Briefing Date. Purpose
|
|
- Frank Rudolf Bell
- 6 years ago
- Views:
Transcription
1 Applying the Systems Engineering Method for the Joint Capabilities Integration and Development System (JCIDS) Chris Ryder and Dave Flanigan 27 October 2005
2 Purpose JCIDS prescribes a joint forces approach to identify capability gaps against current force capability needs The Systems Engineering (SE) Method applies to each iteration of the systems life-cycle from capability inception through system retirement Good systems engineering practice is necessary for successfully implementing JCIDS Use of model-driven SE facilitates JCIDS throughout the systems life-cycle slide 2
3 Agenda The Joint Capabilities Integration and Development System (JCIDS) The Systems Engineering Method Model-Driven Systems Engineering for JCIDS Why use the Systems Engineering Method JCIDS? slide 3
4 JCIDS Analysis Briefing Date Strategic Policy Guidance Joint Operations Concepts Functional Area Analysis Functional Needs Analysis Joint Operating Concepts Joint Functional Concepts Integrated Architectures CPD CDD DOTMLPF Analysis Materiel Changes CJCSI 3170 process Ideas for Materiel Approaches Analysis of Materiel Approaches Alternative N Alternative 2 Alternative 1 Post Independent Analysis ICD DOTMLPF Changes CJCSI 3180 Process DOTMLPF Change Recommendation Functional Solution Analysis slide 4
5 JCIDS Events Briefing Date Functional Area Analysis (FAA) o Identify operational task, conditions, and standards needed to accomplish military objectives o Result: Tasks to be accomplished Functional Needs Analysis (FNA) o Assess ability of current and programmed capabilities to accomplish the tasks o Result: List of capability gaps Functional Solutions Analysis (FSA) o Operational based assessment of DOTMLPF approaches to solving capability gaps o Result: Potential DOTMLPF approaches to capability gaps Post Independent Analysis o Independent analysis of approaches to determine best fit o Result: Initial Capabilities Document slide 5
6 JCIDS JCIDS analytical process stresses the fundamentals for applying an effective systems engineering program by any accepted standard It guides the front-end phases of the SE process for each capability iteration o Enterprise (operational) analysis o Requirements definition o Life-cycle phase The analysts must have a thorough understanding of existing capabilities as well as the capability needs The JCIDS analysis team eventually determines the optimum combination of material and non-material alternatives to achieve the capability needs to the Battle Force slide 6
7 Systems Engineering Method Regardless of the analytical phase performed by the JCIDS SE team, o The basic application of the SE method is constant throughout the process Each SE Method activity is performed in some form in each phase of the system life-cycle slide 7
8 Systems Engineering Method Over Life Cycle JCIDS DOD 5000 Phases FAA/FNA/FSA FAA/FNA/FSA Mission Need Determination ICD Concept Exploration Concept And Technology Development Component Advanced Development CDD System Development & Demonstration System Integration System Demonstration CPD Production & Deployment Operation & Support MS A MS B MS C ISO/IEC Stages Concept Development Production Utilization Support NPSE Stages Conceptual Technical Feasibility Development Production Preparation Full-scale Production Production Support System Engineering Stages Concept Development Engineering Development Post Development System Engineering Phases Needs Analysis Concept Exploration Concept Definition Advanced Development Engineering Design Integration & Evaluation Production Operation & Support Rational Unified Process for SE Inception Elaboration Construction Transition slide 8 From Systems Engineering: Principles and Practice Kossiakoff and Sweet
9 The Systems Engineering Method Briefing Date From Preceding Phase Objectives Requirements Analysis Requirements Functional Definition Functions Physical Definition System Model Design Validation slide 9 From Systems Engineering: Principles and Practice Kossiakoff and Sweet To Next Phase
10 Need Systems Engineering Method Before starting, verify the as stated need is valid User Requirements Analysis Requirements Functional Definition Functional Area Analysis Functions Physical Definition Functional Needs Analysis Potential Solutions Briefing Date Functional Solutions Analysis Program Independent Assessment Verify that the solution meets the need Design Validation slide 10 If current step is not executable, then loop back to previous step (or further) and fix things!! Solution(s)
11 Problem Definition Systems Engineering Method Legacy Operational Activities Capabilities User Requirements Analysis Briefing Date Rationale, Scope, & Context Sponsor-derived Problem Set Functional Improvements Directed Functions Functional Decomposition Technological Contributions Functional Definition Non-Material DOTMLPF Elements slide 11 Material // Non-Material solution? Material Collect Candidate Systems Physical Definition Analysis M&S Problem satisfied? Design Validation No Yes
12 Systems Engineering Method Briefing Date User Requirements Analysis Problem Definition Legacy Operational Activities Capabilities Rationale, Scope, & Context Sponsor-derived Problem Set To Functional Analysis Phase slide 12
13 Problem Definition At one point in time there is a problem that must be solved due to: o Deficient capability with existing systems o Desire to improve existing performance Need to understand what the objectives are to provide the desired capability Define the operational context within the Capability Enterprise! slide 13
14 Requirements Analysis Products A clear definition of the problem A proper scope of the problem Operational context documents and data bases o Design Reference Mission o Strategy-to-Task Mapping o Concept of Operations o Physical Environment Database o Threat Representation Database o Blue Capabilities Database Relevant Operational Views Captured within a SE Requirements Model slide 14
15 Systems Engineering Method From Requirements Definition Briefing Date Functional Improvements Technological Contributions Functional Decomposition Directed Functions Functional Definition To Physical Definition slide 15
16 Functional Definition Products Functional Decomposition of required activities o Functional diagrams (FFBD, UML AD) Associated metrics with these functions (threshold / objective?) Analysis process that determines if you can solve with a material / nonmaterial / both solution o Be able to document and defend this process How do we know it s right? o The functions are legitimate, correct, and validated by users Functional Area Analysis Relevant operational views Functional Analysis Documented in a SE Functional or Logical Model slide 16
17 Systems Engineering Method Briefing Date From Functional Definition Non-Material DOTMLPF Elements Material / Non-Material solution? Material Collect Candidate Systems To Design Validation Physical Definition slide 17
18 Physical Definition Products Provide system alternatives towards satisfying required functionality o Assignment of functions to physical elements DOTMLPF analysis products o Based on the functional definition phase CONOPS changes / recommendations o Based on DOTMLPF analysis Risk management strategies of the system System roadmaps to bridge the gap between the current and future capabilities Functional Needs Analysis Relevant operational and SYSTEMS views SE Logical Model with Physical Definition Begins Evolution Toward a Systems Model slide 18
19 Systems Engineering Method Briefing Date From Physical Definition Analysis M&S Problem satisfied? Design Validation No Reassess requirements, functional elements or physical details Yes To next life-cycle phase: Requirements Definition slide 19
20 Design Validation Products Demonstrate the analysis documents the assumptions, follows a rigorous process, and arrives at meaningful conclusions that are justifiable o There may be multiple processes and products dependent on the sponsor, personnel/time availability, experience o This may be an iterative process for ICD, CDD, CPD Trade studies VV&A Risk Management Cost Analysis Force Allocation Functional Solutions Analysis Program Independent Assessment Attain a Fully Validated Systems Engineering Model slide 20
21 Architectures in JCIDS Briefing Date Integrated Architectures are a foundation for the analytical process o Stated requirements, attributes and measures Direct reference to DoD Architecture Framework (DoDAF), however: o Architecture is misused term within the realm of SE It is important to differentiate architecture from architectural views The JCIDS SE Model is the foundation for the architecture and the architectural views slide 21
22 Systems Engineering Model Model is a simplified view of a complex system o Assists stakeholders, including engineers, to understand something that is not easily comprehensible o Communicates the organization of the system to the stakeholders Rechtin o Contributes to the structural stability of a system. o Enhances understanding of interfaces, relationships, operations and risk If you don t model it, you won t understand it. Ivar Jacobson slide 22
23 Model-Driven SE An Systems Engineering model captures the essential elements of the systems engineering life-cycle Dynamic and recursive process (Bootch, Rumbaugh, Jacobson) o Iteratively captures enterprise capabilities and systems requirements o Promotes incorporation of technology evolution Forms basis for a sound, long-term SE and analysis o Fully compliant with precepts of DoDAF and JCIDS Model-Driven SE in Defense Systems Acquisition becomes Model-Driven JCIDS slide 23
24 Context of the Capability Enterprise «Enterprise» Capability Enterprise «System» Warfare System Component of «Capability» Capability Object Assigned to Affected by Applies Supported by «System» Threat Systems Affects Applies to «Non-Material» DOTMLPF Supports «System» Communications Networks/ GIG slide 24
25 DOTMLPF Dot-mil-pe-ef The Non-Material elements of the capability o Doctrine o Organization o Training o Material o Logistics o Personnel o Facilities Investigate if a modification to any element except the M will enhance the Capability Enterprise o A far less expensive option slide 25
26 Transition from Capability to System Briefing Date «System» System As Is DOTMLPF DOTMLPF can also transition from As Is to To Be The Legacy System Applies to Applies to «Capability» Capability As Is Evolves to «Capability» Capability To Be +Possesses +Closes Assigned to Capability Gap «System» System To Be slide 26
27 JHU/APL SE Methodology Linkage to JCIDS Briefing Date JHU/APL SE methods can be used to produce JCIDS products/artifacts JHU/APL SE methods can iterate throughout the DoD 5000 lifecycle Good SE methods can produce JCIDS Bad SE methods can produce JCIDS Producing JCIDS does not guarantee good SE Good SE Effective JCIDS slide 27
28 Final Thoughts JHU/APL has consistently provided SE expertise to numerous programs, following a rigorous and structured SE approach to the problem o It s all about the data o It s all about the rigor Program Offices have anchored their programs to our approaches and data slide 28
29 Summary Description of JHU/APL SE process JCIDS is consistent with good systems engineering practices JHU/APL SE process is consistent with JCIDS slide 29
OSD Product Support BCA Guidebook. Joseph Colt Murphy Senior Financial Analyst ODASD Materiel Readiness 9 May 2011
OSD Product Support BCA Guidebook Joseph Colt Murphy Senior Financial Analyst ODASD Materiel Readiness 9 May 2011 Joseph.murphy@osd.mil Introduction Product Support BCA Guidebook Draft document Final review
More informationImplementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs
Implementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs Philomena Zimmerman Office of the Deputy Assistant Secretary of Defense for Systems Engineering
More informationApproaches to Achieve Benefits of Modularity in Defense Acquisition
Approaches to Achieve Benefits of Modularity in Defense Acquisition Sponsor: DASD(SE) By Dr Daniel DeLaurentis 10 th Annual SERC Sponsor Research Review November 8, 2018 FHI 360 CONFERENCE CENTER 1825
More informationSolutions Technology, Inc. (STI) Corporate Capability Brief
Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Air Force DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete Total Cost Total
More informationSystems Analysis and Design in a Changing World, Fourth Edition
Systems Analysis and Design in a Changing World, Fourth Edition Systems Analysis and Design in a Changing World, 4th Edition Learning Objectives Explain the purpose and various phases of the systems development
More informationModule 3. Overview of TOGAF 9.1 Architecture Development Method (ADM)
Module 3 Overview of TOGAF 9.1 Architecture Development Method (ADM) TOGAF 9.1 Structure The Architecture Development Method (ADM) Needs of the business shape non-architectural aspects of business operation
More informationUNIT-I Introduction of Object Oriented Modeling
UNIT-I Introduction of Object Oriented Modeling - Prasad Mahale Object Oriented Modeling and Reference Books: Design 1. Grady Booch, James Rumbaugh, Ivar Jacobson Unified Modeling Language User Guide,
More informationRaytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40
Raytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40 Dale Anglin Erik Baumgarten John Dinh Mark Hall Bert Schneider May 13, 2008 Cleared for public release
More informationShift Left: Putting the Process Into Action
U.S. ARMY EVALUATION CENTER Shift Left: Putting the Process Into Action March 30, 2017 Agenda The Evaluator s Motivation Where We Were Guidance and Policy Putting it into Action 2 The Evaluator s Motivation
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior
More informationHealth Information Technology - Supporting Joint Readiness
Health Information Technology - Supporting Joint Readiness Session # 104, March 7, 2018 Mr. T. Pat Flanders, DADIO/J-6, CIO Kevin P. Seeley, Deputy CIO, Colonel, USAF, MSC 1 Speaker Introduction Pat Flanders
More informationUNCLASSIFIED. R-1 Program Element (Number/Name) PE D8Z / Software Engineering Institute (SEI) Applied Research. Prior Years FY 2013 FY 2014
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior Years
More informationGraduate Systems Engineering Programs: Report on Outcomes and Objectives
Graduate Systems Engineering Programs: Report on Outcomes and Objectives Alice Squires, alice.squires@stevens.edu Tim Ferris, David Olwell, Nicole Hutchison, Rick Adcock, John Brackett, Mary VanLeer, Tom
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense : February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 7: Operational Systems Development
More informationDoD Architecture Framework Version 2.0
wreath stars Text DoD Architecture Framework Version 2.0 Volume 2: Architectural Data and Models Architect s Guide 28 May 2009 This page left intentionally blank TABLE OF CONTENTS SECTION PAGE 1. INTRODUCTION...
More informationIntegrated Cyber Defense Working Group (ICD WG) Introduction
Integrated Cyber Defense Working Group (ICD WG) Introduction Cory Huyssoon Allison Cline October 16, 2017 2017 by The Johns Hopkins Applied Physics Laboratory. Material is made available under the Creative
More informationAn Activity-Based Methodology* for Development and Analysis of Integrated DoD Architectures - The Art of Architecture
2004 Command and Control Research and Technology Symposium The Power of Information Age Concepts and Technologies C2 Assessment & Tools, #077 An Activity-Based Methodology* for Development and Analysis
More informationThe Joint Live Virtual Constructive Data Translator Framework Interoperability for a Seamless Joint Training Environment
Framework Interoperability for a Seamless Joint Training Environment Warren Bizub Technical Division Chief US Joint Forces Command Joint Warfighting Center warren.bizub@jfcom.mil Derek Bryan Experimentation
More informationWhite Paper. Rose PowerBuilder Link
White Paper Rose PowerBuilder Link Contents Overview 1 Audience...1 The Software Development Landscape...1 The Nature of Software Development...1 Better Software Development Methods...1 Successful Software
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Deployment Deployment is the phase of the system development lifecycle in which solutions are placed into use to
More informationIntroduction. Chapter 1. What Is Visual Modeling? The Triangle for Success. The Role of Notation. History of the UML. The Role of Process
Quatrani_Ch.01.fm Page 1 Friday, October 27, 2000 9:02 AM Chapter 1 Introduction What Is Visual Modeling? The Triangle for Success The Role of Notation History of the UML The Role of Process What Is Iterative
More informationRequirements and Design Overview
Requirements and Design Overview Robert B. France Colorado State University Robert B. France O-1 Why do we model? Enhance understanding and communication Provide structure for problem solving Furnish abstractions
More informationcameo Enterprise Architecture UPDM / DoDAF / MODAF / SysML / BPMN / SoaML USER GUIDE version 17.0
cameo Enterprise Architecture UPDM / DoDAF / MODAF / SysML / BPMN / SoaML USER GUIDE version 17.0 No Magic, Inc. 2010 All material contained herein is considered proprietary information owned by No Magic,
More informationRich Hilliard 20 February 2011
Metamodels in 42010 Executive summary: The purpose of this note is to investigate the use of metamodels in IEEE 1471 ISO/IEC 42010. In the present draft, metamodels serve two roles: (1) to describe the
More informationTRIAEM LLC Corporate Capabilities Briefing
TRIAEM LLC Corporate Capabilities Briefing 3/4/ 1 CORPORATE OVERVIEW CORPORATE VALUES MISSION STATEMENT SERVICES WORKFORCE EXPERIENCE CORPORATE CONTACTS 3/4/ 2 CORPORATE OVERVIEW TRIAEM is certified through
More informationSoftware Process. Software Process
Software Process What is SW process? Definition, Development, Support phases Process models: Waterfall Prototyping Spiral, Incremental & iterative (best practices) UP process model What is it? How does
More informationIncident Response Services to Help You Prepare for and Quickly Respond to Security Incidents
Services to Help You Prepare for and Quickly Respond to Security Incidents The Challenge The threat landscape is always evolving and adversaries are getting harder to detect; and with that, cyber risk
More information10 Steps to Building an Architecture for Space Surveillance Projects. Eric A. Barnhart, M.S.
10 Steps to Building an Architecture for Space Surveillance Projects Eric A. Barnhart, M.S. Eric.Barnhart@harris.com Howard D. Gans, Ph.D. Howard.Gans@harris.com Harris Corporation, Space and Intelligence
More informationT&E Workforce Development
T&E Workforce Development 2016 ITEA Cyber Security Workshop Mr. Thomas W. Simms Deputy Director, T&E Competency & Development Deputy Assistant Secretary of Defense (DT&E) March 17, 2016 Agenda Policy Overview
More informationForensics and Biometrics Enterprise Reference Architecture (FBEA)
Forensics and Biometrics Enterprise Reference (FBEA) Overview and Summary Information (AV-1) Final Draft Version 2.6 Aug 2016 Version History Version# Date Page(s) Changed Change Description 1.0 Feb 2016
More informationInformation Security and Service Management. Security and Risk Management ISSM and ITIL/ITSM Interrelationship
Information Security and Service Management for Management better business for State outcomes & Local Governments Security and Risk Management ISSM and ITIL/ITSM Interrelationship Introduction Over the
More informationThe Perfect Storm Cyber RDT&E
The Perfect Storm Cyber RDT&E NAVAIR Public Release 2015-87 Approved for public release; distribution unlimited Presented to: ITEA Cyber Workshop 25 February 2015 Presented by: John Ross NAVAIR 5.4H Cyberwarfare
More informationImplementing the Army Net Centric Data Strategy in a Service Oriented Environment
Implementing the Army Net Centric Strategy in a Service Oriented Environment Michelle Dirner Army Net Centric Strategy (ANCDS) Center of Excellence (CoE) Service Team Lead RDECOM CERDEC SED in support
More informationDepartment of Management Services REQUEST FOR INFORMATION
RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President
More informationUPDM PLUGIN. version user guide
UPDM PLUGIN version 17.0 user guide No Magic, Inc. 2011 All material contained herein is considered proprietary information owned by No Magic, Inc. and is not to be shared, copied, or reproduced by any
More informationSOFTWARE ARCHITECTURE & DESIGN INTRODUCTION
SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION http://www.tutorialspoint.com/software_architecture_design/introduction.htm Copyright tutorialspoint.com The architecture of a system describes its major components,
More informationUNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 10 R-1 Line #218
COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY 2015 FY 2015 OCO # Total FY 2016 FY 2017 FY 2018 FY 2019 Office of Secretary Of Defense Page 1 of 10 R-1 Line #218 Cost To Complete Total
More informationBuilding an Assurance Foundation for 21 st Century Information Systems and Networks
Building an Assurance Foundation for 21 st Century Information Systems and Networks The Role of IT Security Standards, Metrics, and Assessment Programs Dr. Ron Ross National Information Assurance Partnership
More informationPlanning and Implementing ITIL in ICT Organisations
CCPM Solutions Experts in ICT Performance Supporting Your Business Planning and Implementing ITIL in ICT Organisations June 2012, Addis Ababa Content 1. Quick ITIL (Overview) 2. Case study (How not to
More informationVendor: The Open Group. Exam Code: OG Exam Name: TOGAF 9 Part 1. Version: Demo
Vendor: The Open Group Exam Code: OG0-091 Exam Name: TOGAF 9 Part 1 Version: Demo QUESTION 1 According to TOGAF, Which of the following are the architecture domains that are commonly accepted subsets of
More informationDr. Steven J. Hutchison Principal Deputy Developmental Test and Evaluation
Nov 2012 Page-1 Dr. Steven J. Hutchison Principal Deputy Developmental Test and Evaluation November 2012 Nov 2012 Page-2 DT&E for Complex Systems Performance Reliability Interoperability Information Security
More informationDELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1
DELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1 MISSION-DRIVEN SOLUTIONS 2018 INTEGRATED INTEL SOLUTIONS ALL RIGHTS RESERVED MISSION-DRIVEN SOLUTIONS
More informationIntroduction to the DoDAF 2.0
Introduction to the DoDAF 2.0 The introduction to the DoDAF 2.0 provides students with a foundational understanding of DoDAF 2.0 s history and purpose. During the DoDAF 2.0 introduction, items should not
More informationUPDM 2 PLUGIN. version user guide
UPDM 2 PLUGIN version 17.0.1 user guide No Magic, Inc. 2011 All material contained herein is considered proprietary information owned by No Magic, Inc. and is not to be shared, copied, or reproduced by
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions)
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationCyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS
Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported
More informationDoD Software Assurance (SwA) Update
DoD Software Assurance (SwA) Update Systems and Software Technology Conference May 2, 2006 Ms. Kristen Baldwin OUSD(AT&L)/Defense Systems kristen.baldwin@osd.mil Briefing Agenda Problem Definition Vision
More informationFOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY
FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide
More informationTHE EVOLUTION OF SIEM
THE EVOLUTION OF SIEM Why it is critical to move beyond logs BUSINESS-DRIVEN SECURITY SOLUTIONS THE EVOLUTION OF SIEM Why it is critical to move beyond logs Despite increasing investments in security,
More informationOSD Product Support BCA Guidebook. Joseph Colt Murphy Senior Financial Analyst ODASD Materiel Readiness 9 May 2011
OSD Product Support BCA Guidebook Joseph Colt Murphy Senior Financial Analyst ODASD Materiel Readiness 9 May 2011 Joseph.murphy@osd.mil Report Documentation Page Form Approved OMB No. 0704-0188 Public
More informationAdvanced Security Tester Course Outline
Advanced Security Tester Course Outline General Description This course provides test engineers with advanced skills in security test analysis, design, and execution. In a hands-on, interactive fashion,
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons
More informationFor presentation at the Fourth Software Engineering Institute (SEI) Software Architecture Technology User Network (SATURN) Workshop.
For presentation at the Fourth Software Engineering Institute (SEI) Software Architecture Technology User Network (SATURN) Workshop. The authors can be reached at cb@mitre.org or ioannis @Mitre.org. In
More informationIntegrating TOGAF, Zachman and DoDAF Into A Common Process
Integrating TOGAF, Zachman and DoDAF Into A Common Process Rolf Siegers Senior Principal Software Systems Engineer The Open Group Architecture Practitioner s Conference October 2003 Customer Success Is
More informationThe Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements
Journal of Software Engineering and Applications, 2016, 9, 112-127 Published Online April 2016 in SciRes. http://www.scirp.org/journal/jsea http://dx.doi.org/10.4236/jsea.2016.94010 The Analysis and Proposed
More informationSession 8: UML The Unified Modeling (or the Unstructured Muddling) language?
Session 8: UML The Unified Modeling (or the Unstructured Muddling) language? A few observations, opinions, pros & cons COMP 320 / 420 Spring, 2018 Mr. Weisert Where did the UML come from? Object-oriented
More informationSystems 2020 Strategic Initiative Overview
Systems 2020 Strategic Initiative Overview Kristen Baldwin ODDR&E/Systems Engineering 13 th Annual NDIA Systems Engineering Conference San Diego, CA October 28, 2010 Oct 2010 Page-1 DISTRIBUTION STATEMENT
More informationWELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER
WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER Audio Configuration Configure your audio settings. The Audio Setup Wizard allows you to configure your volume level, default microphone and recording
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationDell helps you simplify IT
Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending
More information90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
More informationApplying User Centered Design in the Development of Systems without User Interfaces
Applying User Centered Design in the Development of Systems without User Interfaces National Defense Industrial Association 14 th Annual Systems Engineering Conference October 27, 2011 Dr. W. David Reese,
More informationCyber Threat Intelligence: Integrating the Intelligence Cycle. Elias Fox and Michael Norkus, Cyber Threat Intelligence Analysts January 2017
Cyber Threat Intelligence: Integrating the Intelligence Cycle Elias Fox and Michael Norkus, Cyber Threat Intelligence Analysts January 2017 CLASSIFICATION MARKS The Global Domain Network Domain The internet
More informationVocabulary-Driven Enterprise Architecture Development Guidelines for DoDAF AV-2: Design and Development of the Integrated Dictionary
Vocabulary-Driven Enterprise Architecture Development Guidelines for DoDAF AV-2: Design and Development of the Integrated Dictionary December 17, 2009 Version History Version Publication Date Author Description
More information1. i. What are the 3 major components of a information system and show their relationship input output
Higher National Diploma in Information Technology First Year, Second semesterexamination-2011 IT2005: System Analysis and Design Answer Script No. of pages: 11 1. i. What are the 3 major components of
More informationAntiterrorism / Force Protection (AT/FP) Assessment Tool Training. Module 1: Policy Drivers for MARMS & AT/FP Assessments
Antiterrorism / Force Protection (AT/FP) Assessment Tool Training Module 1: Policy Drivers for MARMS & AT/FP Assessments Supporting Joint Staff J33 via US Army Armament, Research, Development and Engineering
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationCISC 322 Software Architecture
CISC 322 Software Architecture UML - The Unified Modelling Language Nicolas Bettenburg 1 DEFINITION The Unified Modelling Language (UML) is a graphical language for visualizing, specifying, constructing,
More informationUNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2012 Office of Secretary Of Defense DATE: February 2011 BA 3: Advanced Development (ATD) COST ($ in Millions) FY 2010 FY 2011 Base OCO Total FY 2013 FY
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.
More informationDefense Engineering Excellence
Defense Engineering Excellence Kristen J. Baldwin Principal Deputy Office of the Deputy Assistant Secretary of Defense for Systems Engineering, OUSD(AT&L) 18th Annual NDIA Systems Engineering Conference
More informationCybersecurity Planning Lunch and Learn
Cybersecurity Planning Lunch and Learn Mr. Tyrone Ty Theriot, CNE Tyrone.Theriot@dau.mil 703-805-4983 3 May 2017 Presenter: Ty Theriot Moderator: LtCol Stephani Hunsinger LtCol Stephani Hunsinger USAF,
More informationUNCLASSIFIED FY 2016 OCO. FY 2016 Base
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology Development
More informationHistory of object-oriented approaches
Prof. Dr. Nizamettin AYDIN naydin@yildiz.edu.tr http://www.yildiz.edu.tr/~naydin Object-Oriented Oriented Systems Analysis and Design with the UML Objectives: Understand the basic characteristics of object-oriented
More informationipcgrid 2015 March 26, 2015 David Roop Director Electric Transmission Operations Dominion Virginia Power
Substation Security and Resiliency Update on Accomplishments thus far ipcgrid 2015 March 26, 2015 David Roop Director Electric Transmission Operations Dominion Virginia Power Dominion Profile Leading provider
More informationDoD Strategy for Cyber Resilient Weapon Systems
DoD Strategy for Cyber Resilient Weapon Systems Melinda K. Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Systems Engineering Conference October 2016 10/24/2016 Page-1
More informationInformation Security Continuous Monitoring (ISCM) Program Evaluation
Information Security Continuous Monitoring (ISCM) Program Evaluation Cybersecurity Assurance Branch Federal Network Resilience Division Chad J. Baer FNR Program Manager Chief Operational Assurance Agenda
More informationModule 3 Introduction to the. Architecture Development Method. Introduction to the. Architecture Development Method (ADM)
Module 3 Introduction to the Development Method 8.1.1 Edition Copyright November 2006 All Slide rights reserved 1 Published by The Open Group, November 2006 Development Method Introduction to the Development
More informationCYBER SECURITY BRIEF. Presented By: Curt Parkinson DCMA
CYBER SECURITY BRIEF Presented By: Curt Parkinson DCMA September 20, 2017 Agenda 2 DFARS 239.71 Updates Cybersecurity Contracting DFARS Clause 252.204-7001 DFARS Clause 252.239-7012 DFARS Clause 252.239-7010
More informationProgram Protection Implementation Considerations
Program Protection Implementation Considerations Melinda Reed Deputy Director for Program Protection Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Program Protection
More informationService Management. What an Acquisition Practitioner Needs to Know. Karen Gomez Defense Information Systems Agency Mission Support Division
Service Management DAU Symposium April 4, 2017 What an Acquisition Practitioner Needs to Know Karen Gomez Defense Information Systems Agency Mission Support Division 1 Topics DESMF The DESMF Realized Service
More informationCyber Partnership Blueprint: An Outline
Approved for Public Release; Distribution Unlimited. 13-3851 The MITRE Corporation Cyber Partnership Blueprint: An Outline October 26, 2013 Copyright 1997-2013, The MITRE Corporation. All rights reserved.
More informationGENERAL SERVICES ADMINISTRATION
GENERAL SERVICES ADMINISTRATION Federal Acquisition Service Authorized Federal Supply Schedule Price List On-line access to contract ordering information, terms and conditions, up-to-date pricing, and
More informationCivil Air Patrol. National Incident Management System (NIMS) 2016 Refresh Lt Col Bob Ditch HQ CAP/DOSI CITIZENS SERVING COMMUNITIES
Civil Air Patrol National Incident Management System (NIMS) 2016 Refresh Lt Col Bob Ditch HQ CAP/DOSI 15 JUNE 2016 2 Webinar Presenters John Desmarais Director of Operations National Headquarters Lt Col
More informationObject Oriented System Development
Object Oriented System Development Ratna Wardani Semester Genap, 2012 2/26/2012 Ratna W/PSBO2012 1 About This Course It shows how to apply OOAD technique to analyze and develop systems.. It gives you an
More informationBUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE
BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not
More informationBUILDING GOOD-QUALITY FUNCTIONAL SPECIFICATION MODEL
BUILDING GOOD-QUALITY FUNCTIONAL SPECIFICATION MODEL A few words on Samares Engineering Research and Consultancy on Systems Engineering Requirement engineering Model-Based Systems Engineering Co-simulation
More informationOFFICE OF THE SECRETARY OF DEFENSE DEFENSE PENTAGON WASHINGTON, DC MEMORANDUM FOR MEMBERS OF THE ACQUISITION WORKFORCE
OFFICE OF THE SECRETARY OF DEFENSE 1 000 DEFENSE PENTAGON WASHINGTON, DC 20301-1000 ocr 3 o 2015 MEMORANDUM FOR MEMBERS OF THE ACQUISITION WORKFORCE SUBJECT: Guidance on Cybersecurity Implementation in
More informationWHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework.
Learning Objectives and Course Descriptions: FOUNDATION IN IT SERVICE MANAGEMENT This official ITIL Foundation certification course provides you with a general overview of the IT Service Management Lifecycle
More informationGeospatial Intelligence Interoperability Through Standards Gordon C.Ferrari Chief, Content Standards and Interoperability Division
Geospatial Intelligence Interoperability Through Standards Gordon C.Ferrari Chief, Content Standards and Interoperability Division 15 May 2002 NIMA Vision and Mission Statements National Imagery and Mapping
More informationDoD Architecture Framework Version 2.0
wreath stars Text DoD Architecture Framework Version 2.0 Volume 3: DoDAF Meta-model Physical Exchange Specification Developer s Guide 18 May 2009 This page left intentionally blank TABLE OF CONTENTS SECTION
More informationUNCLASSIFIED FY 2016 OCO. FY 2016 Base
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions)
More informationDefense Logistics Agency Environmental Management System
Defense Logistics Agency Environmental Management System Joint Service Environmental Management Conference Denver, Colorado Dr. Jean Shorett DLA Enterprise Support March 22, 2006 1 The DLA Enterprise FY03
More informationBusiness Analysis in Practice
Business Analysis in Practice (Level 2 CCBA Certification Preparation Course) Duration: 3 days PM-Partners have been leaders in project management certification for 20 years, training over 8,500 industry
More informationImplementing ITIL v3 Service Lifecycle
Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational
More informationContinuous protection to reduce risk and maintain production availability
Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading
More informationTest & Evaluation of the NR-KPP
Defense Information Systems Agency Test & Evaluation of the NR-KPP Danielle Mackenzie Koester Chief, Engineering and Policy Branch March 15, 2011 2 "The information provided in this briefing is for general
More information