OSD CALS Architecture Master Plan Study. Concept Paper. Security. Volume 38
Advanced Search
Select up to three search categories and corresponding keywords using the fields to the right. Refer to the Help section for more detailed instructions.

Search our Collections & Repository

All these words:

For very narrow results

This exact word or phrase:

When looking for a specific result

Any of these words:

Best used for discovery & interchangable words

None of these words:

Recommended to be used in conjunction with other fields

Language:

Dates

Publication Date Range:

to

Document Data

Title:

Document Type:

Library

Collection:

Series:

People

Author:

Help
Clear All

Query Builder

Query box

Help
Clear All

For additional assistance using the Custom Query please check out our Help Page

i

OSD CALS Architecture Master Plan Study. Concept Paper. Security. Volume 38

Filetype[PDF-1.22 MB]


  • English

  • Details:

    • Publication/ Report Number:
    • Resource Type:
    • Geographical Coverage:
    • Abstract:
      Developing and executing a well-thought-out security policy is critical to the success of CALS. Without appropriate security measures, the integration of technology, organizations, functions, and data envisioned as Phase II CALS can not occur. Therefore security must be viewed as a critical disabling technology and must be satisfied to expedite integration. Expanding the computing base in terms of both functionality and scope is the most significant factor influencing CALS security requirements. The new functionality that needs to be protected includes database management systems, communications software, network software, network configurations, and remote peripheral equipment. Growth in the number of systems and users linked together constitutes the second aspect of this expansion that places new demands upon security. Although current DoD security practices are adequate for CALS Phase I digital exchange initiatives, there are numerous unsatisfied security requirements facing a shared-data environment envisioned as CALS Phase II. Even though satisfying all security requirements is necessary for a successful CALS, requirements that are unique to CALS are of primary interest from a CALS policy perspective. Therefore OSD needs to incorporate activities of other organizations in their plans, and only undertake activities that will satisfy CALS unique requirements
    • Format:
    • Collection(s):
    • Main Document Checksum:
    • File Type:

    Supporting Files

    • No Additional Files

    More +

    You May Also Like

    Checkout today's featured content at rosap.ntl.bts.gov

    Version 3.26