Forensics and Biometrics Enterprise Reference Architecture (FBEA)
|
|
- Rhoda Armstrong
- 6 years ago
- Views:
Transcription
1 Forensics and Biometrics Enterprise Reference (FBEA) Overview and Summary Information (AV-1) Final Draft Version 2.6 Aug 2016
2 Version History Version# Date Page(s) Changed Change Description 1.0 Feb 2016 All FBEAWG Review 1.05 May 2016 All Rewrote all the content for DFBA s Sr. Leadership review and approval 1.06 May 2016 All Comments adjudicated from DFBA Internal Staffing 1.07 June 2016 All Post Sr. Leaders Offsite Meeting Feedback 1.08 June All Internal QA/QC 1.09 June All ARB Chief Review 2.0 June All Final Draft for Director s review 2.4 Jul All Sr. Leaders Re-review comments 2.5 All 2
3 Overview and Summary Information (AV-1) This AV-1 is an executive-level summary for the DoD Forensics and Biometrics Enterprise Reference Name Architect Developed By Approval Authority Status DoD Forensics and Biometrics Enterprise Reference (FBEA) Defense Forensics and Biometrics Agency (DFBA), Programs Division, Branch (ARB) DFBA/Programs Division/ARB DoD Enterprise and Services Board (EASB) In development. V1.1 will be ready for Internal DFBA and Army/Joint Staffing (Fall 2016) 1. SADIE: Repository Site 2. WMA-AFIP: 3. ArCADIE: Overview 1 This AV-1 describes the Forensics and Biometrics Enterprise Mission, Vision, Goals, Objectives, Capabilities, Activities, Measures, Effects (Outcomes), and Produced Objects/Resources. Detailed Description Purpose Usage The purpose of the FBEA is to document an objective description of activities, processes, data, information exchanges, services, policies, and terms for DoD Forensics and Biometrics Operations. FBEA will guide and constrain the development of solution architectures and informing the technical and investment decision-makers with the criteria that is necessary to make effective decisions in support of Forensics and Biometrics Enterprise. The FBEA will be used as an analytical framework to inform investment, acquisition, strategic and operational decision making for improved prioritization, coordination, and synchronization of Forensics and Biometrics capabilities and increased operational effectiveness for the DoD Forensics and Biometrics Enterprise. The architecture analysis will inform Program Objective Memorandum (POM) inputs and budget submissions while ensuring that approved and funded projects support conformance with Department guidance defined by DoDD E (2011) Department of Defense Forensic Enterprise (DFE) and DoDD E (2016) Department of Defense Biometrics. Ensure Components and Programs of Record s solution architectures are in conformance with the FBEA. 1 Derived from the Department of Defense Framework (DODAF) 3
4 Viewpoint Release Content In alignment with the DoD Information Enterprise (DIEA), the FBEA is developed from a strategic perspective to provide the DoD/Joint and Intel Communities (IC) with reference guidance for the definition and documentation of Forensics and Biometrics-related activities, processes, data, information exchanges, business rules, laws, regulations, policies, and terms. The FBEA includes the following architecture viewpoints: 1. Overview and Summary (AV-1) 2. Integrated Dictionary (AV-2) 3. Vision (CV-1) 4. Capability Taxonomy (CV-2) 5. Capability to Operational Activities Mapping (CV-6) 6. Data and Information View (DIV-1)/ Conceptual Data Model 7. High Level Operational Concept Graphic (OV-1) 8. Operational Resource Flow Description (OV-2) 9. Operational Resource Flow Matrix (OV-3) 10. Organizational Relationships (OV-4) 11. Operational Activity Decomposition Tree (OV-5a) 12. Operational Activity Model (OV-5b) 13. Operational Rules Model (OV-6a) 14. Services Context Description (SvcV-1) 15. Services Resource Flow Description (SvcV-2) 16. Services Functionality Description (SvcV-4) 17. Operational Activity to Services Traceability Matrix (SvcV-5) Future Versions will include: 1. Event Trace Description/Business Process Model (OV-6c) (Ongoing) 2. Standards View StdV-1/Technical Patterns, Positions (Ongoing) Domain Information Mission The FBEA enables forensics and biometrics capabilities and services for our defense, national, and international partners that efficiently and effectively meet the end users mission requirements. The FBEA enables forensics and biometrics capabilities and services for our defense, national, and international partners. Vision Develop FBEA that leads and executes common storage, matching, analysis, and sharing activities of the DoD Biometrics Enterprise for biometric data collected as part of military operations (DoDD E). FBEA includes traditional and battlefield (including expeditionary and reach-back) forensic capabilities that are planned to support the Joint Force Commanders (JFCs). (DoDD E) 4
5 Governance Assumptions and Constraints The FBEA will be maintained under the auspices of the Defense Forensics and Biometrics Agency Branch Chief, in collaboration with the Forensics and Biometrics Enterprise Working Group (FBEAWG). Also, FBEA will be reviewed, assessed and approved by the Army/DoD governance boards. See RA Summary Report for more details of this process (TBP). Assumptions: The current focus of the FBEA is Expeditionary Forensics only. FBEA aligns to DoD Information Enterprise, Joint Information Environment and Army Reference s. DoD Components Forensics and Biometric architectures, systems, and services adhere to applicable standards, protocols, and the FBEA to support interoperability. DFBA leads requirements, architecture, and standards development for joint, common, and interagency forensic and biometric capabilities Key partnerships between the Executive Agent (EA) for DoD Forensics, and Military Services, Combatant Commands (CCMDs), Interagency and Multinational organizations will be established by agreements and memorandums to foster information sharing whenever and wherever appropriate. Technical infrastructure to support security, data storage and transmission requirements will be available and accessible as needed to support mission execution. FBEA does not account for the use of biometrics for fitness and/or suitability activities as described in DoD R, Personnel Security Program, 23 Feb 1996; and DoDI , Background Checks on Individuals in DoD Child Care Services Programs, 11 Sept Constraints: Review and validation of the architecture artifacts by key stakeholders and subject matter experts (SMEs). Establish and maintain Document and Media Exploitation (DOMEX) capabilities in support of national intelligence needs and military operations (traditional and reachback). Army Executive Agent has no oversight on digital multimedia (D/MM) DoD collection of fingerprints for DoD law enforcement activities is not addressed by the FBEA, in accordance with DoDI , Fingerprint Card and Final Disposition Report Submission Requirements, 31 Oct Scope Scope The scope of FBEA is Forensics and Biometrics Enterprise is guidance, activities, capabilities, and resources to develop and maintain enduring, holistic, DoD forensics (including Document Media Exploitation (DOMEX) and Weapons Technical intelligence (WTI) and biometrics capabilities in support of the range of military operations (ROMO). This scope will accommodate those forensic disciplines relating to deoxyribonucleic acid (DNA), serology, firearms and tool marks, latent prints, questioned documents, drug chemistry, and trace materials in support of Operations (DoDD E). In addition, the FBEA establishes the framework to support institutionalization and governance of net-centric Forensics and Biometrics operations within the DoD, and strategic decision making related to investments in and management of the Forensics and Biometrics capability portfolio, in accordance with DoD Instruction Information Technology Portfolio Management Implementation, 30 Oct
6 Organizations Involved Development of the FBEA involves organizations within the DoD community and key stakeholders including: Joint Staff (JS), USD Acquisition, Technology, and Logistics (AT&L), and the Intelligence Community (IC), Department of Army, Department of Air Force, Department of Navy (including Marine Corps), Department of Justice (DOJ), Department of State (DOS), Department of Homeland Security (DHS), Defense Forensics and Biometrics Agency (DFBA), PM Biometrics, Defense Forensics Science Center (DFSC) and Combatant Commands (CCMDs). Time Frame 2015 to 2026 Goals and Objectives Goals for Development Effort Findings Alignment to DoD IEA 2.0 The FBEA is intended to address the following goals to support the employment of Forensics and Biometrics as a key enabler for operations. 1. Establish a Catalog of Forensics and Biometrics Services: Institutionalize and establish a federated DoD FBEA that promotes re-use and consistency through common terms and data accessibility. a. Enterprise Point of View an integrated enterprise-level perspective of Forensics and Biometrics across the DoD manifested through people, processes and technologies described across a catalog of services facilitating Joint Capabilities Integration Development System (JCIDS) and associated acquisition processes across the community. b. Federation distributed architecture responsibility and meaningful alignment across stakeholder architectures that allows for organized autonomy across the Forensics enterprise. c. Interoperability ensure that interoperability across the enterprise is facilitated through enforcement of compliance with DoD mandated standards for data exchange and assessment of conformance to FBEA. d. Data clearly defined data entities/elements that constitute any or all information items types, including the attributes used to describe them and the vital business relationships between, established for the Forensics and Biometrics enterprise. e. Assessment & Compliance a structured approach for assessing compliance to the enterprise lexicon, taxonomy, technical standards, and the Net Ready-Key Performance Parameter (NR-KPP). f. Enforcement Governance constructs with the decision authority to oversee and enforce compliance to data and technical standards, as well as facilitate collaboration across the enterprise. 2. Enable Decision Support for the Acquisition of Forensics Capabilities: Provide an analytical framework and insight to enable informed decision-making about changes to the Forensics and Biometrics capability portfolio across the enterprise. 3. Enable Effective Management and Oversight of the Forensics Capability Portfolio: Facilitate in-depth tradeoff analysis of requirements and resources to support capability and solution prioritization and investment decision making throughout the DoD. The Identity definition is still work in progress. The relationship between Identity and Intelligence is not clearly defined. Forensics standards are not mature yet and not available in DoD IT Standards Registry (DISR) FBEA is aligned with DIEA 2.0 architecture description and capability areas construct of Connect, Access, Share and Operate and Defend. 6
7 Linkages to Other s and Key References Future Development The FBEA is linked to the following architectures and key source documents: Department of Defense Enterprise (DoD EA) Department of Defense Information Enterprise (DIEA) v2.0 Defense Intelligence and Information Enterprise (DI2E) Reference Mission Partner Environment (MPE) Reference Department of Defense Joint Capability Areas (JCA) Forensics Initial Capabilities Document (ICD) Biometrics ICD This document is a living document and updates will be made as the FBEA artifacts are being developed/updated and the decisions are being finalized. This document is managed by the ARB in collaboration with FBEAWG. Tools and File Formats Used System Architect v , DOORS, Microsoft Word, Excel, Visio, PowerPoint and Adobe.pdf. 7
DoD Architecture Framework Version 2.0
wreath stars Text DoD Architecture Framework Version 2.0 Volume 3: DoDAF Meta-model Physical Exchange Specification Developer s Guide 18 May 2009 This page left intentionally blank TABLE OF CONTENTS SECTION
More informationVocabulary-Driven Enterprise Architecture Development Guidelines for DoDAF AV-2: Design and Development of the Integrated Dictionary
Vocabulary-Driven Enterprise Architecture Development Guidelines for DoDAF AV-2: Design and Development of the Integrated Dictionary December 17, 2009 Version History Version Publication Date Author Description
More informationBreakout Session. James Martin Kevin Kreitman Jeff Diehl Scott Bernard
Breakout Session Exploring the Differences between Enterprise and System s A Look at the Different Methods, Tools, and Techniques James Martin Kevin Kreitman Jeff Diehl Scott Bernard Slide 1 Abstract Point:
More informationUPDM PLUGIN. version user guide
UPDM PLUGIN version 17.0 user guide No Magic, Inc. 2011 All material contained herein is considered proprietary information owned by No Magic, Inc. and is not to be shared, copied, or reproduced by any
More informationcameo Enterprise Architecture UPDM / DoDAF / MODAF / SysML / BPMN / SoaML USER GUIDE version 17.0
cameo Enterprise Architecture UPDM / DoDAF / MODAF / SysML / BPMN / SoaML USER GUIDE version 17.0 No Magic, Inc. 2010 All material contained herein is considered proprietary information owned by No Magic,
More informationUPDM 2 PLUGIN. version user guide
UPDM 2 PLUGIN version 17.0.1 user guide No Magic, Inc. 2011 All material contained herein is considered proprietary information owned by No Magic, Inc. and is not to be shared, copied, or reproduced by
More informationACF Interoperability Human Services 2.0 Overview. August 2011 David Jenkins Administration for Children and Families
ACF Interoperability Human Services 2.0 Overview August 2011 David Jenkins Administration for Children and Families Interoperability: An Operational Definition Creating a Health and Human Service System
More informationDoD Architecture Framework Version 2.0
wreath stars Text DoD Architecture Framework Version 2.0 Volume 2: Architectural Data and Models Architect s Guide 28 May 2009 This page left intentionally blank TABLE OF CONTENTS SECTION PAGE 1. INTRODUCTION...
More informationSolutions Technology, Inc. (STI) Corporate Capability Brief
Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned
More informationIntroduction to the DoDAF 2.0
Introduction to the DoDAF 2.0 The introduction to the DoDAF 2.0 provides students with a foundational understanding of DoDAF 2.0 s history and purpose. During the DoDAF 2.0 introduction, items should not
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.
More informationDoD Strategy for Cyber Resilient Weapon Systems
DoD Strategy for Cyber Resilient Weapon Systems Melinda K. Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Systems Engineering Conference October 2016 10/24/2016 Page-1
More informationDoDD DoDI
DoDD 8500.1 DoDI 8500.2 Tutorial Lecture for students pursuing NSTISSI 4011 INFOSEC Professional 1 Scope of DoDD 8500.1 Information Classes: Unclassified Sensitive information Classified All ISs to include:
More informationTest & Evaluation of the NR-KPP
Defense Information Systems Agency Test & Evaluation of the NR-KPP Danielle Mackenzie Koester Chief, Engineering and Policy Branch March 15, 2011 2 "The information provided in this briefing is for general
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS IA Policies, Procedures, The Information Assurance (IA) Policies, Procedures, encompasses existing policies, procedures,
More informationDefense Engineering Excellence
Defense Engineering Excellence Kristen J. Baldwin Principal Deputy Office of the Deputy Assistant Secretary of Defense for Systems Engineering, OUSD(AT&L) 18th Annual NDIA Systems Engineering Conference
More information10 Steps to Building an Architecture for Space Surveillance Projects. Eric A. Barnhart, M.S.
10 Steps to Building an Architecture for Space Surveillance Projects Eric A. Barnhart, M.S. Eric.Barnhart@harris.com Howard D. Gans, Ph.D. Howard.Gans@harris.com Harris Corporation, Space and Intelligence
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Deployment Deployment is the phase of the system development lifecycle in which solutions are placed into use to
More informationArchitecture in the Intelligence Community
Architecture in the Intelligence Community DoD Enterprise Architecture Conference, June 2009 1 Topics Environment Joint Systems Engineering Forum (JSEF) Joint Architecture Reference Model (JARM) Exercising
More informationDoD Architecture and Standards Governance. NDIA Systems Engineering Conference
DoD Architecture and Standards Governance NDIA Systems Engineering Conference John P. Skudlarek, CISSP October 29, 2009 Enterprise Architecture & Standards Directorate Office of the DoD Deputy Chief Information
More informationNATIONAL INFORMATION SHARING STRATEGY
The Federal Bureau of Investigation NATIONAL INFORMATION SHARING STRATEGY August 2008 August 2008 1 PURPOSE The Federal Bureau of Investigation (FBI) National Information Sharing Strategy (NISS) provides
More informationfor TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method
Course Syllabus for 3 days Expert led Enterprise Architect hands-on training "An Architect, in the subtlest application of the word, describes one able to engage and arrange all elements of an environment
More informationDepartment of Defense MANUAL
Department of Defense MANUAL NUMBER 3305.09 May 27, 2014 Incorporating Change 1, Effective April 9, 2018 USD(I) SUBJECT: Cryptologic Accreditation and Certification References: See Enclosure 1 1. PURPOSE.
More informationOSD Product Support BCA Guidebook. Joseph Colt Murphy Senior Financial Analyst ODASD Materiel Readiness 9 May 2011
OSD Product Support BCA Guidebook Joseph Colt Murphy Senior Financial Analyst ODASD Materiel Readiness 9 May 2011 Joseph.murphy@osd.mil Introduction Product Support BCA Guidebook Draft document Final review
More informationIntegrated Cyber Defense Working Group (ICD WG) Introduction
Integrated Cyber Defense Working Group (ICD WG) Introduction Cory Huyssoon Allison Cline October 16, 2017 2017 by The Johns Hopkins Applied Physics Laboratory. Material is made available under the Creative
More informationOFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA
OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA 22041-3206 TRICARE MANAGEMENT ACTIVITY MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT:
More informationTRIAEM LLC Corporate Capabilities Briefing
TRIAEM LLC Corporate Capabilities Briefing 3/4/ 1 CORPORATE OVERVIEW CORPORATE VALUES MISSION STATEMENT SERVICES WORKFORCE EXPERIENCE CORPORATE CONTACTS 3/4/ 2 CORPORATE OVERVIEW TRIAEM is certified through
More informationMitigation Framework Leadership Group (MitFLG) Charter DRAFT
Mitigation Framework Leadership Group (MitFLG) Charter DRAFT October 28, 2013 1.0 Authorities and Oversight The Mitigation Framework Leadership Group (MitFLG) is hereby established in support of and consistent
More informationInformation Security Continuous Monitoring (ISCM) Program Evaluation
Information Security Continuous Monitoring (ISCM) Program Evaluation Cybersecurity Assurance Branch Federal Network Resilience Division Chad J. Baer FNR Program Manager Chief Operational Assurance Agenda
More informationFive-Year Strategic Plan
Five-Year Strategic Plan 2016 2020 Contents A Message from the ERIS Board... 3 Introduction and Background... 4 Five-Year Plan Goal Areas... 7 Goal Area 1: State Environmental Agency Research Needs and
More informationData Governance Central to Data Management Success
Data Governance Central to Data Success International Anne Marie Smith, Ph.D. DAMA International DMBOK Editorial Review Board Primary Contributor EWSolutions, Inc Principal Consultant and Director of Education
More informationEUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE
EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile
More informationGood morning, Chairman Harman, Ranking Member Reichert, and Members of
Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,
More informationNational Strategy for CBRNE Standards
National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September
More informationDISDI Plenary Session
JSEM JSEM // Geospatial Geospatial Information Information & & Services Services Conference, Conference, 2007 2007 DISDI Plenary Session 22 22 May May 2007 2007 Columbus, Columbus, Ohio Ohio JSEM JSEM
More informationCertificate Assessment Plan: Graduate Certificates in Forensic Sciences, Clinical Toxicology and Pharmaceutical Chemistry
Certificate Assessment Plan: Graduate Certificates in Forensic Sciences, Clinical Toxicology and Pharmaceutical Chemistry 2012-2013 Office of the Provost University of Florida Institutional Assessment
More informationBiometric Standards for DoD Operational Requirements
Biometric Standards for DoD Operational Requirements Mr. Benji Hutchinson James.Hutchinson@hqda.army.mil Biometrics Task Force 28 Feb 2008 1 Overview Rationale for Biometric Standards in DoD BTF Biometric
More informationUNCLASSIFIED. Exhibit R-2, RDT&E Budget Item Justification Date: February 2008 Appropriation/Budget Activity RDT&E, Dw BA 06
Exhibit R-2, RDT&E Budget Item Justification Date: February 2008 R-1 Item Nomenclature: Support to Networks and Information Integration, 0605170D8Z Cost ($ in millions) FY 2007 FY 2008 FY 2009 FY 2010
More informationThe Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse
The Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse Stephen Hunt OSD CAPE Joint Data Support (SAIC) Stephen.Hunt.ctr@osd.mil The DoD Office of Security Review has cleared this report
More informationIntegrated Consortium of Laboratory Networks (ICLN)
Integrated Consortium of Laboratory Networks (ICLN) Dr. S. Randolph Long Deputy Director Chem Bio Division, DHS S&T Directorate FERN National Training Conference June 2009 1 Outline ICLN Organization Steps
More informationEngineering the Army Common Operating Environment (COE) Presentation To:
Engineering the Army Common Operating Environment (COE) Presentation To: COE Architecture Guidance CIO/G-6 in close coordination with ASA(ALT) Systems of Systems Engineering (SOSE) has developed COE Architecture
More informationArchitecture in Support of Business Operations
Architecture in Support of Business Operations Dennis E. Wisnosky DOD Business Mission Area Chief Technical Officer/Chief Architect within the Office of the Deputy Chief Management Officer June 3rd, 2009
More informationNISP Update NDIA/AIA John P. Fitzpatrick, Director May 19, 2015
NISP Update NDIA/AIA John P. Fitzpatrick, Director May 19, 2015 Agenda Cybersecurity Information Sharing and the NISP NISP Working Group Update CUI Program Update 2 Executive Order 13691 Promoting Private
More informationBuild Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development
Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development Noel Kyle, Program Manager Department of Homeland Security (DHS) National Cybersecurity Education
More informationMoving Data through Early Planning into Design and Operations
Moving Data through Early Planning into Design and Operations Stephen R Hagan FAIA Kimon Onuma FAIA Russell Manning Federal Facilities Council U.S. Department of Agriculture Agricultural Research U.S.
More informationIntegrating TOGAF, Zachman and DoDAF Into A Common Process
Integrating TOGAF, Zachman and DoDAF Into A Common Process Rolf Siegers Senior Principal Software Systems Engineer The Open Group Architecture Practitioner s Conference October 2003 Customer Success Is
More informationData Governance Strategy
Build to Share U.S. Federal Enterprise Architecture Data Reference Model (FEA DRM): Data Governance Strategy July 2007 Suzanne Acar, US DOI Co-Chair, Federal DAS Suzanne_acar@ios.doi.gov Adel Harris Citizant,
More informationNational Counterterrorism Center
National Counterterrorism Center Vision To become the nation s center of excellence for terrorism and counterterrorism issues, orchestrating and shaping the national and international effort to eliminate
More informationRaytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40
Raytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40 Dale Anglin Erik Baumgarten John Dinh Mark Hall Bert Schneider May 13, 2008 Cleared for public release
More informationDepartment of Interior Metadata Implementation Guide
Department of Interior Metadata Implementation Guide A Framework for Developing the Metadata Component for Data Resource Management Implementation 2016 Credits DOI Metadata Implementation Team Co-Leads:
More informationService Vs. System. Why do we need Services and a Services Viewpoint in DM2 and DoDAF? Fatma Dandashi, PhD March 4, 2011
Service Vs. System Why do we need Services and a Services Viewpoint in DM2 and DoDAF? Fatma Dandashi, PhD March 4, 2011 1. Does DoD Need To Model a Service? Bottom Line Up front (BLUF) DoD has a requirement
More informationThe U.S. National Spatial Data Infrastructure
June 18, 2014 INSPIRE Conference 2014 The U.S. National Spatial Data Infrastructure past present and future Ivan B. DeLoatch Executive Director, Federal Geographic Data Committee U.S. Geological Survey
More informationDepartment of Defense (DoD) Joint Federated Assurance Center (JFAC) Overview
Department of Defense (DoD) Joint Federated Assurance Center (JFAC) Overview Kristen Baldwin Principal Deputy, Office of the Deputy Assistant Secretary of Defense for Systems Engineering (DASD(SE)) 17
More informationDomestic Nuclear Detection Office (DNDO) DNDO Overview
Domestic Nuclear Detection Office (DNDO) DNDO Overview Summer 2008 Outline DNDO Mission, Objectives and Organization Defining the radiological and nuclear threat Multi-layered approach to security Global
More informationThe National Initiative for Cybersecurity Education (NICE) The NICE Workforce Framework, NIST SP , Overview October 4, 2017
The National Initiative for Cybersecurity Education (NICE) The NICE Workforce Framework, NIST SP 800-181, Overview October 4, 2017 NICE Strategic Goals - http://csrc.nist.gov/nice/about/strategicplan.html
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense : February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 7: Operational Systems Development
More information2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021
2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.
More informationImplementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs
Implementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs Philomena Zimmerman Office of the Deputy Assistant Secretary of Defense for Systems Engineering
More informationOffice of Acquisition Program Management (OAPM)
Office of Acquisition Program Management (OAPM) Ron Gallihugh Assistant Administrator Airport Consultants Council July 18, 2017 Acquisition Reform Historically, Transportation Security Administration (TSA)
More informationUNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 10 R-1 Line #218
COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY 2015 FY 2015 OCO # Total FY 2016 FY 2017 FY 2018 FY 2019 Office of Secretary Of Defense Page 1 of 10 R-1 Line #218 Cost To Complete Total
More informationENTERPRISE ARCHITECTURE
ENTERPRISE ARCHITECTURE Executive Summary With more than $1 billion in information technology investments annually, the Commonwealth of Pennsylvania has evolved into the equivalent of a Fortune 20 organization,
More informationAntiterrorism / Force Protection (AT/FP) Assessment Tool Training. Module 1: Policy Drivers for MARMS & AT/FP Assessments
Antiterrorism / Force Protection (AT/FP) Assessment Tool Training Module 1: Policy Drivers for MARMS & AT/FP Assessments Supporting Joint Staff J33 via US Army Armament, Research, Development and Engineering
More informationGuidance and Policy For Department of Defense (DoD) Global Information Grid (GIG) Computing
1 2 Guidance and Policy For Department of Defense (DoD) Global Information Grid (GIG) Computing References: (a) DoD Chief Information Officer (CIO) Guidance and Policy Memorandum No.-8001-March 31, 2000-Global
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Network Hunting The Network Hunting is employed to proactively look for indicators of an active threat or exploitation
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Network Boundary and The Network Boundary and for an Enterprise is essential; it provides for an understanding of
More informationStatement of Organization, Functions, and Delegations of Authority: Office of the
This document is scheduled to be published in the Federal Register on 07/27/2016 and available online at http://federalregister.gov/a/2016-17737, and on FDsys.gov 4184-40P DEPARTMENT OF HEALTH AND HUMAN
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Signature Repository A Signature Repository provides a group of signatures for use by network security tools such
More informationIntegrated Consortium of Laboratory Networks (ICLN) Brief to the NPDN National Meeting
Integrated Consortium of Laboratory Networks (ICLN) Brief to the NPDN National Meeting January 30, 2007 1 Agenda ICLN Background Information Network Coordinating Group Accomplishments Responsible Federal
More informationFederal Continuous Monitoring Working Group. March 21, DOJ Cybersecurity Conference 2/8/2011
Federal Continuous Monitoring Working Group March 21, 2011 DOJ Cybersecurity Conference 2/8/2011 4/12/2011 Why Continuous Monitoring? Case for Change Strategy Future State Current State Current State Case
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More information13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)
AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft
More informationDefense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility
Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous
More informationCyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber
CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber Initiatives 30 January 2018 1 Agenda Federal Landscape Cybersecurity
More informationHealth Information Technology - Supporting Joint Readiness
Health Information Technology - Supporting Joint Readiness Session # 104, March 7, 2018 Mr. T. Pat Flanders, DADIO/J-6, CIO Kevin P. Seeley, Deputy CIO, Colonel, USAF, MSC 1 Speaker Introduction Pat Flanders
More informationIn 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets.
REPORT FOR ACTION IT Infrastructure and IT Asset Management Review: Phase 1: Establishing an Information Technology Roadmap to Guide the Way Forward for Infrastructure and Asset Management Date: January
More informationS&T Stakeholders Conference
S&T Stakeholders Conference Risk-Informed Requirements Process Col. Merrick Krause, USAF (Ret.) Director Infrastructure Analysis & Strategy Division U.S. Department of Homeland Security June 2-5, 2008
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8551.1 August 13, 2004 ASD(NII)/DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: (a) DoD Directive 8500.1, "Information Assurance (IA),"
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE Digital Policy Management consists of a set of computer programs used to generate, convert, deconflict, validate, assess
More informationMNsure Privacy Program Strategic Plan FY
MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term
More informationService Management. What an Acquisition Practitioner Needs to Know. Karen Gomez Defense Information Systems Agency Mission Support Division
Service Management DAU Symposium April 4, 2017 What an Acquisition Practitioner Needs to Know Karen Gomez Defense Information Systems Agency Mission Support Division 1 Topics DESMF The DESMF Realized Service
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Physical Enterprise Physical Enterprise Monitoring is the monitoring of the physical and environmental controls that
More informationENTERPRISE ARCHITECTURE FOR THE AIR FORCE SATELLITE CONTROL NETWORK
ENTERPRISE ARCHITECTURE FOR THE AIR FORCE SATELLITE CONTROL NETWORK Raul J. Diaz USAF, 50 th Network Operations Group, raul.diaz@us.af.mil ABSTRACT Our cultural expectation about technology continually
More informationDoD M, March 1994
1 2 3 FOREWORD TABLE OF CONTENTS Page FOREWORD 2 TABLE OF CONTENTS 4 FIGURES 5 REFERENCES 6 DEFINITIONS 8 ABBREVIATIONS AND ACRONYMS 14 CHAPTER 1 - INTRODUCTION 16 C1.1. Purpose 16 C1.2. Applicability
More informationOverview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive
More informationDHS Overview of Sustainability and Environmental Programs. Dr. Teresa R. Pohlman Executive Director, Sustainability and Environmental Programs
DHS Overview of Sustainability and Environmental Programs Dr. Teresa R. Pohlman Executive Director, Sustainability and Environmental Programs DHS Mission DHS Organization Getting to Know DHS Mission: Secure
More informationApproaches to Achieve Benefits of Modularity in Defense Acquisition
Approaches to Achieve Benefits of Modularity in Defense Acquisition Sponsor: DASD(SE) By Dr Daniel DeLaurentis 10 th Annual SERC Sponsor Research Review November 8, 2018 FHI 360 CONFERENCE CENTER 1825
More informationModule 3. Overview of TOGAF 9.1 Architecture Development Method (ADM)
Module 3 Overview of TOGAF 9.1 Architecture Development Method (ADM) TOGAF 9.1 Structure The Architecture Development Method (ADM) Needs of the business shape non-architectural aspects of business operation
More informationIntegrated C4isr and Cyber Solutions
Integrated C4isr and Cyber Solutions When Performance Matters L3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a
More informationSecurity Director - VisionFund International
Security Director - VisionFund International Location: [Europe & the Middle East] [United Kingdom] Category: Security Job Type: Open-ended, Full-time *Preferred location: United Kingdom/Eastern Time Zone
More informationCOMPLIANCE WITH THIS PUBLICATION IS MANDATORY
BY ORDER OF THE COMMANDER NATIONAL AIR & SPACE INTELLIGENCE CENTER NASIC INSTRUCTION 33-108 6 JUNE 2013 Communications NASIC STRATEGIC IT MANAGEMENT COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY:
More informationVendor: The Open Group. Exam Code: OG Exam Name: TOGAF 9 Part 1. Version: Demo
Vendor: The Open Group Exam Code: OG0-091 Exam Name: TOGAF 9 Part 1 Version: Demo QUESTION 1 According to TOGAF, Which of the following are the architecture domains that are commonly accepted subsets of
More informationImplementing the Army Net Centric Data Strategy in a Service Oriented Environment
Implementing the Army Net Centric Strategy in a Service Oriented Environment Michelle Dirner Army Net Centric Strategy (ANCDS) Center of Excellence (CoE) Service Team Lead RDECOM CERDEC SED in support
More informationDISA CLOUD CLOUD SYMPOSIUM
DISA CLOUD P L A Y B O O K CLOUD SYMPOSIUM DISA Cloud Adoption Cycle LEARN CHOOSE BUY CONFIGURE TRANSITION UTILIZE CLOUD CONSUMER What Mission Partners Should Know and Do Cloud Policies Goals (Fit, Leverage,
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons
More informationTest Resource Management Center Directed Energy T&E Conference A Joint DEPS ITEA Event
Test Resource Management Center Directed Energy T&E Conference A Joint DEPS ITEA Event Mr. George Rumford Deputy Director Major Initiatives and Technical Analyses Test Resource Management Center January
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Port Security Port Security helps to control access to logical and physical ports, protocols, and services. This
More informationDEPARTMENT OF HEALTH and HUMAN SERVICES. HANDBOOK for
DEPARTMENT OF HEALTH and HUMAN SERVICES HANDBOOK for FEDERAL ACQUISITION CERTIFICATION PROGRAM/PROJECT MANAGERS Issuer Office of the Secretary Office of the Assistant Secretary for Financial Resources
More informationDefense Logistics Agency INSTRUCTION
Defense Logistics Agency INSTRUCTION Subject: Plain Language Program References: DLAI 5025.13 Effective September 10, 2015 Accountable Office: Headquarters Complex Strategic Plans and Policy, Policy Management
More informationEmergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:
ESF Coordinator: Homeland Security/National Protection and Programs/Cybersecurity and Communications Primary Agencies: Homeland Security/National Protection and Programs/Cybersecurity and Communications
More informationUpdates to the NIST Cybersecurity Framework
Updates to the NIST Cybersecurity Framework NIST Cybersecurity Framework Overview and Other Documentation October 2016 Agenda: Overview of NIST Cybersecurity Framework Updates to the NIST Cybersecurity
More information