NCOIC Interoperability Framework (NIF ) and NCOIC Patterns Overview
|
|
- Alexandrina Cameron
- 5 years ago
- Views:
Transcription
1 Network Centric Operations Industry Consortium NCOIC Interoperability Framework (NIF ) NCOIC Interoperability Framework (NIF ) and NCOIC Patterns Overview and NCOIC Patterns Overview August 2008 Approved for Public Release NCOIC-NIF Overview Copyright 2008 NCOIC - All rights reserved
2 About NIF Customer Goals Missions to Achieve Goals Mission Needs Solutions to Needs Resulting Services NCO Initiatives Database SCOPE Model NIF Provides enabling guidance for net-ready solutions -Overarching framework - Specialized frameworks - Pattern template Modeling/simulation NIF 1. Analysis of Alternatives 2. Requirements Derivation 3. Requirements Validation 4. Design Synthesis BB 5. Design Verification 6. Deployment 7. Support 8. Upgrade/Disposal NCAT NCOIC Building Net Centric Interoperability Blocks Analysis Framework Tool End-to-End Quality of Service Copyright 2008 NCOIC - All Rights Reserved Test/evaluation 2
3 Why Is a NIF Needed? Why Is a NIF Needed? Most attempts at common architectures and common standards have failed to achieve interoperable systems The NIF is different because Recommends standards plus guidance flexible enough to be used in multiple architectures Derived by consensus across industry not dictated by a single organization Closer to Internet model (IETF methodology in the W3C) than a prescriptive policy-based approach for a department or ministry of defense 3
4 Standards Alone are not Sufficient Need Guidance Standards Alone Are Not Sufficient Need Guidance Performance A Performance C Standard D Standard A Standard C Standard B Standard E Standard F Often the BEST Standard depends on the Mission Real-World Condition! Often no One Size Fits All Performance B Requires Guidance to select Consistent Standards by Class of Missions: very hard to do! (but a key goal of the NIF ) 4
5 Guidance re: Mission Guidance re: Mission Usually no one Standard can be general enough to meet all needs of all domains, as the SCOPE Model demonstrates Cost* QoS* Transfer Rate* Standard A attribute range For Technology X Standard B attribute range For Technology X Net Awareness* Different Standards because Different Mission Domains have Different Needs! Security* * Examples of SCOPE dimensions, actual dimensions are more comprehensive Autonomy* Power* Service Orientation* 5
6 Notional Cost (or Risk) Guidance re: Level of NCO Guidance re: Level of NCO What is the appropriate level of NetCentricity for a given operational context? May impact selection of Standards! Which is the Best Standard for this hypothetical operational context? This example is time-based; many other perspectives! Standard A For Technology X Standard B For Technology X Today s Range of required performance Future Range of required performance Notional Performance Copyright 2008 NCOIC - All Rights Reserved 6
7 % A-to-B Interoperable Copyright 2008 NCOIC - All Rights Reserved assists Example: customers Notional Intended in obtaining Span of Standard Example: Notional Intended Span of Standard Notional Intended Span of Standard SYSTEM A Extension: Added Highly-Desirable Range 100% Interoperable 100% Interoperable SYSTEM B Extension: Added Highly-Desirable Feature Bad Standard, or Bad System Implementations? Real-World Condition! In a System-of-Systems, cannot force systems to not use highly-desirable features when operating independently Requires Guidance to operate in 100% Interoperability Regions Can only recommend use of 100% Interoperability Regions when Systems need to Interoperate 7
8 % Versions Interoperable Copyright 2008 NCOIC - All Rights Reserved assists Guidance customers re: Versions in obtaining Guidance re: Versions ORIGINAL Standard v1.0 UPDATED Standard v1.1 NEW Standard v2.0: Backward Compatible 100% all 3 versions Interoperable 100% v1.1 & 2.0 Interoperable V1.0 & v2.0 V1.1 & v2.0 Is Everyone Running the Same Version of a Standard? Real-World Condition! In a System-of-Systems, cannot force Legacy systems to update to newest standard Requires Guidance to operate in 100% Interoperability Regions Can only recommend use of 100% Interoperability Regions when Systems need to Interoperate 8
9 % Interoperable Copyright 2008 NCOIC - All Rights Reserved Guidance re: Standards Interpretations Guidance re: Standards Interpretations Interpretation A of Standard Interpretation B of Standard GUIDED Interpretation of Standard Goal: 100% Interoperable with Guided Interpretation Inconsistent Interoperability without Common Guidance Does Everyone Understand the Standard the Same Way? Real-World Condition! (Not necessarily a bad Standard) Requires Guidance to achieve goal of common understanding Different Languages; different Cultural backgrounds Same Standard applied in different Operational Domains Same Standard implemented by designers with different levels of experience, different technical disciplines, different company rules 9
10 Layers of Interoperability Copyright 2008 NCOIC - All Rights Reserved assists Interdependency customers of in Standards obtaining Interdependency of Standards Political or Business Objectives Harmonized Strategy/Doctrines Aligned Operations Aligned Procedures Knowledge/Awareness of Actions Semantic/Information Interoperability Data/Object Model Interoperability Connectivity & Network Interop. Physical Interoperability People & Processes & Applications Information Services Network Transport Standards are Interdependent! Standards for a layer of Interoperability often dependent on standards for lower layers COI Standard C2 Application Standard Web Services Standard Radio Standard COP Standard IPv6 Standard KM Standard Pub / Sub Standard LAN Standard 10
11 Guidance must be CLEAR and Straightforward! Guidance must be CLEAR and Straightforward! 11
12 assists The Value customers of the NIF in obtaining Approach The Value of the NIF Approach Addresses the problems listed on prior pages Focus is on Net-Centric / Net-Enabled aspects Encourages users to use a common terminology and approach to achieving the guidelines Consistent terminology and repeatable patterns of solutions Includes lessons learned from domain experts to keep future users from repeating common mistakes Addresses root causes of interoperability failures Integrates guidance across critical specialties The Specialized Frameworks e.g., Information Assurance, Services, Semantics, Mobility, etc. Includes guidance for verification that the standards and guidance have been properly followed Designed to support all stages of the system life cycle Acquisition, initial design, upgrade design, training 12
13 assists Intended customers Users of the in obtaining NIF Intended Users of the NIF Oriented toward Architects (System, Enterprise, SoS) as well as Design Engineers Useful for general industry and governments, not just NCOIC members How does the NIF help the intended users? Acquisition community Generating better Request For Proposals / Tenders Evaluating proposals from a common perspective Industry Expands available markets (example: the Internet) Points architects in the right direction for interoperability Establishes infrastructure that allows a company to focus on value added enhancements rather than basic environment 13
14 Copyright 2008 NCOIC - - All All Rights Reserved The NIF Process in Four Documents The NIF Process in Four Documents Requirements Solution & Guide NIF Scope and Problem Statement Deliverable (NSPS) Defines the Scope of of the NIF Defines the Interoperability Problem Space Defines top level requirements for interoperability NIF Solution Description (NSD) Reference Manual (NSD-RM) including Overarching Information (meta)model User s Guide (NSD-UG) with general user oriented NIF guidelines & rules for architecting, including Fully Documented Example Main Industry and Customer Interest Rationale NIF Approach and Rationale (NAR) Examines alternatives for a a particular solution space Defines criteria for interoperability and net-centricity Makes recommendations for a a solution set based on on the criteria 14
15 assists The Process customers in Action in obtaining The Process in Action Operational Subject Matter Expert Enterprise/System Architect Technical Subject Matter Expert NCOIC Customer Operational Analysis Architectural Analysis Technical Analysis NCOIC Focus: Net-Centric Interoperability NCO Requirements Integrated Project Teams (IPTs) SCOPE Model Overarching Architecture Specs IPTs, NIF OverArching Framework Technology Guidance IPTs, Specialized Frameworks 15
16 Operational Analysis Operational Analysis Operational SME NCOIC Customer NCOIC focus Enterprise Context, Organization, Assets & Missions Operation al Standards IPTs, SCOPE Operational Analysis SCOPE dimensions NCO Scenarios & Use Cases NCO Capabilities & KPPs NCO Views and Patterns Copyright 2008 NCOIC - All Rights Reserved Operational Description Domain (or Operational) Patterns 16
17 assists Architectural customers Analysis in obtaining Architectural Analysis Enterprise/System Architect Generalization NCOIC Customer NCOIC focus Operational Description Architecture Standards Architectural Analysis NetCentric Services, Principles, Tenets, Architecture Patterns, Architecture Standards and Technology Forecasts, Risks OverArching Architecture Description Capability Patterns IPTs using NIF OverArching Framework artifacts 17
18 assists Technical customers Analysis in obtaining Technical Analysis Technical SME Specialization NCOIC Customer NCOIC focus OverArching Architecture Description Technical Standards Technical Analysis Technical Services Principles, Tenets Technical Standards & Forecasts IPTs and Specialized Frameworks (SF) using NIF +SF artifacts Copyright 2008 NCOIC - All Rights Reserved Technical Description Technical Patterns 18
19 Framework, Process, and Patterns Framework, Process, and Patterns The Overarching Framework contains: Concepts: necessary knowledge definitions, dictionaries, ontologies, information models, etc. Processes: Top-down, Bottom-up, & Middle-out Principles: overall requirements, goals, tenets, and best practices that foster net-centricity A construct for developing guidance for solving Operational and Technical problems for a given context The latter is a template for NCOIC Patterns These Patterns are not contained in the NIF Patterns are stored in an online Repository Patterns provide guidance for creating systems with the desired net-centric capabilities and mitigate specific net-centric interoperability problems 19
20 Basis for Patterns Basis for Patterns Christopher Alexander, Civil Engineering Architect Described architecture patterns for civil engineering Design Patterns: Elements of Reusable Object- Oriented Software Book by Erich Gamma, Richard Helm, Ralph Johnson, and John M. Vlissides (the Gang of Four) Successful pattern stories: J2EE & Microsoft.NET Patterns (software) DIACAP-compliant Security Patterns (secure design) Key foundation for NCOIC Patterns: Systems Architecture Patterns (Cloutier & Verma) 20
21 assists Characteristics customers of a in Systems obtaining Architecture Pattern Characteristics of a Systems Architecture Pattern A Systems Architecture Pattern is a high-level structure, appropriate for the major components of a system. It expresses the relationship between: The Context A Problem A Solution A Systems Architecture Pattern Documents: Attributes Usage Guidance Patterns are time-proven in solving problems similar in nature to the problem under consideration Extracted from Applying the Concept of Patterns to Systems Architecture by Robert J. Cloutier and Dinesh Verma, Stevens Institute of Technology, Systems Engineering DOI /sys Copyright 2008 NCOIC - All Rights Reserved 21
22 assists NCOIC Patterns customers Focus in obtaining on Net-Centric Interoperability NCOIC Patterns Focus on Net-Centric Interoperability Finding a PATTERN of Net-Centricity amongst all of the apparent conflict & noise Subject Matter Experts often independently arrive at similar solutions (a painful process!) 22
23 PATTERNS OF NET-CENTRIC INTEROPERABILITY Three Major Categories of NCOIC Patterns Three Major Categories of NCOIC Patterns Operational (or Domain) Patterns Top level approaches to addressing domain or Customer Capability needs Identifies associated Capability Patterns Example: Sense & Respond Logistics Total Asset Visibility Capability (or Composite or Application) Patterns One or more for each of the areas identified above Describe an approach to achieving a particular capability need in the context of the domain Identifies associated Technical Patterns Example: Legacy Systems Integration Technical Patterns Specific approaches to solving a given technical need identified in the Capability Patterns Example: Web Services Copyright 2008 NCOIC - All Rights Reserved 23
24 Pattern Relationships Pattern Relationships NOTIONAL EXAMPLE OPERATIONAL DOMAIN A OPERATIONAL DOMAIN B NIF v1 Operational Description (OD) Composite Pattern CAPABILITY PATTERN 1 CAPABILITY PATTERN 2 CAPABILITY PATTERN 3 CAPABILITY PATTERN 4 NIF v1 PFC? TECHNICAL PATTERN A TECHNICAL PATTERN B TECHNICAL PATTERN C TECHNICAL PATTERN D * TECHNICAL PATTERN E TECHNICAL PATTERN F TECHNICAL PATTERN G NIF v1 Global Attribute 24
25 Anatomy of a NCOIC Pattern Anatomy of a NCOIC Pattern Captures domain knowledge from Subject Matter Experts (SMEs) Not just about Standards Includes mature solutions to a given domain problem Includes best standards to apply to a problem Goes beyond the standards to include practical guidance as to how to implement the standards Guidance oriented toward obtaining consistent results Flexible/Extensible solutions to a genre of problems Not a specific recipe for a solution to a specific problem 25
26 Anatomy of a NCOIC Pattern (Continued) Anatomy of a NCOIC Pattern (Continued) An NCOIC Pattern also contains: Identity Purpose (context and applicable scenarios) Description Architectural implementation, interfaces, applicability, known uses, maturity metrics, etc. Relationships to other required/associated patterns Verification Showing that the Pattern complies with NIF (and Specialized Framework) guidance Conformance How to verify conformance of Building Block components to the Pattern Tailoring Guidance of how to apply/adjust to various domains Copyright 2008 NCOIC - All Rights Reserved 26
27 Relationship of the NIF to Other NCOIC Tools Relationship of the NIF to Other NCOIC Tools Customer Goals Missions to Achieve Goals Mission Needs Solutions to Needs Resulting Services SCOPE Model NCO Initiatives Database NIF 1. Analysis of Alternatives 2. Requirements Derivation 3. Requirements Validation 4. Design Synthesis NCOIC Interoperability Framework BB Building Blocks NCAT Net Centric Analysis Tool End-to-End Quality of Service Modeling/simulation 5. Design Verification 6. Deployment 7. Support 8. Upgrade/Disposal Test/evaluation 27
28 Relationship of the NIF to Other NCOIC Activities Relationship of the NIF to Other NCOIC Activities Relationship of the NIF to: NCOIC Integrated Project Teams (IPTs) Provides process guidance for IPT development and update of NCOIC Patterns NCOIC Functional Teams (FTs) Provides process guidance for FT development and update of Technical Patterns External Standards-setting bodies Potentially identifies gaps in existing Standards and desirable enhancements to existing and new Standards Note: the NCOIC is not a standards-setting body! 28
29 NIF Summary NIF Summary Break through the Technical Maze Reach the Reward of Interoperable Systems 29
30 NCOIC Goals NCOIC Goal 30
Net Centric Principles
Net Centric Principles Hans Polzer Lockheed Martin Corporation 703 416-2308 hans.w.polzer@lmco.com NCOIC Net Centric Attributes Functional Team Chair October 27, 2010 Page 1 The NCOIC at a Glance Members
More informationNCOIC Interoperability Framework (NIF ) NIF Solution Description Reference Manual (NSD-RM) NIF Architecture Concepts Functional Team Document Authors:
NCOIC Interoperability Framework (NIF ) NIF Solution Description () NIF Architecture Concepts Functional Team Document Authors: Gundars Osvalds Northrop Grumman Corporation Mark Bowler The Boeing Company
More informationThe Net-Enabled Future:
The Net-Enabled Future: An OCTANe Discussion Panel Topic Sheryl Sizelove, The Boeing Company Network Centric Operations Industry Consortium (NCOIC) 27 September 2006 Approved by Boeing Export. Authorization
More informationRaytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40
Raytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40 Dale Anglin Erik Baumgarten John Dinh Mark Hall Bert Schneider May 13, 2008 Cleared for public release
More informationWhat s a BA to do with Data? Discover and define standard data elements in business terms
What s a BA to do with Data? Discover and define standard data elements in business terms Susan Block, Lead Business Systems Analyst The Vanguard Group Discussion Points Discovering Business Data The Data
More informationVendor: The Open Group. Exam Code: OG Exam Name: TOGAF 9 Part 1. Version: Demo
Vendor: The Open Group Exam Code: OG0-091 Exam Name: TOGAF 9 Part 1 Version: Demo QUESTION 1 According to TOGAF, Which of the following are the architecture domains that are commonly accepted subsets of
More informationAn Overview of TOGAF Version 9.1
An Overview of TOGAF Version 9.1 Robert Weisman MSc, PEng, PMP, CD CEO / Chief Enterprise Architect robert.weisman@buildthevision.ca 44 Montgomery Street 1168 Ste Therese Ottawa, Ontario Canada K1C2A6
More informationImplementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs
Implementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs Philomena Zimmerman Office of the Deputy Assistant Secretary of Defense for Systems Engineering
More informationOG The Open Group OG TOGAF 9 Combined Part 1 and Part 2
The Open Group OG0-093 TOGAF 9 Combined Part 1 and Part 2 1 Set1, Part 1 QUESTION: 1 Which of the following TOGAF components was created to enable architects to design architectures addressing Boundaryless
More informationOG0-091 Q&As TOGAF 9 Part 1
CertBus.com OG0-091 Q&As TOGAF 9 Part 1 Pass The Open Group OG0-091 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance
More informationImplementing the Army Net Centric Data Strategy in a Service Oriented Environment
Implementing the Army Net Centric Strategy in a Service Oriented Environment Michelle Dirner Army Net Centric Strategy (ANCDS) Center of Excellence (CoE) Service Team Lead RDECOM CERDEC SED in support
More informationOSD Product Support BCA Guidebook. Joseph Colt Murphy Senior Financial Analyst ODASD Materiel Readiness 9 May 2011
OSD Product Support BCA Guidebook Joseph Colt Murphy Senior Financial Analyst ODASD Materiel Readiness 9 May 2011 Joseph.murphy@osd.mil Introduction Product Support BCA Guidebook Draft document Final review
More informationNCOIC Rapid Response Capability (NRRC)
NCOIC Rapid Response Capability (NRRC) Wil Regier NCOIC Business Development Los Angeles, February 2014 Approved for Public Release NCOIC-NRRC Briefing 20140224 Copyright Published by The Aerospace Corporation
More information10 Steps to Building an Architecture for Space Surveillance Projects. Eric A. Barnhart, M.S.
10 Steps to Building an Architecture for Space Surveillance Projects Eric A. Barnhart, M.S. Eric.Barnhart@harris.com Howard D. Gans, Ph.D. Howard.Gans@harris.com Harris Corporation, Space and Intelligence
More informationOpen Group Security Forum Overview
Open Group Security Forum Overview To the I3C, July 23, 2003 Mike Jerbic Chair Security Forum Office: 408.257.1648 m.jerbic@opengroup.org www.opengroup.org The Open Group is... A global consortium committed
More informationKillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX
KillTest Q&A Exam : OG0-091 Title : TOGAF 9 Part 1 Version : Demo 1 / 5 1.According to TOGAF, Which of the following are the architecture domains that are commonly accepted subsets of an overall enterprise
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : OG0-091 Title : TOGAF 9 Part 1 Vendors : The Open Group Version : DEMO Get
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE Digital Policy Management consists of a set of computer programs used to generate, convert, deconflict, validate, assess
More informationVocabulary-Driven Enterprise Architecture Development Guidelines for DoDAF AV-2: Design and Development of the Integrated Dictionary
Vocabulary-Driven Enterprise Architecture Development Guidelines for DoDAF AV-2: Design and Development of the Integrated Dictionary December 17, 2009 Version History Version Publication Date Author Description
More informationFundamentals to Creating Architectures using ISO/IEC/IEEE Standards
Fundamentals to Creating Architectures using ISO/IEC/IEEE Standards What to Architect? How to Architect? IEEE Goals and Objectives Chartered by IEEE Software Engineering Standards Committee to: Define
More informationDesign Patterns. An introduction
Design Patterns An introduction Introduction Designing object-oriented software is hard, and designing reusable object-oriented software is even harder. Your design should be specific to the problem at
More informationThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce
More informationISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description
INTERNATIONAL STANDARD ISO/IEC/ IEEE 42010 First edition 2011-12-01 Systems and software engineering Architecture description Ingénierie des systèmes et des logiciels Description de l'architecture Reference
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Network Mapping The Network Mapping helps visualize the network and understand relationships and connectivity between
More informationSDLC Maturity Models
www.pwc.com SDLC Maturity Models SecAppDev 2017 Bart De Win Bart De Win? 20 years of Information Security Experience Ph.D. in Computer Science - Application Security Author of >60 scientific publications
More informationSix Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP
Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant
More informationWhen Communities of Interest Collide: Harmonizing Vocabularies Across Operational Areas C. L. Connors, The MITRE Corporation
When Communities of Interest Collide: Harmonizing Vocabularies Across Operational Areas C. L. Connors, The MITRE Corporation Three recent trends have had a profound impact on data standardization within
More informationSOFTWARE ARCHITECTURE & DESIGN INTRODUCTION
SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION http://www.tutorialspoint.com/software_architecture_design/introduction.htm Copyright tutorialspoint.com The architecture of a system describes its major components,
More informationRequirements Validation and Negotiation
REQUIREMENTS ENGINEERING LECTURE 2017/2018 Joerg Doerr Requirements Validation and Negotiation AGENDA Fundamentals of Requirements Validation Fundamentals of Requirements Negotiation Quality Aspects of
More informationService Vs. System. Why do we need Services and a Services Viewpoint in DM2 and DoDAF? Fatma Dandashi, PhD March 4, 2011
Service Vs. System Why do we need Services and a Services Viewpoint in DM2 and DoDAF? Fatma Dandashi, PhD March 4, 2011 1. Does DoD Need To Model a Service? Bottom Line Up front (BLUF) DoD has a requirement
More informationNational Policy Governing the Use of High Assurance Internet Protocol Encryptor (HAIPE) Products
Committee on National Security Systems CNSS Policy No. 19 February 2007 National Policy Governing the Use of High Assurance Internet Protocol Encryptor (HAIPE) Products This document prescribes minimum
More informationCDISC Operating Procedure COP-001 Standards Development
CDISC Operating Procedure COP-001 Revision History Date Revision Description Author 4 February 2002 1.0 Revisions/approval Shirley Williams/ Board of Directors 1 January 2006 1.1 Revisions required to
More informationThe Great TOGAF Scavenger Hunt. Enterprise Architecture Using TOGAF 9 Course Preparation Guide
Enterprise Architecture Using TOGAF 9 Course Preparation Guide 2011 Metaplexity Associates LLC All Rights Reserved Version 2.0 January 2, 2011 The Open Group Certification Mark logo and TOGAF are trademarks,
More informationfor TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method
Course Syllabus for 3 days Expert led Enterprise Architect hands-on training "An Architect, in the subtlest application of the word, describes one able to engage and arrange all elements of an environment
More informationChapter 12 (revised by JAS)
Chapter 12 (revised by JAS) Pattern-Based Design Slide Set to accompany Software Engineering: A Practitionerʼs Approach, 7/e by Roger S. Pressman Slides copyright 1996, 2001, 2005, 2009 by Roger S. Pressman
More informationCopyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see
TOGAF 9 Certified Study Guide 4th Edition The Open Group Publications available from Van Haren Publishing The TOGAF Series: The TOGAF Standard, Version 9.2 The TOGAF Standard Version 9.2 A Pocket Guide
More informationSolutions Technology, Inc. (STI) Corporate Capability Brief
Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned
More informationEUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE
EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationModule 1 Management Overview
Module 1 Management Overview V9.1 Edition Copyright 2009-2011 Slide 1 of 67 All rights reserved Published by The Open Group, 2011 Management Overview Slide 2 of 67 TOGAF is a registered trademark of The
More informationSan Francisco Chapter. Cassius Downs Network Edge LLC
Cassius Downs Network Edge LLC ITIL History ITIL Books V3 Objectives Business Benefits of V3 V3 Changes Training & Certification V2 or V3? Summary 2 Version 1 31 books developed in the 1980 s Focus: Technology
More informationTOGAF Certified (Level 1 and 2) 9.1. Lesson Plan. This course covers all learning materials for TOGAF v9.1. Mock Exam: Duration: Language:
TOGAF Certified (Level 1 and 2) 9.1 Lesson Plan This course covers all learning materials for TOGAF v9.1 Delivery: e-learning Certificate: Examination (vouchers included) Accredited By: The Open Group
More informationTechnology Advances in FEMA Response and Recovery to Disasters
Technology Advances in FEMA Response and Recovery to Disasters Homeland Security in Action: Air * Space * Maritime Conference and Showcase Robert J. Fenton, Jr. Director, Disaster Assistance Division Acting
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationGPS OCX BLOCK 1 NETCENTRIC INTERFACES. Walid Al-Masyabi Raytheon Company, Intelligence, Information and Services,
GPS OCX BLOCK 1 NETCENTRIC INTERFACES Walid Al-Masyabi Raytheon Company, Intelligence, Information and Services, Chuck Corwin, Sarah Law, Stephen Moran, Michael Worden Raytheon Company, Intelligence, Information
More informationTOGAF days. Course description
TOGAF 9.1 5 days Course description TOGAF stands for The Open Group Architecture Framework It is the industry-standard methodology and framework for performing EA work and is used by thousands of Enterprise
More informationStreamlined FISMA Compliance For Hosted Information Systems
Streamlined FISMA Compliance For Hosted Information Systems Faster Certification and Accreditation at a Reduced Cost IT-CNP, INC. WWW.GOVDATAHOSTING.COM WHITEPAPER :: Executive Summary Federal, State and
More informationCyber Security Guidelines for Defining NIAP Scope Statements
Cyber Security Guidelines for Defining NIAP Scope Statements Version 1.1 Author: Cyber Security Policy and Standards Document Published Date: June 2018 Document History: Version Description Date 1.0 Published
More informationThe Open Group SOA Ontology Technical Standard. Clive Hatton
The Open Group SOA Ontology Technical Standard Clive Hatton The Open Group Releases SOA Ontology Standard To Increase SOA Adoption and Success Rates Ontology Fosters Common Understanding of SOA Concepts
More informationImportance of the Data Management process in setting up the GDPR within a company CREOBIS
Importance of the Data Management process in setting up the GDPR within a company CREOBIS 1 Alain Cieslik Personal Data is the oil of the digital world 2 Alain Cieslik Personal information comes in different
More informationTOGAF Foundation (Level 1) 9. Lesson Plan. This course covers all learning materials for TOGAF v9.1. Mock Exam: Duration: Language:
TOGAF Foundation (Level 1) 9 Lesson Plan This course covers all learning materials for TOGAF v9.1 Delivery: e-learning Certificate: Examination (voucher included) Accredited By: The Open Group Mock Exam:
More informationModel-View-Controller
CNM STEMulus Center Web Development with PHP November 11, 2015 1/8 Outline 1 2 2/8 Definition A design pattern is a reusable and accepted solution to a particular software engineering problem. Design patterns
More informationThe Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse
The Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse Stephen Hunt OSD CAPE Joint Data Support (SAIC) Stephen.Hunt.ctr@osd.mil The DoD Office of Security Review has cleared this report
More informationHPE ALM Standardization as a Precursor for Data Warehousing March 7, 2017
HPE ALM Standardization as a Precursor for Data Warehousing March 7, 2017 Brought to you by the Vivit Business Intelligence Special Interest Group led by Oded Tankus Hosted By Oded Tankus Project Manager
More informationTOGAF 9 Foundation v9.1 Level 1 Level 1: An Introduction to TOGAF
TOGAF 9 Foundation v9.1 Level 1 Level 1: An Introduction to TOGAF full course details This is an accredited online training course, designed by TOGAF experts to prepare you with everything you need to
More informationTest & Evaluation of the NR-KPP
Defense Information Systems Agency Test & Evaluation of the NR-KPP Danielle Mackenzie Koester Chief, Engineering and Policy Branch March 15, 2011 2 "The information provided in this briefing is for general
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.
More informationCliayter s. Vsing the ~usiness-it 5Ztfignment :Mode{
Cliayter s. Vsing the ~usiness-it 5Ztfignment :Mode{ 5.1 INTRODUCTION The purpose of the previous chapter was to recognize the knowledge embedded in current alignment approaches by inductively creating
More informationSummary of Contents LIST OF FIGURES LIST OF TABLES
Summary of Contents LIST OF FIGURES LIST OF TABLES PREFACE xvii xix xxi PART 1 BACKGROUND Chapter 1. Introduction 3 Chapter 2. Standards-Makers 21 Chapter 3. Principles of the S2ESC Collection 45 Chapter
More informationIT123: SABSA Foundation Training
IT123: SABSA Foundation Training IT123 Rev.002 CMCT COURSE OUTLINE Page 1 of 8 Training Description: SABSA is the world s leading open security architecture framework and methodology. SABSA is a top-tobottom
More informationBusiness Architecture Implementation Workshop
Delivering a Business Architecture Transformation Project using the Business Architecture Guild BIZBOK Hands-on Workshop In this turbulent and competitive global economy, and the rapid pace of change in
More informationBundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved. FlyntGroup.
Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved FlyntGroup.com Flynt Group White Paper Bundling Arrows: Making a Business
More informationTDWI Data Governance Fundamentals: Managing Data as an Asset
TDWI Data Governance Fundamentals: Managing Data as an Asset Training Details Training Time : 1 Day Capacity : 10 Prerequisites : There are no prerequisites for this course. About Training About Training
More informationUPDM PLUGIN. version user guide
UPDM PLUGIN version 17.0 user guide No Magic, Inc. 2011 All material contained herein is considered proprietary information owned by No Magic, Inc. and is not to be shared, copied, or reproduced by any
More informationChapter 10: Performance Patterns
Chapter 10: Performance Patterns Patterns A pattern is a common solution to a problem that occurs in many different contexts Patterns capture expert knowledge about best practices in software design in
More informationDavid Fletcher Co-Principal Investigator Western Management & Consulting LLC Albuquerque, NM
Effective Practices for The Protection of Transportation Infrastructure From Cyber Incidents: Executive Briefing Pilot David Fletcher Co-Principal Investigator Western Management & Consulting LLC Albuquerque,
More informationcameo Enterprise Architecture UPDM / DoDAF / MODAF / SysML / BPMN / SoaML USER GUIDE version 17.0
cameo Enterprise Architecture UPDM / DoDAF / MODAF / SysML / BPMN / SoaML USER GUIDE version 17.0 No Magic, Inc. 2010 All material contained herein is considered proprietary information owned by No Magic,
More informationModule 3. Overview of TOGAF 9.1 Architecture Development Method (ADM)
Module 3 Overview of TOGAF 9.1 Architecture Development Method (ADM) TOGAF 9.1 Structure The Architecture Development Method (ADM) Needs of the business shape non-architectural aspects of business operation
More informationDoD Internet Protocol Version 6 (IPv6) Contractual Language
DoD Internet Protocol Version 6 (IPv6) Contractual Language 1. Purpose: Contents of this document shall be incorporated in Government Acquisition Programs, Procurements, Services, and Contracts (including
More informationComposable Architecture & Design Applying Product Line and Systems of Systems Concepts to the Design of Unique, Complex Cyber-Physical Systems
Composable Architecture & Design Applying Product Line and Systems of Systems Concepts to the Design of Unique, Complex Cyber-Physical Systems 12/03/2014 Christopher Oster About Me B.S. Computer Science,
More informationSystems Engineering for Test: Providing the Right Testing at the Right Time
Systems Engineering for Test: Providing the Right Testing at the Right Time Louisa Guise National Defense Industrial Association T&E Conference March 14, 2012 Copyright 2011 Raytheon Company. All rights
More informationFramework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity November 2017 cyberframework@nist.gov Supporting Risk Management with Framework 2 Core: A Common Language Foundational for Integrated Teams
More informationConfiguration Management Certification Courses
Configuration Management Certification Courses Designed and Taught by CMPIC Sponsored by the University of Houston CM Training & Certification Configuration Management training and certification courses
More informationStandard SOA Reference Models and Architectures
Standard SOA Reference Models and Architectures The Open Group Perspective 4 February 2009 Dr Christopher J Harding Forum Director Tel +44 774 063 1520 (mobile) c.harding@opengroup.org Thames Tower 37-45
More informationProgramação de Sistemas Distribuidos
Programação de Sistemas Distribuidos Paulo Gandra de Sousa psousa@dei.isep.ipp.pt Mestrado em Engenharia Informática DEI/ISEP Disclaimer Parts of this presentation are from: Paulo Sousa (PARS) Ron Jacobs
More informationEffective Threat Modeling using TAM
Effective Threat Modeling using TAM In my blog entry regarding Threat Analysis and Modeling (TAM) tool developed by (Application Consulting and Engineering) ACE, I have watched many more Threat Models
More informationFIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION
FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION The process of planning and executing SQL Server migrations can be complex and risk-prone. This is a case where the right approach and
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS IA Policies, Procedures, The Information Assurance (IA) Policies, Procedures, encompasses existing policies, procedures,
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22000 Lead Implementer www.pecb.com The objective of the Certified ISO 22000 Lead Implementer examination is to ensure that the candidate
More informationCertification Standing Committee (CSC) Charter. Appendix A Certification Standing Committee (CSC) Charter
Appendix A A1 Introduction A1.1 CSC Vision and Mission and Objectives Alignment with Boundaryless Information Flow: Our vision is a foundation of a scalable high integrity TOGAF certification programs
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Port Security Port Security helps to control access to logical and physical ports, protocols, and services. This
More informationBuilding UAE s cyber security resilience through effective use of technology, processes and the local people.
WHITEPAPER Security Requirement WE HAVE THE IN-HOUSE DEPTH AND BREATH OF INFORMATION AND CYBER SECURIT About Us CyberGate Defense (CGD) is a solution provider for the full spectrum of Cyber Security Defenses
More informationSTUDENT GUIDE Risk Management Framework Step 1: Categorization of the Information System
Slide 1 RMF Overview RMF Module 1 RMF takes into account the organization as a whole, including strategic goals and objectives and relationships between mission/business processes, the supporting information
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationShift Left: Putting the Process Into Action
U.S. ARMY EVALUATION CENTER Shift Left: Putting the Process Into Action March 30, 2017 Agenda The Evaluator s Motivation Where We Were Guidance and Policy Putting it into Action 2 The Evaluator s Motivation
More informationlnteroperability of Standards to Support Application Integration
lnteroperability of Standards to Support Application Integration Em delahostria Rockwell Automation, USA, em.delahostria@ra.rockwell.com Abstract: One of the key challenges in the design, implementation,
More informationEXAM PREPARATION GUIDE
EXAM PREPARATION GUIDE PECB Certified ISO 50001 Lead Auditor The objective of the PECB Certified ISO 50001 Lead Auditor examination is to ensure that the candidate has the knowledge and skills to plan
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationDeployment Explained: DREN IPv6 Pilot
1 Department of Defense High Performance Computing Modernization Program Defense Research and Engineering Network Approved for public release; distribution is unlimited. Next Generation Internet: How IPv6
More informationAppendix A. Syllabus. NIST Cybersecurity Foundation. Syllabus. Status: First Draft
Appendix A Syllabus NIST Cybersecurity Foundation Syllabus Status: First Draft Version Status Sign off Date / Names V1.0.0 First Draft Content Group Lead Author: Mark E.S. Bernard Copyright 2018 Secure
More informationIKM in NATO. Antonio de Frutos (NIC-ESP) Information Manager JFC Naples HQ
IKM in NATO Antonio de Frutos (NIC-ESP) Information Manager JFC Naples HQ Antonio de Frutos, NIC-ESP: JFC Naples, Information Manager (2009- ) IM Governance/IM Training/IM Planning/IM Projects Introduction
More informationSecurity Management Models And Practices Feb 5, 2008
TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related
More informationModule B1 An Introduction to TOGAF 9.1 for those familiar with TOGAF 8
Informs the capability Ensures Realization of Business Vision Business needs feed into method Refines Understanding Informs the Business of the current state Sets targets, KPIs, budgets for architecture
More informationEXIN BCS SIAM Foundation. Sample Exam. Edition
EXIN BCS SIAM Foundation Sample Exam Edition 201704 Copyright EXIN Holding B.V. and BCS, 2017. All rights reserved. EXIN is a registered trademark. SIAM is a registered trademark. ITIL is a registered
More informationSTATEMENT OF WORK BETWEEN UNIVERSITY SERVICES PMO and ENVIRONMENTAL SYSTEMS RESEARCH INSTITUTE INC. for the GIS Interactive Campus Web Map Project
STATEMENT OF WORK BETWEEN UNIVERSITY SERVICES PMO and ENVIRONMENTAL SYSTEMS RESEARCH INSTITUTE INC. for the GIS Interactive Campus Web Map Project I. Scope This Statement of Work (SOW) is effective May
More informationRetrofitting Ground Systems to improve Cyber Security
Retrofitting Ground Systems to improve Cyber Security Michael Worden Security Engineer 25 February 2014 Copyright 2014 Raytheon Company. Published by The Aerospace Corporation with permission.. Customer
More informationWHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework.
Learning Objectives and Course Descriptions: FOUNDATION IN IT SERVICE MANAGEMENT This official ITIL Foundation certification course provides you with a general overview of the IT Service Management Lifecycle
More informationSoftware Engineering - I An Introduction to Software Construction Techniques for Industrial Strength Software
Software Engineering - I An Introduction to Software Construction Techniques for Industrial Strength Software Chapter 9 Introduction to Design Patterns Copy Rights Virtual University of Pakistan 1 Design
More informationEvaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure
Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT
More informationEXAM PREPARATION GUIDE
EXAM PREPARATION GUIDE PECB Certified ISO 21500 Lead Project Manager The objective of the PECB Certified ISO 21500 Lead Project Manager examination is to ensure that the candidate has the knowledge and
More information