OSD CALS Architecture Master Plan Study. Concept Paper. Security. Volume 38
-
1989-07-01
Details:
-
Corporate Creators:
-
Subject/TRT Terms:
-
Publication/ Report Number:
-
Resource Type:
-
Geographical Coverage:
-
Corporate Publisher:
-
Abstract:Developing and executing a well-thought-out security policy is critical to the success of CALS. Without appropriate security measures, the integration of technology, organizations, functions, and data envisioned as Phase II CALS can not occur. Therefore security must be viewed as a critical disabling technology and must be satisfied to expedite integration. Expanding the computing base in terms of both functionality and scope is the most significant factor influencing CALS security requirements. The new functionality that needs to be protected includes database management systems, communications software, network software, network configurations, and remote peripheral equipment. Growth in the number of systems and users linked together constitutes the second aspect of this expansion that places new demands upon security. Although current DoD security practices are adequate for CALS Phase I digital exchange initiatives, there are numerous unsatisfied security requirements facing a shared-data environment envisioned as CALS Phase II. Even though satisfying all security requirements is necessary for a successful CALS, requirements that are unique to CALS are of primary interest from a CALS policy perspective. Therefore OSD needs to incorporate activities of other organizations in their plans, and only undertake activities that will satisfy CALS unique requirements
-
Format:
-
Collection(s):
-
Main Document Checksum:
-
Download URL:
-
File Type: