NCOIC Interoperability Framework (NIF ) and NCOIC Patterns Overview

Size: px
Start display at page:

Download "NCOIC Interoperability Framework (NIF ) and NCOIC Patterns Overview"

Transcription

1 Network Centric Operations Industry Consortium NCOIC Interoperability Framework (NIF ) NCOIC Interoperability Framework (NIF ) and NCOIC Patterns Overview and NCOIC Patterns Overview August 2008 Approved for Public Release NCOIC-NIF Overview Copyright 2008 NCOIC - All rights reserved

2 About NIF Customer Goals Missions to Achieve Goals Mission Needs Solutions to Needs Resulting Services NCO Initiatives Database SCOPE Model NIF Provides enabling guidance for net-ready solutions -Overarching framework - Specialized frameworks - Pattern template Modeling/simulation NIF 1. Analysis of Alternatives 2. Requirements Derivation 3. Requirements Validation 4. Design Synthesis BB 5. Design Verification 6. Deployment 7. Support 8. Upgrade/Disposal NCAT NCOIC Building Net Centric Interoperability Blocks Analysis Framework Tool End-to-End Quality of Service Copyright 2008 NCOIC - All Rights Reserved Test/evaluation 2

3 Why Is a NIF Needed? Why Is a NIF Needed? Most attempts at common architectures and common standards have failed to achieve interoperable systems The NIF is different because Recommends standards plus guidance flexible enough to be used in multiple architectures Derived by consensus across industry not dictated by a single organization Closer to Internet model (IETF methodology in the W3C) than a prescriptive policy-based approach for a department or ministry of defense 3

4 Standards Alone are not Sufficient Need Guidance Standards Alone Are Not Sufficient Need Guidance Performance A Performance C Standard D Standard A Standard C Standard B Standard E Standard F Often the BEST Standard depends on the Mission Real-World Condition! Often no One Size Fits All Performance B Requires Guidance to select Consistent Standards by Class of Missions: very hard to do! (but a key goal of the NIF ) 4

5 Guidance re: Mission Guidance re: Mission Usually no one Standard can be general enough to meet all needs of all domains, as the SCOPE Model demonstrates Cost* QoS* Transfer Rate* Standard A attribute range For Technology X Standard B attribute range For Technology X Net Awareness* Different Standards because Different Mission Domains have Different Needs! Security* * Examples of SCOPE dimensions, actual dimensions are more comprehensive Autonomy* Power* Service Orientation* 5

6 Notional Cost (or Risk) Guidance re: Level of NCO Guidance re: Level of NCO What is the appropriate level of NetCentricity for a given operational context? May impact selection of Standards! Which is the Best Standard for this hypothetical operational context? This example is time-based; many other perspectives! Standard A For Technology X Standard B For Technology X Today s Range of required performance Future Range of required performance Notional Performance Copyright 2008 NCOIC - All Rights Reserved 6

7 % A-to-B Interoperable Copyright 2008 NCOIC - All Rights Reserved assists Example: customers Notional Intended in obtaining Span of Standard Example: Notional Intended Span of Standard Notional Intended Span of Standard SYSTEM A Extension: Added Highly-Desirable Range 100% Interoperable 100% Interoperable SYSTEM B Extension: Added Highly-Desirable Feature Bad Standard, or Bad System Implementations? Real-World Condition! In a System-of-Systems, cannot force systems to not use highly-desirable features when operating independently Requires Guidance to operate in 100% Interoperability Regions Can only recommend use of 100% Interoperability Regions when Systems need to Interoperate 7

8 % Versions Interoperable Copyright 2008 NCOIC - All Rights Reserved assists Guidance customers re: Versions in obtaining Guidance re: Versions ORIGINAL Standard v1.0 UPDATED Standard v1.1 NEW Standard v2.0: Backward Compatible 100% all 3 versions Interoperable 100% v1.1 & 2.0 Interoperable V1.0 & v2.0 V1.1 & v2.0 Is Everyone Running the Same Version of a Standard? Real-World Condition! In a System-of-Systems, cannot force Legacy systems to update to newest standard Requires Guidance to operate in 100% Interoperability Regions Can only recommend use of 100% Interoperability Regions when Systems need to Interoperate 8

9 % Interoperable Copyright 2008 NCOIC - All Rights Reserved Guidance re: Standards Interpretations Guidance re: Standards Interpretations Interpretation A of Standard Interpretation B of Standard GUIDED Interpretation of Standard Goal: 100% Interoperable with Guided Interpretation Inconsistent Interoperability without Common Guidance Does Everyone Understand the Standard the Same Way? Real-World Condition! (Not necessarily a bad Standard) Requires Guidance to achieve goal of common understanding Different Languages; different Cultural backgrounds Same Standard applied in different Operational Domains Same Standard implemented by designers with different levels of experience, different technical disciplines, different company rules 9

10 Layers of Interoperability Copyright 2008 NCOIC - All Rights Reserved assists Interdependency customers of in Standards obtaining Interdependency of Standards Political or Business Objectives Harmonized Strategy/Doctrines Aligned Operations Aligned Procedures Knowledge/Awareness of Actions Semantic/Information Interoperability Data/Object Model Interoperability Connectivity & Network Interop. Physical Interoperability People & Processes & Applications Information Services Network Transport Standards are Interdependent! Standards for a layer of Interoperability often dependent on standards for lower layers COI Standard C2 Application Standard Web Services Standard Radio Standard COP Standard IPv6 Standard KM Standard Pub / Sub Standard LAN Standard 10

11 Guidance must be CLEAR and Straightforward! Guidance must be CLEAR and Straightforward! 11

12 assists The Value customers of the NIF in obtaining Approach The Value of the NIF Approach Addresses the problems listed on prior pages Focus is on Net-Centric / Net-Enabled aspects Encourages users to use a common terminology and approach to achieving the guidelines Consistent terminology and repeatable patterns of solutions Includes lessons learned from domain experts to keep future users from repeating common mistakes Addresses root causes of interoperability failures Integrates guidance across critical specialties The Specialized Frameworks e.g., Information Assurance, Services, Semantics, Mobility, etc. Includes guidance for verification that the standards and guidance have been properly followed Designed to support all stages of the system life cycle Acquisition, initial design, upgrade design, training 12

13 assists Intended customers Users of the in obtaining NIF Intended Users of the NIF Oriented toward Architects (System, Enterprise, SoS) as well as Design Engineers Useful for general industry and governments, not just NCOIC members How does the NIF help the intended users? Acquisition community Generating better Request For Proposals / Tenders Evaluating proposals from a common perspective Industry Expands available markets (example: the Internet) Points architects in the right direction for interoperability Establishes infrastructure that allows a company to focus on value added enhancements rather than basic environment 13

14 Copyright 2008 NCOIC - - All All Rights Reserved The NIF Process in Four Documents The NIF Process in Four Documents Requirements Solution & Guide NIF Scope and Problem Statement Deliverable (NSPS) Defines the Scope of of the NIF Defines the Interoperability Problem Space Defines top level requirements for interoperability NIF Solution Description (NSD) Reference Manual (NSD-RM) including Overarching Information (meta)model User s Guide (NSD-UG) with general user oriented NIF guidelines & rules for architecting, including Fully Documented Example Main Industry and Customer Interest Rationale NIF Approach and Rationale (NAR) Examines alternatives for a a particular solution space Defines criteria for interoperability and net-centricity Makes recommendations for a a solution set based on on the criteria 14

15 assists The Process customers in Action in obtaining The Process in Action Operational Subject Matter Expert Enterprise/System Architect Technical Subject Matter Expert NCOIC Customer Operational Analysis Architectural Analysis Technical Analysis NCOIC Focus: Net-Centric Interoperability NCO Requirements Integrated Project Teams (IPTs) SCOPE Model Overarching Architecture Specs IPTs, NIF OverArching Framework Technology Guidance IPTs, Specialized Frameworks 15

16 Operational Analysis Operational Analysis Operational SME NCOIC Customer NCOIC focus Enterprise Context, Organization, Assets & Missions Operation al Standards IPTs, SCOPE Operational Analysis SCOPE dimensions NCO Scenarios & Use Cases NCO Capabilities & KPPs NCO Views and Patterns Copyright 2008 NCOIC - All Rights Reserved Operational Description Domain (or Operational) Patterns 16

17 assists Architectural customers Analysis in obtaining Architectural Analysis Enterprise/System Architect Generalization NCOIC Customer NCOIC focus Operational Description Architecture Standards Architectural Analysis NetCentric Services, Principles, Tenets, Architecture Patterns, Architecture Standards and Technology Forecasts, Risks OverArching Architecture Description Capability Patterns IPTs using NIF OverArching Framework artifacts 17

18 assists Technical customers Analysis in obtaining Technical Analysis Technical SME Specialization NCOIC Customer NCOIC focus OverArching Architecture Description Technical Standards Technical Analysis Technical Services Principles, Tenets Technical Standards & Forecasts IPTs and Specialized Frameworks (SF) using NIF +SF artifacts Copyright 2008 NCOIC - All Rights Reserved Technical Description Technical Patterns 18

19 Framework, Process, and Patterns Framework, Process, and Patterns The Overarching Framework contains: Concepts: necessary knowledge definitions, dictionaries, ontologies, information models, etc. Processes: Top-down, Bottom-up, & Middle-out Principles: overall requirements, goals, tenets, and best practices that foster net-centricity A construct for developing guidance for solving Operational and Technical problems for a given context The latter is a template for NCOIC Patterns These Patterns are not contained in the NIF Patterns are stored in an online Repository Patterns provide guidance for creating systems with the desired net-centric capabilities and mitigate specific net-centric interoperability problems 19

20 Basis for Patterns Basis for Patterns Christopher Alexander, Civil Engineering Architect Described architecture patterns for civil engineering Design Patterns: Elements of Reusable Object- Oriented Software Book by Erich Gamma, Richard Helm, Ralph Johnson, and John M. Vlissides (the Gang of Four) Successful pattern stories: J2EE & Microsoft.NET Patterns (software) DIACAP-compliant Security Patterns (secure design) Key foundation for NCOIC Patterns: Systems Architecture Patterns (Cloutier & Verma) 20

21 assists Characteristics customers of a in Systems obtaining Architecture Pattern Characteristics of a Systems Architecture Pattern A Systems Architecture Pattern is a high-level structure, appropriate for the major components of a system. It expresses the relationship between: The Context A Problem A Solution A Systems Architecture Pattern Documents: Attributes Usage Guidance Patterns are time-proven in solving problems similar in nature to the problem under consideration Extracted from Applying the Concept of Patterns to Systems Architecture by Robert J. Cloutier and Dinesh Verma, Stevens Institute of Technology, Systems Engineering DOI /sys Copyright 2008 NCOIC - All Rights Reserved 21

22 assists NCOIC Patterns customers Focus in obtaining on Net-Centric Interoperability NCOIC Patterns Focus on Net-Centric Interoperability Finding a PATTERN of Net-Centricity amongst all of the apparent conflict & noise Subject Matter Experts often independently arrive at similar solutions (a painful process!) 22

23 PATTERNS OF NET-CENTRIC INTEROPERABILITY Three Major Categories of NCOIC Patterns Three Major Categories of NCOIC Patterns Operational (or Domain) Patterns Top level approaches to addressing domain or Customer Capability needs Identifies associated Capability Patterns Example: Sense & Respond Logistics Total Asset Visibility Capability (or Composite or Application) Patterns One or more for each of the areas identified above Describe an approach to achieving a particular capability need in the context of the domain Identifies associated Technical Patterns Example: Legacy Systems Integration Technical Patterns Specific approaches to solving a given technical need identified in the Capability Patterns Example: Web Services Copyright 2008 NCOIC - All Rights Reserved 23

24 Pattern Relationships Pattern Relationships NOTIONAL EXAMPLE OPERATIONAL DOMAIN A OPERATIONAL DOMAIN B NIF v1 Operational Description (OD) Composite Pattern CAPABILITY PATTERN 1 CAPABILITY PATTERN 2 CAPABILITY PATTERN 3 CAPABILITY PATTERN 4 NIF v1 PFC? TECHNICAL PATTERN A TECHNICAL PATTERN B TECHNICAL PATTERN C TECHNICAL PATTERN D * TECHNICAL PATTERN E TECHNICAL PATTERN F TECHNICAL PATTERN G NIF v1 Global Attribute 24

25 Anatomy of a NCOIC Pattern Anatomy of a NCOIC Pattern Captures domain knowledge from Subject Matter Experts (SMEs) Not just about Standards Includes mature solutions to a given domain problem Includes best standards to apply to a problem Goes beyond the standards to include practical guidance as to how to implement the standards Guidance oriented toward obtaining consistent results Flexible/Extensible solutions to a genre of problems Not a specific recipe for a solution to a specific problem 25

26 Anatomy of a NCOIC Pattern (Continued) Anatomy of a NCOIC Pattern (Continued) An NCOIC Pattern also contains: Identity Purpose (context and applicable scenarios) Description Architectural implementation, interfaces, applicability, known uses, maturity metrics, etc. Relationships to other required/associated patterns Verification Showing that the Pattern complies with NIF (and Specialized Framework) guidance Conformance How to verify conformance of Building Block components to the Pattern Tailoring Guidance of how to apply/adjust to various domains Copyright 2008 NCOIC - All Rights Reserved 26

27 Relationship of the NIF to Other NCOIC Tools Relationship of the NIF to Other NCOIC Tools Customer Goals Missions to Achieve Goals Mission Needs Solutions to Needs Resulting Services SCOPE Model NCO Initiatives Database NIF 1. Analysis of Alternatives 2. Requirements Derivation 3. Requirements Validation 4. Design Synthesis NCOIC Interoperability Framework BB Building Blocks NCAT Net Centric Analysis Tool End-to-End Quality of Service Modeling/simulation 5. Design Verification 6. Deployment 7. Support 8. Upgrade/Disposal Test/evaluation 27

28 Relationship of the NIF to Other NCOIC Activities Relationship of the NIF to Other NCOIC Activities Relationship of the NIF to: NCOIC Integrated Project Teams (IPTs) Provides process guidance for IPT development and update of NCOIC Patterns NCOIC Functional Teams (FTs) Provides process guidance for FT development and update of Technical Patterns External Standards-setting bodies Potentially identifies gaps in existing Standards and desirable enhancements to existing and new Standards Note: the NCOIC is not a standards-setting body! 28

29 NIF Summary NIF Summary Break through the Technical Maze Reach the Reward of Interoperable Systems 29

30 NCOIC Goals NCOIC Goal 30

Net Centric Principles

Net Centric Principles Net Centric Principles Hans Polzer Lockheed Martin Corporation 703 416-2308 hans.w.polzer@lmco.com NCOIC Net Centric Attributes Functional Team Chair October 27, 2010 Page 1 The NCOIC at a Glance Members

More information

NCOIC Interoperability Framework (NIF ) NIF Solution Description Reference Manual (NSD-RM) NIF Architecture Concepts Functional Team Document Authors:

NCOIC Interoperability Framework (NIF ) NIF Solution Description Reference Manual (NSD-RM) NIF Architecture Concepts Functional Team Document Authors: NCOIC Interoperability Framework (NIF ) NIF Solution Description () NIF Architecture Concepts Functional Team Document Authors: Gundars Osvalds Northrop Grumman Corporation Mark Bowler The Boeing Company

More information

The Net-Enabled Future:

The Net-Enabled Future: The Net-Enabled Future: An OCTANe Discussion Panel Topic Sheryl Sizelove, The Boeing Company Network Centric Operations Industry Consortium (NCOIC) 27 September 2006 Approved by Boeing Export. Authorization

More information

Raytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40

Raytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40 Raytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40 Dale Anglin Erik Baumgarten John Dinh Mark Hall Bert Schneider May 13, 2008 Cleared for public release

More information

What s a BA to do with Data? Discover and define standard data elements in business terms

What s a BA to do with Data? Discover and define standard data elements in business terms What s a BA to do with Data? Discover and define standard data elements in business terms Susan Block, Lead Business Systems Analyst The Vanguard Group Discussion Points Discovering Business Data The Data

More information

Vendor: The Open Group. Exam Code: OG Exam Name: TOGAF 9 Part 1. Version: Demo

Vendor: The Open Group. Exam Code: OG Exam Name: TOGAF 9 Part 1. Version: Demo Vendor: The Open Group Exam Code: OG0-091 Exam Name: TOGAF 9 Part 1 Version: Demo QUESTION 1 According to TOGAF, Which of the following are the architecture domains that are commonly accepted subsets of

More information

An Overview of TOGAF Version 9.1

An Overview of TOGAF Version 9.1 An Overview of TOGAF Version 9.1 Robert Weisman MSc, PEng, PMP, CD CEO / Chief Enterprise Architect robert.weisman@buildthevision.ca 44 Montgomery Street 1168 Ste Therese Ottawa, Ontario Canada K1C2A6

More information

Implementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs

Implementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs Implementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs Philomena Zimmerman Office of the Deputy Assistant Secretary of Defense for Systems Engineering

More information

OG The Open Group OG TOGAF 9 Combined Part 1 and Part 2

OG The Open Group OG TOGAF 9 Combined Part 1 and Part 2 The Open Group OG0-093 TOGAF 9 Combined Part 1 and Part 2 1 Set1, Part 1 QUESTION: 1 Which of the following TOGAF components was created to enable architects to design architectures addressing Boundaryless

More information

OG0-091 Q&As TOGAF 9 Part 1

OG0-091 Q&As TOGAF 9 Part 1 CertBus.com OG0-091 Q&As TOGAF 9 Part 1 Pass The Open Group OG0-091 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance

More information

Implementing the Army Net Centric Data Strategy in a Service Oriented Environment

Implementing the Army Net Centric Data Strategy in a Service Oriented Environment Implementing the Army Net Centric Strategy in a Service Oriented Environment Michelle Dirner Army Net Centric Strategy (ANCDS) Center of Excellence (CoE) Service Team Lead RDECOM CERDEC SED in support

More information

OSD Product Support BCA Guidebook. Joseph Colt Murphy Senior Financial Analyst ODASD Materiel Readiness 9 May 2011

OSD Product Support BCA Guidebook. Joseph Colt Murphy Senior Financial Analyst ODASD Materiel Readiness 9 May 2011 OSD Product Support BCA Guidebook Joseph Colt Murphy Senior Financial Analyst ODASD Materiel Readiness 9 May 2011 Joseph.murphy@osd.mil Introduction Product Support BCA Guidebook Draft document Final review

More information

NCOIC Rapid Response Capability (NRRC)

NCOIC Rapid Response Capability (NRRC) NCOIC Rapid Response Capability (NRRC) Wil Regier NCOIC Business Development Los Angeles, February 2014 Approved for Public Release NCOIC-NRRC Briefing 20140224 Copyright Published by The Aerospace Corporation

More information

10 Steps to Building an Architecture for Space Surveillance Projects. Eric A. Barnhart, M.S.

10 Steps to Building an Architecture for Space Surveillance Projects. Eric A. Barnhart, M.S. 10 Steps to Building an Architecture for Space Surveillance Projects Eric A. Barnhart, M.S. Eric.Barnhart@harris.com Howard D. Gans, Ph.D. Howard.Gans@harris.com Harris Corporation, Space and Intelligence

More information

Open Group Security Forum Overview

Open Group Security Forum Overview Open Group Security Forum Overview To the I3C, July 23, 2003 Mike Jerbic Chair Security Forum Office: 408.257.1648 m.jerbic@opengroup.org www.opengroup.org The Open Group is... A global consortium committed

More information

KillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX

KillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX KillTest Q&A Exam : OG0-091 Title : TOGAF 9 Part 1 Version : Demo 1 / 5 1.According to TOGAF, Which of the following are the architecture domains that are commonly accepted subsets of an overall enterprise

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : OG0-091 Title : TOGAF 9 Part 1 Vendors : The Open Group Version : DEMO Get

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE Digital Policy Management consists of a set of computer programs used to generate, convert, deconflict, validate, assess

More information

Vocabulary-Driven Enterprise Architecture Development Guidelines for DoDAF AV-2: Design and Development of the Integrated Dictionary

Vocabulary-Driven Enterprise Architecture Development Guidelines for DoDAF AV-2: Design and Development of the Integrated Dictionary Vocabulary-Driven Enterprise Architecture Development Guidelines for DoDAF AV-2: Design and Development of the Integrated Dictionary December 17, 2009 Version History Version Publication Date Author Description

More information

Fundamentals to Creating Architectures using ISO/IEC/IEEE Standards

Fundamentals to Creating Architectures using ISO/IEC/IEEE Standards Fundamentals to Creating Architectures using ISO/IEC/IEEE Standards What to Architect? How to Architect? IEEE Goals and Objectives Chartered by IEEE Software Engineering Standards Committee to: Define

More information

Design Patterns. An introduction

Design Patterns. An introduction Design Patterns An introduction Introduction Designing object-oriented software is hard, and designing reusable object-oriented software is even harder. Your design should be specific to the problem at

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce

More information

ISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description

ISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description INTERNATIONAL STANDARD ISO/IEC/ IEEE 42010 First edition 2011-12-01 Systems and software engineering Architecture description Ingénierie des systèmes et des logiciels Description de l'architecture Reference

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Network Mapping The Network Mapping helps visualize the network and understand relationships and connectivity between

More information

SDLC Maturity Models

SDLC Maturity Models www.pwc.com SDLC Maturity Models SecAppDev 2017 Bart De Win Bart De Win? 20 years of Information Security Experience Ph.D. in Computer Science - Application Security Author of >60 scientific publications

More information

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant

More information

When Communities of Interest Collide: Harmonizing Vocabularies Across Operational Areas C. L. Connors, The MITRE Corporation

When Communities of Interest Collide: Harmonizing Vocabularies Across Operational Areas C. L. Connors, The MITRE Corporation When Communities of Interest Collide: Harmonizing Vocabularies Across Operational Areas C. L. Connors, The MITRE Corporation Three recent trends have had a profound impact on data standardization within

More information

SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION

SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION http://www.tutorialspoint.com/software_architecture_design/introduction.htm Copyright tutorialspoint.com The architecture of a system describes its major components,

More information

Requirements Validation and Negotiation

Requirements Validation and Negotiation REQUIREMENTS ENGINEERING LECTURE 2017/2018 Joerg Doerr Requirements Validation and Negotiation AGENDA Fundamentals of Requirements Validation Fundamentals of Requirements Negotiation Quality Aspects of

More information

Service Vs. System. Why do we need Services and a Services Viewpoint in DM2 and DoDAF? Fatma Dandashi, PhD March 4, 2011

Service Vs. System. Why do we need Services and a Services Viewpoint in DM2 and DoDAF? Fatma Dandashi, PhD March 4, 2011 Service Vs. System Why do we need Services and a Services Viewpoint in DM2 and DoDAF? Fatma Dandashi, PhD March 4, 2011 1. Does DoD Need To Model a Service? Bottom Line Up front (BLUF) DoD has a requirement

More information

National Policy Governing the Use of High Assurance Internet Protocol Encryptor (HAIPE) Products

National Policy Governing the Use of High Assurance Internet Protocol Encryptor (HAIPE) Products Committee on National Security Systems CNSS Policy No. 19 February 2007 National Policy Governing the Use of High Assurance Internet Protocol Encryptor (HAIPE) Products This document prescribes minimum

More information

CDISC Operating Procedure COP-001 Standards Development

CDISC Operating Procedure COP-001 Standards Development CDISC Operating Procedure COP-001 Revision History Date Revision Description Author 4 February 2002 1.0 Revisions/approval Shirley Williams/ Board of Directors 1 January 2006 1.1 Revisions required to

More information

The Great TOGAF Scavenger Hunt. Enterprise Architecture Using TOGAF 9 Course Preparation Guide

The Great TOGAF Scavenger Hunt. Enterprise Architecture Using TOGAF 9 Course Preparation Guide Enterprise Architecture Using TOGAF 9 Course Preparation Guide 2011 Metaplexity Associates LLC All Rights Reserved Version 2.0 January 2, 2011 The Open Group Certification Mark logo and TOGAF are trademarks,

More information

for TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method

for TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method Course Syllabus for 3 days Expert led Enterprise Architect hands-on training "An Architect, in the subtlest application of the word, describes one able to engage and arrange all elements of an environment

More information

Chapter 12 (revised by JAS)

Chapter 12 (revised by JAS) Chapter 12 (revised by JAS) Pattern-Based Design Slide Set to accompany Software Engineering: A Practitionerʼs Approach, 7/e by Roger S. Pressman Slides copyright 1996, 2001, 2005, 2009 by Roger S. Pressman

More information

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see TOGAF 9 Certified Study Guide 4th Edition The Open Group Publications available from Van Haren Publishing The TOGAF Series: The TOGAF Standard, Version 9.2 The TOGAF Standard Version 9.2 A Pocket Guide

More information

Solutions Technology, Inc. (STI) Corporate Capability Brief

Solutions Technology, Inc. (STI) Corporate Capability Brief Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Module 1 Management Overview

Module 1 Management Overview Module 1 Management Overview V9.1 Edition Copyright 2009-2011 Slide 1 of 67 All rights reserved Published by The Open Group, 2011 Management Overview Slide 2 of 67 TOGAF is a registered trademark of The

More information

San Francisco Chapter. Cassius Downs Network Edge LLC

San Francisco Chapter. Cassius Downs Network Edge LLC Cassius Downs Network Edge LLC ITIL History ITIL Books V3 Objectives Business Benefits of V3 V3 Changes Training & Certification V2 or V3? Summary 2 Version 1 31 books developed in the 1980 s Focus: Technology

More information

TOGAF Certified (Level 1 and 2) 9.1. Lesson Plan. This course covers all learning materials for TOGAF v9.1. Mock Exam: Duration: Language:

TOGAF Certified (Level 1 and 2) 9.1. Lesson Plan. This course covers all learning materials for TOGAF v9.1. Mock Exam: Duration: Language: TOGAF Certified (Level 1 and 2) 9.1 Lesson Plan This course covers all learning materials for TOGAF v9.1 Delivery: e-learning Certificate: Examination (vouchers included) Accredited By: The Open Group

More information

Technology Advances in FEMA Response and Recovery to Disasters

Technology Advances in FEMA Response and Recovery to Disasters Technology Advances in FEMA Response and Recovery to Disasters Homeland Security in Action: Air * Space * Maritime Conference and Showcase Robert J. Fenton, Jr. Director, Disaster Assistance Division Acting

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

GPS OCX BLOCK 1 NETCENTRIC INTERFACES. Walid Al-Masyabi Raytheon Company, Intelligence, Information and Services,

GPS OCX BLOCK 1 NETCENTRIC INTERFACES. Walid Al-Masyabi Raytheon Company, Intelligence, Information and Services, GPS OCX BLOCK 1 NETCENTRIC INTERFACES Walid Al-Masyabi Raytheon Company, Intelligence, Information and Services, Chuck Corwin, Sarah Law, Stephen Moran, Michael Worden Raytheon Company, Intelligence, Information

More information

TOGAF days. Course description

TOGAF days. Course description TOGAF 9.1 5 days Course description TOGAF stands for The Open Group Architecture Framework It is the industry-standard methodology and framework for performing EA work and is used by thousands of Enterprise

More information

Streamlined FISMA Compliance For Hosted Information Systems

Streamlined FISMA Compliance For Hosted Information Systems Streamlined FISMA Compliance For Hosted Information Systems Faster Certification and Accreditation at a Reduced Cost IT-CNP, INC. WWW.GOVDATAHOSTING.COM WHITEPAPER :: Executive Summary Federal, State and

More information

Cyber Security Guidelines for Defining NIAP Scope Statements

Cyber Security Guidelines for Defining NIAP Scope Statements Cyber Security Guidelines for Defining NIAP Scope Statements Version 1.1 Author: Cyber Security Policy and Standards Document Published Date: June 2018 Document History: Version Description Date 1.0 Published

More information

The Open Group SOA Ontology Technical Standard. Clive Hatton

The Open Group SOA Ontology Technical Standard. Clive Hatton The Open Group SOA Ontology Technical Standard Clive Hatton The Open Group Releases SOA Ontology Standard To Increase SOA Adoption and Success Rates Ontology Fosters Common Understanding of SOA Concepts

More information

Importance of the Data Management process in setting up the GDPR within a company CREOBIS

Importance of the Data Management process in setting up the GDPR within a company CREOBIS Importance of the Data Management process in setting up the GDPR within a company CREOBIS 1 Alain Cieslik Personal Data is the oil of the digital world 2 Alain Cieslik Personal information comes in different

More information

TOGAF Foundation (Level 1) 9. Lesson Plan. This course covers all learning materials for TOGAF v9.1. Mock Exam: Duration: Language:

TOGAF Foundation (Level 1) 9. Lesson Plan. This course covers all learning materials for TOGAF v9.1. Mock Exam: Duration: Language: TOGAF Foundation (Level 1) 9 Lesson Plan This course covers all learning materials for TOGAF v9.1 Delivery: e-learning Certificate: Examination (voucher included) Accredited By: The Open Group Mock Exam:

More information

Model-View-Controller

Model-View-Controller CNM STEMulus Center Web Development with PHP November 11, 2015 1/8 Outline 1 2 2/8 Definition A design pattern is a reusable and accepted solution to a particular software engineering problem. Design patterns

More information

The Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse

The Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse The Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse Stephen Hunt OSD CAPE Joint Data Support (SAIC) Stephen.Hunt.ctr@osd.mil The DoD Office of Security Review has cleared this report

More information

HPE ALM Standardization as a Precursor for Data Warehousing March 7, 2017

HPE ALM Standardization as a Precursor for Data Warehousing March 7, 2017 HPE ALM Standardization as a Precursor for Data Warehousing March 7, 2017 Brought to you by the Vivit Business Intelligence Special Interest Group led by Oded Tankus Hosted By Oded Tankus Project Manager

More information

TOGAF 9 Foundation v9.1 Level 1 Level 1: An Introduction to TOGAF

TOGAF 9 Foundation v9.1 Level 1 Level 1: An Introduction to TOGAF TOGAF 9 Foundation v9.1 Level 1 Level 1: An Introduction to TOGAF full course details This is an accredited online training course, designed by TOGAF experts to prepare you with everything you need to

More information

Test & Evaluation of the NR-KPP

Test & Evaluation of the NR-KPP Defense Information Systems Agency Test & Evaluation of the NR-KPP Danielle Mackenzie Koester Chief, Engineering and Policy Branch March 15, 2011 2 "The information provided in this briefing is for general

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.

More information

Cliayter s. Vsing the ~usiness-it 5Ztfignment :Mode{

Cliayter s. Vsing the ~usiness-it 5Ztfignment :Mode{ Cliayter s. Vsing the ~usiness-it 5Ztfignment :Mode{ 5.1 INTRODUCTION The purpose of the previous chapter was to recognize the knowledge embedded in current alignment approaches by inductively creating

More information

Summary of Contents LIST OF FIGURES LIST OF TABLES

Summary of Contents LIST OF FIGURES LIST OF TABLES Summary of Contents LIST OF FIGURES LIST OF TABLES PREFACE xvii xix xxi PART 1 BACKGROUND Chapter 1. Introduction 3 Chapter 2. Standards-Makers 21 Chapter 3. Principles of the S2ESC Collection 45 Chapter

More information

IT123: SABSA Foundation Training

IT123: SABSA Foundation Training IT123: SABSA Foundation Training IT123 Rev.002 CMCT COURSE OUTLINE Page 1 of 8 Training Description: SABSA is the world s leading open security architecture framework and methodology. SABSA is a top-tobottom

More information

Business Architecture Implementation Workshop

Business Architecture Implementation Workshop Delivering a Business Architecture Transformation Project using the Business Architecture Guild BIZBOK Hands-on Workshop In this turbulent and competitive global economy, and the rapid pace of change in

More information

Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved. FlyntGroup.

Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved. FlyntGroup. Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved FlyntGroup.com Flynt Group White Paper Bundling Arrows: Making a Business

More information

TDWI Data Governance Fundamentals: Managing Data as an Asset

TDWI Data Governance Fundamentals: Managing Data as an Asset TDWI Data Governance Fundamentals: Managing Data as an Asset Training Details Training Time : 1 Day Capacity : 10 Prerequisites : There are no prerequisites for this course. About Training About Training

More information

UPDM PLUGIN. version user guide

UPDM PLUGIN. version user guide UPDM PLUGIN version 17.0 user guide No Magic, Inc. 2011 All material contained herein is considered proprietary information owned by No Magic, Inc. and is not to be shared, copied, or reproduced by any

More information

Chapter 10: Performance Patterns

Chapter 10: Performance Patterns Chapter 10: Performance Patterns Patterns A pattern is a common solution to a problem that occurs in many different contexts Patterns capture expert knowledge about best practices in software design in

More information

David Fletcher Co-Principal Investigator Western Management & Consulting LLC Albuquerque, NM

David Fletcher Co-Principal Investigator Western Management & Consulting LLC Albuquerque, NM Effective Practices for The Protection of Transportation Infrastructure From Cyber Incidents: Executive Briefing Pilot David Fletcher Co-Principal Investigator Western Management & Consulting LLC Albuquerque,

More information

cameo Enterprise Architecture UPDM / DoDAF / MODAF / SysML / BPMN / SoaML USER GUIDE version 17.0

cameo Enterprise Architecture UPDM / DoDAF / MODAF / SysML / BPMN / SoaML USER GUIDE version 17.0 cameo Enterprise Architecture UPDM / DoDAF / MODAF / SysML / BPMN / SoaML USER GUIDE version 17.0 No Magic, Inc. 2010 All material contained herein is considered proprietary information owned by No Magic,

More information

Module 3. Overview of TOGAF 9.1 Architecture Development Method (ADM)

Module 3. Overview of TOGAF 9.1 Architecture Development Method (ADM) Module 3 Overview of TOGAF 9.1 Architecture Development Method (ADM) TOGAF 9.1 Structure The Architecture Development Method (ADM) Needs of the business shape non-architectural aspects of business operation

More information

DoD Internet Protocol Version 6 (IPv6) Contractual Language

DoD Internet Protocol Version 6 (IPv6) Contractual Language DoD Internet Protocol Version 6 (IPv6) Contractual Language 1. Purpose: Contents of this document shall be incorporated in Government Acquisition Programs, Procurements, Services, and Contracts (including

More information

Composable Architecture & Design Applying Product Line and Systems of Systems Concepts to the Design of Unique, Complex Cyber-Physical Systems

Composable Architecture & Design Applying Product Line and Systems of Systems Concepts to the Design of Unique, Complex Cyber-Physical Systems Composable Architecture & Design Applying Product Line and Systems of Systems Concepts to the Design of Unique, Complex Cyber-Physical Systems 12/03/2014 Christopher Oster About Me B.S. Computer Science,

More information

Systems Engineering for Test: Providing the Right Testing at the Right Time

Systems Engineering for Test: Providing the Right Testing at the Right Time Systems Engineering for Test: Providing the Right Testing at the Right Time Louisa Guise National Defense Industrial Association T&E Conference March 14, 2012 Copyright 2011 Raytheon Company. All rights

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity November 2017 cyberframework@nist.gov Supporting Risk Management with Framework 2 Core: A Common Language Foundational for Integrated Teams

More information

Configuration Management Certification Courses

Configuration Management Certification Courses Configuration Management Certification Courses Designed and Taught by CMPIC Sponsored by the University of Houston CM Training & Certification Configuration Management training and certification courses

More information

Standard SOA Reference Models and Architectures

Standard SOA Reference Models and Architectures Standard SOA Reference Models and Architectures The Open Group Perspective 4 February 2009 Dr Christopher J Harding Forum Director Tel +44 774 063 1520 (mobile) c.harding@opengroup.org Thames Tower 37-45

More information

Programação de Sistemas Distribuidos

Programação de Sistemas Distribuidos Programação de Sistemas Distribuidos Paulo Gandra de Sousa psousa@dei.isep.ipp.pt Mestrado em Engenharia Informática DEI/ISEP Disclaimer Parts of this presentation are from: Paulo Sousa (PARS) Ron Jacobs

More information

Effective Threat Modeling using TAM

Effective Threat Modeling using TAM Effective Threat Modeling using TAM In my blog entry regarding Threat Analysis and Modeling (TAM) tool developed by (Application Consulting and Engineering) ACE, I have watched many more Threat Models

More information

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION The process of planning and executing SQL Server migrations can be complex and risk-prone. This is a case where the right approach and

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS IA Policies, Procedures, The Information Assurance (IA) Policies, Procedures, encompasses existing policies, procedures,

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22000 Lead Implementer www.pecb.com The objective of the Certified ISO 22000 Lead Implementer examination is to ensure that the candidate

More information

Certification Standing Committee (CSC) Charter. Appendix A Certification Standing Committee (CSC) Charter

Certification Standing Committee (CSC) Charter. Appendix A Certification Standing Committee (CSC) Charter Appendix A A1 Introduction A1.1 CSC Vision and Mission and Objectives Alignment with Boundaryless Information Flow: Our vision is a foundation of a scalable high integrity TOGAF certification programs

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Port Security Port Security helps to control access to logical and physical ports, protocols, and services. This

More information

Building UAE s cyber security resilience through effective use of technology, processes and the local people.

Building UAE s cyber security resilience through effective use of technology, processes and the local people. WHITEPAPER Security Requirement WE HAVE THE IN-HOUSE DEPTH AND BREATH OF INFORMATION AND CYBER SECURIT About Us CyberGate Defense (CGD) is a solution provider for the full spectrum of Cyber Security Defenses

More information

STUDENT GUIDE Risk Management Framework Step 1: Categorization of the Information System

STUDENT GUIDE Risk Management Framework Step 1: Categorization of the Information System Slide 1 RMF Overview RMF Module 1 RMF takes into account the organization as a whole, including strategic goals and objectives and relationships between mission/business processes, the supporting information

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Shift Left: Putting the Process Into Action

Shift Left: Putting the Process Into Action U.S. ARMY EVALUATION CENTER Shift Left: Putting the Process Into Action March 30, 2017 Agenda The Evaluator s Motivation Where We Were Guidance and Policy Putting it into Action 2 The Evaluator s Motivation

More information

lnteroperability of Standards to Support Application Integration

lnteroperability of Standards to Support Application Integration lnteroperability of Standards to Support Application Integration Em delahostria Rockwell Automation, USA, em.delahostria@ra.rockwell.com Abstract: One of the key challenges in the design, implementation,

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO 50001 Lead Auditor The objective of the PECB Certified ISO 50001 Lead Auditor examination is to ensure that the candidate has the knowledge and skills to plan

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

Deployment Explained: DREN IPv6 Pilot

Deployment Explained: DREN IPv6 Pilot 1 Department of Defense High Performance Computing Modernization Program Defense Research and Engineering Network Approved for public release; distribution is unlimited. Next Generation Internet: How IPv6

More information

Appendix A. Syllabus. NIST Cybersecurity Foundation. Syllabus. Status: First Draft

Appendix A. Syllabus. NIST Cybersecurity Foundation. Syllabus. Status: First Draft Appendix A Syllabus NIST Cybersecurity Foundation Syllabus Status: First Draft Version Status Sign off Date / Names V1.0.0 First Draft Content Group Lead Author: Mark E.S. Bernard Copyright 2018 Secure

More information

IKM in NATO. Antonio de Frutos (NIC-ESP) Information Manager JFC Naples HQ

IKM in NATO. Antonio de Frutos (NIC-ESP) Information Manager JFC Naples HQ IKM in NATO Antonio de Frutos (NIC-ESP) Information Manager JFC Naples HQ Antonio de Frutos, NIC-ESP: JFC Naples, Information Manager (2009- ) IM Governance/IM Training/IM Planning/IM Projects Introduction

More information

Security Management Models And Practices Feb 5, 2008

Security Management Models And Practices Feb 5, 2008 TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related

More information

Module B1 An Introduction to TOGAF 9.1 for those familiar with TOGAF 8

Module B1 An Introduction to TOGAF 9.1 for those familiar with TOGAF 8 Informs the capability Ensures Realization of Business Vision Business needs feed into method Refines Understanding Informs the Business of the current state Sets targets, KPIs, budgets for architecture

More information

EXIN BCS SIAM Foundation. Sample Exam. Edition

EXIN BCS SIAM Foundation. Sample Exam. Edition EXIN BCS SIAM Foundation Sample Exam Edition 201704 Copyright EXIN Holding B.V. and BCS, 2017. All rights reserved. EXIN is a registered trademark. SIAM is a registered trademark. ITIL is a registered

More information

STATEMENT OF WORK BETWEEN UNIVERSITY SERVICES PMO and ENVIRONMENTAL SYSTEMS RESEARCH INSTITUTE INC. for the GIS Interactive Campus Web Map Project

STATEMENT OF WORK BETWEEN UNIVERSITY SERVICES PMO and ENVIRONMENTAL SYSTEMS RESEARCH INSTITUTE INC. for the GIS Interactive Campus Web Map Project STATEMENT OF WORK BETWEEN UNIVERSITY SERVICES PMO and ENVIRONMENTAL SYSTEMS RESEARCH INSTITUTE INC. for the GIS Interactive Campus Web Map Project I. Scope This Statement of Work (SOW) is effective May

More information

Retrofitting Ground Systems to improve Cyber Security

Retrofitting Ground Systems to improve Cyber Security Retrofitting Ground Systems to improve Cyber Security Michael Worden Security Engineer 25 February 2014 Copyright 2014 Raytheon Company. Published by The Aerospace Corporation with permission.. Customer

More information

WHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework.

WHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework. Learning Objectives and Course Descriptions: FOUNDATION IN IT SERVICE MANAGEMENT This official ITIL Foundation certification course provides you with a general overview of the IT Service Management Lifecycle

More information

Software Engineering - I An Introduction to Software Construction Techniques for Industrial Strength Software

Software Engineering - I An Introduction to Software Construction Techniques for Industrial Strength Software Software Engineering - I An Introduction to Software Construction Techniques for Industrial Strength Software Chapter 9 Introduction to Design Patterns Copy Rights Virtual University of Pakistan 1 Design

More information

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO 21500 Lead Project Manager The objective of the PECB Certified ISO 21500 Lead Project Manager examination is to ensure that the candidate has the knowledge and

More information