A Training Framework for the Department of Defense Public Key Infrastructure

A Training Framework for the Department of Defense Public Key Infrastructure PDF Author: Marcia L. Ziemba
Publisher:
ISBN: 9781423525516
Category :
Languages : en
Pages : 114

Get Book Here

Book Description
Increased use of the Internet and the growth of electronic commerce within the Department of Defense (DoD) has led to the development and implementation of the DoD Public Key Infrastructure (PKI). Any PKI can only serve its intended purpose if there is trust within the system. This thesis reviews the basics of public (or asymmetric) key cryptography and its counterpart, symmetric key cryptography. It outlines the DoD's PKI implementation plan and the user roles identified within the infrastructure. Because a PKI relies entirely on trust, training for all users of a PKI is essential. The current approach to PKI training within the DoD will not provide all of its users with the required level of understanding of the system as a whole, or of the implications and ramifications that their individual actions may have upon the system. The decentralized, segmented, and inconsistent approach to PKI training will result in a lack of trust within the PKI. Training for the DoD PKI must be consistent, current, appropriate, and available to all users at any time. The author proposes a web-based training framework for the DoD PKI. The basic requirements and design of the framework are presented, and a prototype is developed for further testing and evaluation. Without the proper attention to training, the DoD PKI will be at risk, and may not perform its intended functions of providing the required authenticity and integrity across the various networks upon which DoD conducts business.

A Training Framework for the Department of Defense Public Key Infrastructure

A Training Framework for the Department of Defense Public Key Infrastructure PDF Author: Marcia L. Ziemba
Publisher:
ISBN: 9781423525516
Category :
Languages : en
Pages : 114

Get Book Here

Book Description
Increased use of the Internet and the growth of electronic commerce within the Department of Defense (DoD) has led to the development and implementation of the DoD Public Key Infrastructure (PKI). Any PKI can only serve its intended purpose if there is trust within the system. This thesis reviews the basics of public (or asymmetric) key cryptography and its counterpart, symmetric key cryptography. It outlines the DoD's PKI implementation plan and the user roles identified within the infrastructure. Because a PKI relies entirely on trust, training for all users of a PKI is essential. The current approach to PKI training within the DoD will not provide all of its users with the required level of understanding of the system as a whole, or of the implications and ramifications that their individual actions may have upon the system. The decentralized, segmented, and inconsistent approach to PKI training will result in a lack of trust within the PKI. Training for the DoD PKI must be consistent, current, appropriate, and available to all users at any time. The author proposes a web-based training framework for the DoD PKI. The basic requirements and design of the framework are presented, and a prototype is developed for further testing and evaluation. Without the proper attention to training, the DoD PKI will be at risk, and may not perform its intended functions of providing the required authenticity and integrity across the various networks upon which DoD conducts business.

Public Key Infrastructure Implementation Plan for the Department of the Navy

Public Key Infrastructure Implementation Plan for the Department of the Navy PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 21

Get Book Here

Book Description
This PKI Implementation Plan for the Department of the Navy (DON) provides a roadmap for Navy and Marine Corps planners and managers to carry out the DoD PKI policy and addresses the general activities and objectives associated with implementation of the Navy and Marine Corps portions of the Class 3, Class 4 (FORTEZZA), and Target Class 4 DoD PKIs. This implementation plan is consistent with the 6 May 1999 "DoD Public Key Infrastructure" memorandum released by the Deputy Secretary of Defense, as modified by the DoD Chief Information Officer (CIO) on 12 August 2000, as well as the 29 October 1999 DoD PKI Implementation Plan. Chief of Naval Operations (CNO) N643 and Headquarters, Marine Corps (HQMC) C4 will promulgate detailed implementation guidance within their respective chains-of-command as necessary to accomplish the specific activities and achieve the specific objectives outlined in this plan.

DoD Digital Modernization Strategy

DoD Digital Modernization Strategy PDF Author: Department of Defense
Publisher:
ISBN: 9781081748562
Category :
Languages : en
Pages : 74

Get Book Here

Book Description
The global threat landscape is constantly evolving and remaining competitive and modernizing our digital environment for great power competition is imperative for the Department of Defense. We must act now to secure our future.This Digital Modernization Strategy is the cornerstone for advancing our digital environment to afford the Joint Force a competitive advantage in the modern battlespace.Our approach is simple. We will increase technological capabilities across the Department and strengthen overall adoption of enterprise systems to expand the competitive space in the digital arena. We will achieve this through four strategic initiatives: innovation for advantage, optimization, resilient cybersecurity, and cultivation of talent.The Digital Modernization Strategy provides a roadmap to support implementation of the National Defense Strategy lines of effort through the lens of cloud, artificial intelligence, command, control and communications and cybersecurity.This approach will enable increased lethality for the Joint warfighter, empower new partnerships that will drive mission success, and implement new reforms enacted to improve capabilities across the information enterprise.The strategy also highlights two important elements that will create an enduring and outcome driven strategy. First, it articulates an enterprise view of the future where more common foundational technology is delivered across the DoD Components. Secondly, the strategy calls for a Management System that drives outcomes through a metric driven approach, tied to new DoD CIO authorities granted by Congress for both technology budgets and standards.As we modernize our digital environment across the Department, we must recognize now more than ever the importance of collaboration with our industry and academic partners. I expect the senior leaders of our Department, the Services, and the Joint Warfighting community to take the intent and guidance in this strategy and drive implementation to achieve results in support of our mission to Defend the Nation.

Department of Defense Authorization for Appropriations for Fiscal Year 2007

Department of Defense Authorization for Appropriations for Fiscal Year 2007 PDF Author: United States. Congress. Senate. Committee on Armed Services
Publisher:
ISBN:
Category : United States
Languages : en
Pages : 1236

Get Book Here

Book Description


No computer system left behind

No computer system left behind PDF Author: United States. Congress. House. Committee on Government Reform
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 120

Get Book Here

Book Description


Dod Training

Dod Training PDF Author: U S Government Accountability Office (G
Publisher: BiblioGov
ISBN: 9781289158187
Category :
Languages : en
Pages : 32

Get Book Here

Book Description
GAO reviewed the Department of Defense's (DOD) efforts to reduce its formal training infrastructure, focusing on: (1) the size of the active forces' formal training infrastructure; and (2) planned, completed, or ongoing plans to reduce this infrastructure. GAO found that: (1) the formal military training and education cost per student increased about $4,200 between fiscal years (FY) 1987 and 1995; (2) despite a decrease in the training workload, training costs have increased about $745 million more than normal inflation between FY 1987 and 1995; (3) DOD officials reported that the main reason for the increase is the use of private-sector and civilian instructors; (4) planned or ongoing actions to reduce training infrastructure include reducing the number of locations at which a service teaches a particular course, increasing interservice training for similar curricula, increasing the number of private-sector instructors, courses, and training facilities, and closing or realigning bases that provide formal training; (5) DOD lacks an overall plan to guide and measure training infrastructure reduction (6) the number of locations that provide training decreased from 265 to 172 between FY 1987 and 1995; (7) DOD estimated that increases in interservice training have resulted in about $300 million in savings and that future course consolidations and collocations would result in one-time savings of about $4.4 million and annual recurring savings of about $7.28 million; and (8) despite expected base closures and mission realignments, DOD expects that excess training infrastructure will continue to exist.

Department of Defense Dictionary of Military and Associated Terms

Department of Defense Dictionary of Military and Associated Terms PDF Author: United States. Joint Chiefs of Staff
Publisher:
ISBN:
Category : Military art and science
Languages : en
Pages : 392

Get Book Here

Book Description


Cybersecurity in Context

Cybersecurity in Context PDF Author: Chris Jay Hoofnagle
Publisher: John Wiley & Sons
ISBN: 1394262450
Category : Computers
Languages : en
Pages : 548

Get Book Here

Book Description
“A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping students with the critical thinking needed to navigate and influence security for our digital world.” —JOSIAH DYKSTRA, Trail of Bits “A comprehensive, multidisciplinary introduction to the technology and policy of cybersecurity. Start here if you are looking for an entry point to cyber.” —BRUCE SCHNEIER, author of A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend Them Back The first-ever introduction to the full range of cybersecurity challenges Cybersecurity is crucial for preserving freedom in a connected world. Securing customer and business data, preventing election interference and the spread of disinformation, and understanding the vulnerabilities of key infrastructural systems are just a few of the areas in which cybersecurity professionals are indispensable. This textbook provides a comprehensive, student-oriented introduction to this capacious, interdisciplinary subject. Cybersecurity in Context covers both the policy and practical dimensions of the field. Beginning with an introduction to cybersecurity and its major challenges, it proceeds to discuss the key technologies which have brought cybersecurity to the fore, its theoretical and methodological frameworks and the legal and enforcement dimensions of the subject. The result is a cutting-edge guide to all key aspects of one of this century’s most important fields. Cybersecurity in Context is ideal for students in introductory cybersecurity classes, and for IT professionals looking to ground themselves in this essential field.

Department of Defense Authorization for Appropriations for Fiscal Year 2007, S. Hrg. 109-827, Part 1, February 7, 14, 16; March 2, 7, 9, 14, 15, 16, 2006, 109-2 Hearings, *

Department of Defense Authorization for Appropriations for Fiscal Year 2007, S. Hrg. 109-827, Part 1, February 7, 14, 16; March 2, 7, 9, 14, 15, 16, 2006, 109-2 Hearings, * PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 1264

Get Book Here

Book Description


Report of the Secretary of Defense to the President and the Congress

Report of the Secretary of Defense to the President and the Congress PDF Author: United States. Department of Defense
Publisher:
ISBN:
Category : United States
Languages : en
Pages : 792

Get Book Here

Book Description