Architecture/Security Roundtable Discussion architecture security Architect and Security are separate topics, architecture is overarching concept.

Slides:



Advertisements
Similar presentations
Trusted Computing in Government Networks May 16, 2007 Richard C. (Dick) Schaeffer, Jr. Information Assurance Director National Security Agency.
Advertisements

Supplied by Revera in partnership with Eagle Technologies SPARC as a Service VMs Under Your Command Presented By: Stephen Ponsford: Revera Limited Stephen.
© 2009 The MITRE Corporation. All rights Reserved. Evolutionary Strategies for the Development of a SOA-Enabled USMC Enterprise Mohamed Hussein, Ph.D.
School of Graduate Professional Studies Systems Engineering Research at Penn State Colin J. Neill Representing the work of: Kathryn Jablokow, Assoc Prof.
Roundtable Discussion Topics Tools/Technologies for Rapid SE - Room 107 –Tools and technologies that enable rapid development of mission/business capabilities.
<<Date>><<SDLC Phase>>
Agile Architecture Prabhu Venkatesan for COMP-684.
SL21 Information Security Board Mission, Goals and Guiding Principles.
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
LTC Steven D. Hart, Ph.D., P.E. Civil Design Group Director Department of Civil and Mechanical Engineering West Point.
ASRR Roundtable Discussions 3:30-5:00pm. Roundtable Discussion Topics Tools/Technologies for Rapid SE - Room 107 –Tools and technologies that enable rapid.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
May 17, Capabilities Description of a Rapid Prototyping Capability for Earth-Sun System Sciences RPC Project Team Mississippi State University.
Secure Middleware (?) Patrick Morrison 3/1/2006 Secure Systems Group.
R R R CSE870: Advanced Software Engineering (Cheng): Intro to Software Engineering1 Advanced Software Engineering Dr. Cheng Overview of Software Engineering.
Interoperability. Martin Sykes Information architecture programs suffer from EA's worst problem: They have a strategic and enterprisewide focus that.
Modus21 Driving Enterprise Transformation Dan Neason, Vice President, Modus21.
Extended Enterprise Architecture Framework (E2AF)
Information Technology Audit
Picture 1 model: ICT lifecycle in a company 1. business needs & business strategy 2. ICT strategy - ICT assessment - ICT strategic plan - ICT implementation/tactical.
MODULE 21 TEAMS AND TEAMWORK “Two heads can be better than one” Why is an understanding of teams so important? What are the foundations of successful teamwork?
1. Human – the end-user of a program – the others in the organization Computer – the machine the program runs on – often split between clients & servers.
A Research Agenda for Accelerating Adoption of Emerging Technologies in Complex Edge-to-Enterprise Systems Jay Ramanathan Rajiv Ramnath Co-Directors,
SAS_08_AADL_Exec_Gluch MAC-T IVV Model-Based Software Assurance with the SAE Architecture Analysis & Design Language (AADL) California Institute.
Annual SERC Research Review, October 5-6, By Jennifer Bayuk Annual SERC Research Review October 5-6, 2011 University of Maryland Marriott Inn and.
Engineering, Operations & Technology | Information TechnologyAPEX | 1 Copyright © 2009 Boeing. All rights reserved. Architecture Concept UG D- DOC UG D-
1 Table of Content 1.Business Diagnostic - Establishing a case for change –Changes in demand –New opportunities –Emerging threats 2.Vision Creation - Defining.
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
T. Dawson, TASC 9/11/13 Use of a Technical Reference in NASA IV&V.
ESA/ESTEC, TEC-QQS August 8, 2005 SAS_05_ESA SW PA R&D_Winzer,Prades Slide 1 Software Product Assurance (PA) R&D Road mapping Activities ESA/ESTEC TEC-QQS.
Army Net-Centric Data Strategy Center Of Excellence (ANCDS) Army Data Harmonization and Integration Working Group (ADHIWG) Sever Ciorlian ANCDS Team Lead.
Information Systems Engineering. Lecture Outline Information Systems Architecture Information System Architecture components Information Engineering Phases.
Dr. Jimmie McEver Senior Scientist, JHU APL Chair, AIAA Technical Committee on Information and Command and Control Systems Lessons Learned from Dealing.
Software Product Line Material based on slides and chapter by Linda M. Northrop, SEI.
The DoD Information Enterprise Strategic Plan and Roadmap (SP&R)
MODEL-BASED SOFTWARE ARCHITECTURES.  Models of software are used in an increasing number of projects to handle the complexity of application domains.
High Confidence Software and Systems HCMDSS Workshop Brad Martin June 2, 2005.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
What is Enterprise Architecture March Enterprise Architecture Architecture –the fundamental organization of a system, embodied in its components,
Enterprise Engineering Directorate (EE)
Defense Business Systems (CLE077) Sprint November 9, 2015 DRAFT1 Sprint Working Group Toni Freeland Kevin Hamilton Lee Hewitt Tom Hickok Len Nale Bob Ramsey.
Security Codesign Steve Dawson and Victoria Stavridou Bruno Dutertre, Josh Levy, Bob Riemenschneider, Hassen Saidi, Tomas Uribe System Design Laboratory.
Castlebridge associates | | Castlebridge changing how people think about information How to Implement the.
Table of Contents – Module 0 Overview of files associated with the Cloud CLM CLE - Module 0 - CLM Table of Contents1.
Open Source Software in Federal Acquisitons Acquiring Maximum Agility: Beyond Open Standards TCO and Best Value Revisited.
8a Certified. About Us  Headquarters in Vienna, VA  Service Disabled Veteran-owned Small Business  SBA 8(a) program participant  Small Disadvantaged.
Building Systems for Today’s Dynamic Networked Environments A Methodology for Building Sustainable Enterprises in Dynamic Environments through knowledge.
Armstrong Process Group, Inc. Copyright © Armstrong Process Group, Inc., All rights reserved National Information Exchange.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
MVDC Collaboration MVDC Issues and Viability of Red Demo in Philadelphia.
1 KM Track Overview & Gaining Value from Knowledge -- Knowledge Management (KM) and the Contracting Professional Breakout Session # 119 Name: Gaining.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Advanced Software Engineering Dr. Cheng
Rick Selby Software Products, Northrop Grumman & Adjunct Faculty, University of Southern California Los Angeles, CA Candidate member Main empirical research.
Intelligent Systems Development
Crisis management related research at
Unified Architecture Framework NATO Architecture CaT Introduction
DoDAF Evolution Towards Mission Effectiveness
Improving Mission Effectiveness By Exploiting the Command’s Implementation Of the DoD Enterprise Services Management Framework - DESMF in the [name the.
Universal Core Task Force Connecting People With Information
Defense Business Systems (CLE077) Sprint
CIS 599 Competitive Success/snaptutorial.com
CIS 599 Education for Service-- snaptutorial.com.
Mirko Rakigjija, PE (256) Dr. Michael E. Stovall, PE (256)
What are the Resilience Mechanisms? Hugo Pereira Evoleo Technologies
HCI in the software process
IEEE Architecture Council Overview
Answer the following questions:
Are you measuring what really counts?
Presentation transcript:

Architecture/Security Roundtable Discussion architecture security Architect and Security are separate topics, architecture is overarching concept.

Team Members Bayuk, Jennifer Brown, Winson Clarke, Lori Dauby, Jason Ergin, Nil Guckert, Ross Hamilton, Drew Horowitz, Barry Huang, LiGuo Mitola, Joe Sangwan, Ragu West, Stephen Facilitators: Bayuk, Jennifer; Hamilton, Drew

Problem Definition Model-assisted (using SYSML), lifecycle issues, evolution requirements (e.g. scale) Check-the-box approaches do not work. Evaluation criteria are not evident. How to produce feasibility evidence? Can architecture be separated from design? What tools and processes can inform architecture, how to define attributes like security? Security attributes cannot be taken out of context. Need high level principles? Can they be applied to architecture directly? Functional requirements usually come first. Is this the right order? Should quality come first? How to reduce ambiguity?

Purpose/Objectives of a Research Effort –To extract goals for architecture, operational definitions for quality implications for mission. –Possible to define attributes first prior to functionality? Security, architecture of all scales? –Motivate better architecture by allowing justification for project costs due to architectural design considerations not currently accounted for by contracting processes. –Identify out-of-norm detection techniques early in evolution. –Reduce tendency for humans to grab low-hanging (potentially poisonous) fruit (and commit to poor choices made too early, instead learn from them, metrics?).

Benefits of a Research Effort Provide potentially better presentation methods for architecture alternatives. Catalogue of standard system-to-system and enterprise views and their relationships. –Allows for human-centric mission-driven views. –Produces rigorous definitions as a basis for measurability. –Provides basis for evaluating systems on the basis of scenarios. –Allows for plug-and-play testing for components. Provide methodology to isolate problematic architectural issues in system components. Provide framework to study agility versus evolvability? Provide migration path via industry standards. Potential for expansion of computing and communication facility command and control alternatives.

Approach of a Research Effort Cloud computing may allow experimentation with both architecture and security in an economically viable manner. Architecture centric engineering using architecture agility principles –Attack complexity issues head-on. –Shadow projects with alternative architectural approaches. –Make architecture evaluation a formal part. Use security benefits as justification for “duplicate” efforts. Have separate project to use formal architecture framework reviews of a variety of other projects.

Potential Task Initiatives DD R&E – acquisition process DOD - Commercial system evaluation –Functional capability specification DOE - resiliency sourcing area –DOD overlap for portable power generation systems NSA - asset protection strategies –IAD evaluation criteria –DOD, Agency overlap with functional assurance criteria DHS - Critical infrastructure protection evaluation criteria IC - Any command and control function that would benefit from architecture alternatives MDA – security architecture

Potential Collaborators Bayuk, Jennifer Brown, Winson Clarke, Lori Dauby, Jason Ergin, Nil Guckert, Ross Hamilton, Drew Horowitz, Barry Huang, LiGuo Mostashari, Ali Mitola, Joe Sangwan, Ragu West, Stephen