Rapid acquisition and fielding for information assurance and cyber security in the Navy

Saved in:
Bibliographic Details
:
VerfasserIn:
TeilnehmendeR:
Place / Publishing House:[Place of publication not identified] : RAND National Defense Research Institute, 2012
Year of Publication:2012
Language:English
Notes:Bibliographic Level Mode of Issuance: Monograph
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993628388904498
ctrlnum (CKB)3360000000476952
(SSID)ssj0001048565
(PQKBManifestationID)12440336
(PQKBTitleCode)TC0001048565
(PQKBWorkID)11014464
(PQKB)10936173
(EXLCZ)993360000000476952
collection bib_alma
record_format marc
spelling Porche, Isaac, 1968- Author
Rapid acquisition and fielding for information assurance and cyber security in the Navy
[Place of publication not identified] RAND National Defense Research Institute 2012
text txt
computer c
online resource cr
Bibliographic Level Mode of Issuance: Monograph
English
Summary -- Approach -- Key findings and recommendations from the analysis xiii -- Acknowledgments -- Abbreviations -- Introduction -- Mitigating the cyber threat through rapid acquisition -- Study approach -- Organization of this report -- Testing (certification and accreditation) challenges, best practices -- And recommendations -- Testing in the new IT acquisition strategy -- Navy modernization process challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Budgeting, funding, and contracts challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Governance, integration and training, and emergent needs challenges -- Best practices, and recommendations -- Challenges -- Recommendations -- Summary and conclusions -- Future work -- Appendix A: Survey of RAPID acquisition processes -- Appendix B: Navy RAPID acquisition options -- Appendix C: Case studies of successful RAPID/IT acquisition -- Navy case study: A-RCI -- Army case study: DRRS-A -- Marine Corps case study: Commercial hunter -- Appendix D: JCIDS and incremental acquisition background information -- Exceptions to JCIDS -- Description of "IT box" -- Appendix E: review of cyber and IT acquisition literature -- Legislation -- National research council report -- Defense Science Board report -- Other reports -- Appendix f: Air Force cyber acquisition -- Appendix G: Worms -- Worm attacks are an increasing problem -- Worm attacks require fast and frequent responses.
Computer networks Security measures Planning United States
Computer networks Access control United States
Computer security United States.
Military & Naval Science HILCC
Law, Politics & Government HILCC
Naval Science - General HILCC
United States. Navy Computer networks.
United States. Navy Procurement.
Rand Corporation Content Provider
0-8330-7855-0
language English
format Book
author Porche, Isaac, 1968-
spellingShingle Porche, Isaac, 1968-
Rapid acquisition and fielding for information assurance and cyber security in the Navy
Summary -- Approach -- Key findings and recommendations from the analysis xiii -- Acknowledgments -- Abbreviations -- Introduction -- Mitigating the cyber threat through rapid acquisition -- Study approach -- Organization of this report -- Testing (certification and accreditation) challenges, best practices -- And recommendations -- Testing in the new IT acquisition strategy -- Navy modernization process challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Budgeting, funding, and contracts challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Governance, integration and training, and emergent needs challenges -- Best practices, and recommendations -- Challenges -- Recommendations -- Summary and conclusions -- Future work -- Appendix A: Survey of RAPID acquisition processes -- Appendix B: Navy RAPID acquisition options -- Appendix C: Case studies of successful RAPID/IT acquisition -- Navy case study: A-RCI -- Army case study: DRRS-A -- Marine Corps case study: Commercial hunter -- Appendix D: JCIDS and incremental acquisition background information -- Exceptions to JCIDS -- Description of "IT box" -- Appendix E: review of cyber and IT acquisition literature -- Legislation -- National research council report -- Defense Science Board report -- Other reports -- Appendix f: Air Force cyber acquisition -- Appendix G: Worms -- Worm attacks are an increasing problem -- Worm attacks require fast and frequent responses.
author_facet Porche, Isaac, 1968-
Rand Corporation
Rand Corporation
author_variant i p ip
author_role VerfasserIn
author2 Rand Corporation
author2_role TeilnehmendeR
author_corporate Rand Corporation
author_sort Porche, Isaac, 1968-
title Rapid acquisition and fielding for information assurance and cyber security in the Navy
title_full Rapid acquisition and fielding for information assurance and cyber security in the Navy
title_fullStr Rapid acquisition and fielding for information assurance and cyber security in the Navy
title_full_unstemmed Rapid acquisition and fielding for information assurance and cyber security in the Navy
title_auth Rapid acquisition and fielding for information assurance and cyber security in the Navy
title_new Rapid acquisition and fielding for information assurance and cyber security in the Navy
title_sort rapid acquisition and fielding for information assurance and cyber security in the navy
publisher RAND National Defense Research Institute
publishDate 2012
contents Summary -- Approach -- Key findings and recommendations from the analysis xiii -- Acknowledgments -- Abbreviations -- Introduction -- Mitigating the cyber threat through rapid acquisition -- Study approach -- Organization of this report -- Testing (certification and accreditation) challenges, best practices -- And recommendations -- Testing in the new IT acquisition strategy -- Navy modernization process challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Budgeting, funding, and contracts challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Governance, integration and training, and emergent needs challenges -- Best practices, and recommendations -- Challenges -- Recommendations -- Summary and conclusions -- Future work -- Appendix A: Survey of RAPID acquisition processes -- Appendix B: Navy RAPID acquisition options -- Appendix C: Case studies of successful RAPID/IT acquisition -- Navy case study: A-RCI -- Army case study: DRRS-A -- Marine Corps case study: Commercial hunter -- Appendix D: JCIDS and incremental acquisition background information -- Exceptions to JCIDS -- Description of "IT box" -- Appendix E: review of cyber and IT acquisition literature -- Legislation -- National research council report -- Defense Science Board report -- Other reports -- Appendix f: Air Force cyber acquisition -- Appendix G: Worms -- Worm attacks are an increasing problem -- Worm attacks require fast and frequent responses.
isbn 0-8330-8348-1
0-8330-7855-0
callnumber-first V - Naval Science
callnumber-subject VB - Naval Administration
callnumber-label VB212
callnumber-sort VB 3212 P67 42012
geographic_facet United States
United States.
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 350 - Public administration & military science
dewey-ones 359 - Sea forces & warfare
dewey-full 359.6/212
dewey-sort 3359.6 3212
dewey-raw 359.6/212
dewey-search 359.6/212
work_keys_str_mv AT porcheisaac rapidacquisitionandfieldingforinformationassuranceandcybersecurityinthenavy
AT randcorporation rapidacquisitionandfieldingforinformationassuranceandcybersecurityinthenavy
status_str c
ids_txt_mv (CKB)3360000000476952
(SSID)ssj0001048565
(PQKBManifestationID)12440336
(PQKBTitleCode)TC0001048565
(PQKBWorkID)11014464
(PQKB)10936173
(EXLCZ)993360000000476952
carrierType_str_mv cr
is_hierarchy_title Rapid acquisition and fielding for information assurance and cyber security in the Navy
author2_original_writing_str_mv noLinkedField
_version_ 1796653694618435584
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02994cam-a2200433zu-4500</leader><controlfield tag="001">993628388904498</controlfield><controlfield tag="005">20221111181013.0</controlfield><controlfield tag="008">160829s2012 xx o eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-8348-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)3360000000476952</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0001048565</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)12440336</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0001048565</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)11014464</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)10936173</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)993360000000476952</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">PQKB</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">VB212.P67 2012</subfield></datafield><datafield tag="082" ind1=" " ind2=" "><subfield code="a">359.6/212</subfield></datafield><datafield tag="100" ind1=" " ind2=" "><subfield code="a">Porche, Isaac,</subfield><subfield code="d">1968-</subfield><subfield code="e">Author</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Rapid acquisition and fielding for information assurance and cyber security in the Navy</subfield></datafield><datafield tag="264" ind1="3" ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">RAND National Defense Research Institute</subfield><subfield code="c">2012</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Bibliographic Level Mode of Issuance: Monograph</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Summary -- Approach -- Key findings and recommendations from the analysis xiii -- Acknowledgments -- Abbreviations -- Introduction -- Mitigating the cyber threat through rapid acquisition -- Study approach -- Organization of this report -- Testing (certification and accreditation) challenges, best practices -- And recommendations -- Testing in the new IT acquisition strategy -- Navy modernization process challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Budgeting, funding, and contracts challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Governance, integration and training, and emergent needs challenges -- Best practices, and recommendations -- Challenges -- Recommendations -- Summary and conclusions -- Future work -- Appendix A: Survey of RAPID acquisition processes -- Appendix B: Navy RAPID acquisition options -- Appendix C: Case studies of successful RAPID/IT acquisition -- Navy case study: A-RCI -- Army case study: DRRS-A -- Marine Corps case study: Commercial hunter -- Appendix D: JCIDS and incremental acquisition background information -- Exceptions to JCIDS -- Description of "IT box" -- Appendix E: review of cyber and IT acquisition literature -- Legislation -- National research council report -- Defense Science Board report -- Other reports -- Appendix f: Air Force cyber acquisition -- Appendix G: Worms -- Worm attacks are an increasing problem -- Worm attacks require fast and frequent responses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Planning</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Military &amp; Naval Science</subfield><subfield code="2">HILCC</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Law, Politics &amp; Government</subfield><subfield code="2">HILCC</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Naval Science - General</subfield><subfield code="2">HILCC</subfield></datafield><datafield tag="610" ind1="1" ind2="0"><subfield code="a">United States.</subfield><subfield code="b">Navy</subfield><subfield code="x">Computer networks.</subfield></datafield><datafield tag="610" ind1="1" ind2="0"><subfield code="a">United States.</subfield><subfield code="b">Navy</subfield><subfield code="x">Procurement.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rand Corporation</subfield><subfield code="e">Content Provider</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-8330-7855-0</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-10-30 03:48:30 Europe/Vienna</subfield><subfield code="d">00</subfield><subfield code="f">System</subfield><subfield code="c">marc21</subfield><subfield code="a">2014-05-03 20:46:25 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5350476020004498&amp;Force_direct=true</subfield><subfield code="Z">5350476020004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350476020004498</subfield></datafield></record></collection>