007 Gary R. Bliss Acquisition Resource.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
R R R CSE870: Advanced Software Engineering (Cheng): Intro to Software Engineering1 Advanced Software Engineering Dr. Cheng Overview of Software Engineering.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
The Six Centripetal Forces for Successful Global Software Telecommunication Infrastructure Collaborative Technology.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
THE JOINED UP WORLD OF E-RESEARCH Professor Neil McLean National Technical Standards Adviser to the Department of Education Science and Training (DEST)
Stephen S. Yau CSE , Fall Security Strategies.
Cloud Usability Framework
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Global Electromagnetic Spectrum Information System
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
BMC Software confidential. BMC Performance Manager Will Brown.
Module 3: Business Information Systems Chapter 11: Knowledge Management.
1.Knowledge management 2.Online analytical processing 3. 4.Supply chain management 5.Data mining Which of the following is not a major application.
Chapter 6 System Engineering - Computer-based system - System engineering process - “Business process” engineering - Product engineering (Source: Pressman,
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
INFORMATION SYSTEMS Overview
Enterprise User Enabling Warfighter Capability
Evaluation and Testbed Development Bhavani Thuraisingham The University of Texas at Dallas Jim Massaro and Ravi Sandhu.
Army Net-Centric Data Strategy Center Of Excellence (ANCDS) Army Data Harmonization and Integration Working Group (ADHIWG) Sever Ciorlian ANCDS Team Lead.
Service Transition & Planning Service Validation & Testing
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Strategic Mobility 21 Focused on Making Decision Relevant Data A Logistics Multiplier in All Domains Strategic Mobility 21 Focused on Making Decision Relevant.
Computer Emergency Notification System (CENS)
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Georgia Institute of Technology CS 4320 Fall 2003.
A Combat Support Agency Defense Information Systems Agency GIG EWSE IA and NetOps (EE213) 17 August 2011 UNCLASSIFIED Tactical Edge Service: NetOps and.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Database Administration
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Service Oriented Approach JAFE: a Joint architecture federation environment Howard cohen (Booz Allen Hamilton) Matthew Sutton (Booz.
Connecting People With Information Transforming the Way the DoD Manages Data M. David Allen OASD(NII)/DoD CIO May 23, 2006 “The.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Session 161 National Incident Management Systems Session 16 Slide Deck.
1 Power to the Edge Agility Focus and Convergence Adapting C2 to the 21 st Century presented to the Focus, Agility and Convergence Team Inaugural Meeting.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
UNCLASSIFIED 1 Joint Capability Areas JCA Refinement 2010 & Way Ahead presented to WJTSC September 2010 Mr Steve Brown Joint Staff J-7, JFDID.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
Advanced Software Engineering Dr. Cheng
Discovering Computers 2010: Living in a Digital World Chapter 14
DoD Cyberspace Workforce Definitions
University of Technology
DoD Cyberspace Workforce Definitions
IT Management Services Infrastructure Services
Presentation transcript:

UNCLASSIFIED 1 Joint Net-Centric Operations Strawman Joint Net-Centric Operations: The ability to exploit all human and technical elements of the joint force and its mission partners by fully integrating collected information, awareness, knowledge, experience, and decision making, enabled by secure access and distribution. Issue: Decision-making and planning is required across all the JCAs. Recommendation: Move to JC2 or lower tier across all the JCAs. Issue: JC2 recommends KM T2/T3 JCAs moved to JC2 Recommendation: JC2 is a user of the KM environment that JNO provides. Issue: FA currently has CNA as a JCA Recommendation: JNO is an provides the enabling capability for CNA/CND/CNE, this also allows each area to be binned on one JCA. Issue: Decision-making and planning is required across all the JCAs. Recommendation: Move to JC2 or lower tier across all the JCAs. Issue: JC2 recommends KM T2/T3 JCAs moved to JC2 Recommendation: JC2 is a user of the KM environment that JNO provides. Issue: FA currently has CNA as a JCA Recommendation: JNO is an provides the enabling capability for CNA/CND/CNE, this also allows each area to be binned on one JCA.

UNCLASSIFIED 2 JNO Seams Seam topic: Potential seam between JNO and CMS “Information Management” Seam with: CMS Recommendation: Coordinate with CMS to clarify the definition and intent of “Information Management” Rationale: The CMS “Information Management” definition as written, encompasses many of the capabilities currently within NC Recommended business rule: None at this time Seam topic: Potential seam between NC “Information Transport” and BA “Dissemination and Integration” Seam with: BA Recommendation: Drop “Dissemination” from BA definition. Rationale: “Dissemination” is a capability in NC Recommended business rule: None at this time

UNCLASSIFIED 3 JNO Seams - concluded Seam topic: Duplication/overlap between JNO “Develop knowledge, skills, and capabilities of individuals and teams” and FS “Training” and “Education” Seam with: FS Recommendation: Drop “Develop knowledge, skills, and capabilities of individuals and teams” from NC. Rationale: “Develop knowledge, skills, and capabilities of individuals and teams” appropriately addressed in FS “Training” and “Education”, consistent with the JCABR guiding principles, need not be duplicated in JNO Recommended business rule: None

UNCLASSIFIED 4 Backup Slides

UNCLASSIFIED 5 NETOPS: The ability to provide assured net-centric services across the full spectrum of operations throughout the Global Information Grid (GIG) enterprise, seamlessly, securely and end to end.  Network/Enterprise Management: The ability to provide the network with the desired level of quality, agility, and trustworthiness; including the planning coordinating and managing DOD use of the electromagnetic spectrum (EMS) through operational, engineering and administrative procedures. NM focuses on the configuration, availability, performance and manageability of network services and the underlying physical assets that provide end-user services, as well as connectivity to enterprise application services. (Modified Joint Concept of Ops for GIG NETOPS/JP 6-0)  Enterprise Services (ES): The ability to provide well-defined enterprise network functionality that accepts a request and return a response through an interface with a user or another service, such as collaboration, messaging, or information discovery. (NCE JFC/NCOE JIC)  Information Transport (IT): The ability to provide end-to-end communications media over which assured connectivity takes place, supported by switching and routing systems. (NCE JFC/NCOE JIC)  Electromagnetic Spectrum Management (EMS): Planning, coordinating and managing joint use of the EMS though operational, engineering and administrative procedures. The objective of SM is to enable electronic systems to perform their functions in the intended environment without causing or suffering unacceptable interference. (JP 6-0) JNO Tier 2 & 3 Definitions

UNCLASSIFIED 6 JNO Tier 2 & 3 Definitions Knowledge Management (KM): The ability to create an environment to systematically discover, select, organize, distill, share, develop, and use information in a social domain context to improve warfighter and business effectiveness. (Modified NCE JFC/NCOE JIC)  Collaboration: The ability to continuously include geographically separated participants, involving all relevant parties in a virtual space that utilizes collaboration tools and visualization techniques to share knowledge and support decision-making.  Organizational relationships: The ability to set-up and change formal organizational and command relationships according to mission and task needs. The NCOE supports existing frameworks and provides a new COI framework for formal and informal organizational needs.  Share situational understanding: The ability to share understanding with an array of participants, will lead to better collective understanding and contribute to higher quality decision-making. Through the use of KM tools, sharing situational understanding will be enhanced.  Decision-Making and Planning: The ability to provide adaptive, distributed, cooperative, and collaborative decision-making and planning. Many elements will be involved in decision- making. Decision-makers require collaboration tools and sophisticated decision-support tools that recognizes that a variety of different methods could be needed, especially for a variety of environments, circumstances, and missions. (Possible move to C2).  Develop knowledge, skills, and abilities of individuals and teams: The ability to develop knowledge, skills, and abilities through effective collaborative training methods. The dynamic nature of the future environment will require that teams be established with little or no previous working relationships. As a result, training will need to be conducted en route to the operating area. The use of collaborative and interactive training will enable effective training to be accomplished in minimal time.

UNCLASSIFIED 7 7 Cyberspace Operations: A domain characterized by the use of electronics and electromagnetic spectrum to store, modify, and exchange data via network systems and associated physical infrastructure.  Computing Infrastructure (CI): The ability to provide dynamic and scalable automated IT resources; i.e., hardware, software operating systems, and hardware/software operating systems support; which are used in the secure acquisition, storage, processing, manipulation, management, control, and display of data / information, have NetOps situational awareness, and enable visibility, accessibility, understandable, trusted access to data / information and shared IT resources.  Computer Network Defense (CND): The ability to protect, monitor, analyze, detect and respond to unauthorized activity within Department of Defense information systems and computer networks through the use of computer networks. (JP 3-13)  Computer Network Attack (CNA): The ability to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves through the use of computer networks. (JP 3-13)  Computer Network Exploitation (CNE): The ability to enable operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or networks. (JP 3-13)  Information Assurance (IA): The ability to provide the measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for the restoration of information systems by incorporating protection, detection, and reaction capabilities. (DOD Directive “Information Assurance”) JNO Tier 2 & 3 Definitions

UNCLASSIFIED 8 Network/Enterprise Management (T3):  Optimized network functions and resources: The ability to dynamically control and manage assigned network resources such that their availability and functionality, including degraded modes, are continuously optimized to mission needs and to dynamically acquire and incorporate additional network resources when required. Enterprise Services (T3):  Accessible and useful data and information: The ability to filter, fuse, and correlate data and information into useful forms. Users must be able to locate the required data and information and to extract it.  Identify, store, share, and exchange data and information: The ability to perform all actions necessary to store, publish, and exchange information and data. Data must be appropriately identified and labeled (tagged), placed in a database or other data/information repository, and its presence announced to those who need it (post/publish/advertise).  Information Transport (T3):  Deploy scalable and modular networks: The ability to design, assemble, transport, deploy and establish mission-scaled networks from adaptable component network modules, composed of physical media, configurable module equipment, software, and associated operational resources for required fixed or mobile network nodes or network links.  Information End to End transport: The ability to accurately transmit and receive information over networks in time to meet mission requirements, with minimum location, spectrum, or bandwidth constraints on the user. JNO Tier 4

UNCLASSIFIED 9 Computing Infrastructure(T3):  Distributed CI functionality for data and information sharing: The ability to provide modular, deployable computing infrastructure that enables trusted users to access and share data and information efficiently and effectively anywhere they are located, across functional, security, national, and interagency domains.  Dynamic CI processing and data storage: The ability to provide secure, dynamic, and transparent provisioning and allocation of storage and processing resources, from pooled infrastructure, resources to any user, based on usage patterns and real-time capacity requests, regardless of location, connectivity, or user network access device.  Adaptive hosting environments for applications and COI services: The ability to provide to users, dynamically and transparently, hosting environments that are adaptive to location, bandwidth limitations, demand, hardware, software operating systems, various types of applications (software, mission-specific), various types of community of interest (COI) services (legacy, service-oriented architecture), and other applications and services characteristics. JNO Tier 4

UNCLASSIFIED 10 UNCLASSIFIED JNO Tier 4 Information Assurance (T3): Secure Information Exchange: The ability to securely and dynamically share information between communities of interest, protected from modification, ensure only authorized user access, share user access rights across the enterprise, and provide assured information discovery and retrieval for sharing information across domains. Protected Data and Networks: The ability to prevent successful data attacks by monitoring the IA status of the GIG; tracking identities, privileges, and actions of users; ensuring information integrity; and, by using encryption to provide confidentiality that assures information is only disclosed to authorized users. Prevents successful network attacks by employing information control zones, network access controls, and host based data encryption security. Provides for flexible allocation of resources for mission needs. Attack / Event Response: The ability to provide intrusion prevention and situational awareness systems that detect and respond to attacks, defend the GIG, maintain services while under cyber-attack, recover from cyber-attack, and ensure availability of information and systems.