Rapid acquisition and fielding for information assurance and cyber security in the Navy
Saved in:
: | |
---|---|
VerfasserIn: | |
TeilnehmendeR: | |
Place / Publishing House: | [Place of publication not identified] : RAND National Defense Research Institute, 2012 |
Year of Publication: | 2012 |
Language: | English |
Notes: | Bibliographic Level Mode of Issuance: Monograph |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Summary
- Approach
- Key findings and recommendations from the analysis xiii
- Acknowledgments
- Abbreviations
- Introduction
- Mitigating the cyber threat through rapid acquisition
- Study approach
- Organization of this report
- Testing (certification and accreditation) challenges, best practices
- And recommendations
- Testing in the new IT acquisition strategy
- Navy modernization process challenges, best practices, and
- Recommendations
- Challenges
- Recommendations
- Budgeting, funding, and contracts challenges, best practices, and
- Recommendations
- Challenges
- Recommendations
- Governance, integration and training, and emergent needs challenges
- Best practices, and recommendations
- Challenges
- Recommendations
- Summary and conclusions
- Future work
- Appendix A: Survey of RAPID acquisition processes
- Appendix B: Navy RAPID acquisition options
- Appendix C: Case studies of successful RAPID/IT acquisition
- Navy case study: A-RCI
- Army case study: DRRS-A
- Marine Corps case study: Commercial hunter
- Appendix D: JCIDS and incremental acquisition background information
- Exceptions to JCIDS
- Description of "IT box"
- Appendix E: review of cyber and IT acquisition literature
- Legislation
- National research council report
- Defense Science Board report
- Other reports
- Appendix f: Air Force cyber acquisition
- Appendix G: Worms
- Worm attacks are an increasing problem
- Worm attacks require fast and frequent responses.