Download presentation
Presentation is loading. Please wait.
Published byRoland Warner Modified over 6 years ago
1
Trade-offs to establish an integrated, comprehensive protection scheme
Figure 1: Program Protection Focus Areas Information Technology Components What to Protect : Information on the system and about the program How to Protect: Classification Export Controls Information Security RMF for DoD IT Goal: Ensure key system and program data are protected from adversary collection What to Protect: A capability element that contributes to the warfighters’ technical advantage (CPI) How to Protect: Anti-Tamper Exportability Features Goal: Prevent the compromise and loss of CPI What to Protect : Mission-critical functions and components How to Protect: Software Assurance Hardware Assurance/Trusted Microelectronics Supply Chain Risk Management Anti-Counterfeits Goal: Protect key mission-critical components from malicious activity Trade-offs to establish an integrated, comprehensive protection scheme
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.