Rapid acquisition and fielding for information assurance and cyber security in the Navy
Saved in:
: | |
---|---|
VerfasserIn: | |
TeilnehmendeR: | |
Place / Publishing House: | [Place of publication not identified] : RAND National Defense Research Institute, 2012 |
Year of Publication: | 2012 |
Language: | English |
Notes: | Bibliographic Level Mode of Issuance: Monograph |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993628388904498 |
---|---|
ctrlnum |
(CKB)3360000000476952 (SSID)ssj0001048565 (PQKBManifestationID)12440336 (PQKBTitleCode)TC0001048565 (PQKBWorkID)11014464 (PQKB)10936173 (EXLCZ)993360000000476952 |
collection |
bib_alma |
record_format |
marc |
spelling |
Porche, Isaac, 1968- Author Rapid acquisition and fielding for information assurance and cyber security in the Navy [Place of publication not identified] RAND National Defense Research Institute 2012 text txt computer c online resource cr Bibliographic Level Mode of Issuance: Monograph English Summary -- Approach -- Key findings and recommendations from the analysis xiii -- Acknowledgments -- Abbreviations -- Introduction -- Mitigating the cyber threat through rapid acquisition -- Study approach -- Organization of this report -- Testing (certification and accreditation) challenges, best practices -- And recommendations -- Testing in the new IT acquisition strategy -- Navy modernization process challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Budgeting, funding, and contracts challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Governance, integration and training, and emergent needs challenges -- Best practices, and recommendations -- Challenges -- Recommendations -- Summary and conclusions -- Future work -- Appendix A: Survey of RAPID acquisition processes -- Appendix B: Navy RAPID acquisition options -- Appendix C: Case studies of successful RAPID/IT acquisition -- Navy case study: A-RCI -- Army case study: DRRS-A -- Marine Corps case study: Commercial hunter -- Appendix D: JCIDS and incremental acquisition background information -- Exceptions to JCIDS -- Description of "IT box" -- Appendix E: review of cyber and IT acquisition literature -- Legislation -- National research council report -- Defense Science Board report -- Other reports -- Appendix f: Air Force cyber acquisition -- Appendix G: Worms -- Worm attacks are an increasing problem -- Worm attacks require fast and frequent responses. Computer networks Security measures Planning United States Computer networks Access control United States Computer security United States. Military & Naval Science HILCC Law, Politics & Government HILCC Naval Science - General HILCC United States. Navy Computer networks. United States. Navy Procurement. Rand Corporation Content Provider 0-8330-7855-0 |
language |
English |
format |
Book |
author |
Porche, Isaac, 1968- |
spellingShingle |
Porche, Isaac, 1968- Rapid acquisition and fielding for information assurance and cyber security in the Navy Summary -- Approach -- Key findings and recommendations from the analysis xiii -- Acknowledgments -- Abbreviations -- Introduction -- Mitigating the cyber threat through rapid acquisition -- Study approach -- Organization of this report -- Testing (certification and accreditation) challenges, best practices -- And recommendations -- Testing in the new IT acquisition strategy -- Navy modernization process challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Budgeting, funding, and contracts challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Governance, integration and training, and emergent needs challenges -- Best practices, and recommendations -- Challenges -- Recommendations -- Summary and conclusions -- Future work -- Appendix A: Survey of RAPID acquisition processes -- Appendix B: Navy RAPID acquisition options -- Appendix C: Case studies of successful RAPID/IT acquisition -- Navy case study: A-RCI -- Army case study: DRRS-A -- Marine Corps case study: Commercial hunter -- Appendix D: JCIDS and incremental acquisition background information -- Exceptions to JCIDS -- Description of "IT box" -- Appendix E: review of cyber and IT acquisition literature -- Legislation -- National research council report -- Defense Science Board report -- Other reports -- Appendix f: Air Force cyber acquisition -- Appendix G: Worms -- Worm attacks are an increasing problem -- Worm attacks require fast and frequent responses. |
author_facet |
Porche, Isaac, 1968- Rand Corporation Rand Corporation |
author_variant |
i p ip |
author_role |
VerfasserIn |
author2 |
Rand Corporation |
author2_role |
TeilnehmendeR |
author_corporate |
Rand Corporation |
author_sort |
Porche, Isaac, 1968- |
title |
Rapid acquisition and fielding for information assurance and cyber security in the Navy |
title_full |
Rapid acquisition and fielding for information assurance and cyber security in the Navy |
title_fullStr |
Rapid acquisition and fielding for information assurance and cyber security in the Navy |
title_full_unstemmed |
Rapid acquisition and fielding for information assurance and cyber security in the Navy |
title_auth |
Rapid acquisition and fielding for information assurance and cyber security in the Navy |
title_new |
Rapid acquisition and fielding for information assurance and cyber security in the Navy |
title_sort |
rapid acquisition and fielding for information assurance and cyber security in the navy |
publisher |
RAND National Defense Research Institute |
publishDate |
2012 |
contents |
Summary -- Approach -- Key findings and recommendations from the analysis xiii -- Acknowledgments -- Abbreviations -- Introduction -- Mitigating the cyber threat through rapid acquisition -- Study approach -- Organization of this report -- Testing (certification and accreditation) challenges, best practices -- And recommendations -- Testing in the new IT acquisition strategy -- Navy modernization process challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Budgeting, funding, and contracts challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Governance, integration and training, and emergent needs challenges -- Best practices, and recommendations -- Challenges -- Recommendations -- Summary and conclusions -- Future work -- Appendix A: Survey of RAPID acquisition processes -- Appendix B: Navy RAPID acquisition options -- Appendix C: Case studies of successful RAPID/IT acquisition -- Navy case study: A-RCI -- Army case study: DRRS-A -- Marine Corps case study: Commercial hunter -- Appendix D: JCIDS and incremental acquisition background information -- Exceptions to JCIDS -- Description of "IT box" -- Appendix E: review of cyber and IT acquisition literature -- Legislation -- National research council report -- Defense Science Board report -- Other reports -- Appendix f: Air Force cyber acquisition -- Appendix G: Worms -- Worm attacks are an increasing problem -- Worm attacks require fast and frequent responses. |
isbn |
0-8330-8348-1 0-8330-7855-0 |
callnumber-first |
V - Naval Science |
callnumber-subject |
VB - Naval Administration |
callnumber-label |
VB212 |
callnumber-sort |
VB 3212 P67 42012 |
geographic_facet |
United States United States. |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
350 - Public administration & military science |
dewey-ones |
359 - Sea forces & warfare |
dewey-full |
359.6/212 |
dewey-sort |
3359.6 3212 |
dewey-raw |
359.6/212 |
dewey-search |
359.6/212 |
work_keys_str_mv |
AT porcheisaac rapidacquisitionandfieldingforinformationassuranceandcybersecurityinthenavy AT randcorporation rapidacquisitionandfieldingforinformationassuranceandcybersecurityinthenavy |
status_str |
c |
ids_txt_mv |
(CKB)3360000000476952 (SSID)ssj0001048565 (PQKBManifestationID)12440336 (PQKBTitleCode)TC0001048565 (PQKBWorkID)11014464 (PQKB)10936173 (EXLCZ)993360000000476952 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Rapid acquisition and fielding for information assurance and cyber security in the Navy |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1796653694618435584 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02994cam-a2200433zu-4500</leader><controlfield tag="001">993628388904498</controlfield><controlfield tag="005">20221111181013.0</controlfield><controlfield tag="008">160829s2012 xx o eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-8348-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)3360000000476952</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0001048565</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)12440336</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0001048565</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)11014464</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)10936173</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)993360000000476952</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">PQKB</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">VB212.P67 2012</subfield></datafield><datafield tag="082" ind1=" " ind2=" "><subfield code="a">359.6/212</subfield></datafield><datafield tag="100" ind1=" " ind2=" "><subfield code="a">Porche, Isaac,</subfield><subfield code="d">1968-</subfield><subfield code="e">Author</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Rapid acquisition and fielding for information assurance and cyber security in the Navy</subfield></datafield><datafield tag="264" ind1="3" ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">RAND National Defense Research Institute</subfield><subfield code="c">2012</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Bibliographic Level Mode of Issuance: Monograph</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Summary -- Approach -- Key findings and recommendations from the analysis xiii -- Acknowledgments -- Abbreviations -- Introduction -- Mitigating the cyber threat through rapid acquisition -- Study approach -- Organization of this report -- Testing (certification and accreditation) challenges, best practices -- And recommendations -- Testing in the new IT acquisition strategy -- Navy modernization process challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Budgeting, funding, and contracts challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Governance, integration and training, and emergent needs challenges -- Best practices, and recommendations -- Challenges -- Recommendations -- Summary and conclusions -- Future work -- Appendix A: Survey of RAPID acquisition processes -- Appendix B: Navy RAPID acquisition options -- Appendix C: Case studies of successful RAPID/IT acquisition -- Navy case study: A-RCI -- Army case study: DRRS-A -- Marine Corps case study: Commercial hunter -- Appendix D: JCIDS and incremental acquisition background information -- Exceptions to JCIDS -- Description of "IT box" -- Appendix E: review of cyber and IT acquisition literature -- Legislation -- National research council report -- Defense Science Board report -- Other reports -- Appendix f: Air Force cyber acquisition -- Appendix G: Worms -- Worm attacks are an increasing problem -- Worm attacks require fast and frequent responses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Planning</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Military & Naval Science</subfield><subfield code="2">HILCC</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Law, Politics & Government</subfield><subfield code="2">HILCC</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Naval Science - General</subfield><subfield code="2">HILCC</subfield></datafield><datafield tag="610" ind1="1" ind2="0"><subfield code="a">United States.</subfield><subfield code="b">Navy</subfield><subfield code="x">Computer networks.</subfield></datafield><datafield tag="610" ind1="1" ind2="0"><subfield code="a">United States.</subfield><subfield code="b">Navy</subfield><subfield code="x">Procurement.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rand Corporation</subfield><subfield code="e">Content Provider</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-8330-7855-0</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-10-30 03:48:30 Europe/Vienna</subfield><subfield code="d">00</subfield><subfield code="f">System</subfield><subfield code="c">marc21</subfield><subfield code="a">2014-05-03 20:46:25 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5350476020004498&Force_direct=true</subfield><subfield code="Z">5350476020004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350476020004498</subfield></datafield></record></collection> |