A Training Framework for the Department of Defense Public Key Infrastructure

A Training Framework for the Department of Defense Public Key Infrastructure PDF Author: Marcia L. Ziemba
Publisher:
ISBN: 9781423525516
Category :
Languages : en
Pages : 114

Get Book

Book Description
Increased use of the Internet and the growth of electronic commerce within the Department of Defense (DoD) has led to the development and implementation of the DoD Public Key Infrastructure (PKI). Any PKI can only serve its intended purpose if there is trust within the system. This thesis reviews the basics of public (or asymmetric) key cryptography and its counterpart, symmetric key cryptography. It outlines the DoD's PKI implementation plan and the user roles identified within the infrastructure. Because a PKI relies entirely on trust, training for all users of a PKI is essential. The current approach to PKI training within the DoD will not provide all of its users with the required level of understanding of the system as a whole, or of the implications and ramifications that their individual actions may have upon the system. The decentralized, segmented, and inconsistent approach to PKI training will result in a lack of trust within the PKI. Training for the DoD PKI must be consistent, current, appropriate, and available to all users at any time. The author proposes a web-based training framework for the DoD PKI. The basic requirements and design of the framework are presented, and a prototype is developed for further testing and evaluation. Without the proper attention to training, the DoD PKI will be at risk, and may not perform its intended functions of providing the required authenticity and integrity across the various networks upon which DoD conducts business.

A Training Framework for the Department of Defense Public Key Infrastructure

A Training Framework for the Department of Defense Public Key Infrastructure PDF Author: Marcia L. Ziemba
Publisher:
ISBN: 9781423525516
Category :
Languages : en
Pages : 114

Get Book

Book Description
Increased use of the Internet and the growth of electronic commerce within the Department of Defense (DoD) has led to the development and implementation of the DoD Public Key Infrastructure (PKI). Any PKI can only serve its intended purpose if there is trust within the system. This thesis reviews the basics of public (or asymmetric) key cryptography and its counterpart, symmetric key cryptography. It outlines the DoD's PKI implementation plan and the user roles identified within the infrastructure. Because a PKI relies entirely on trust, training for all users of a PKI is essential. The current approach to PKI training within the DoD will not provide all of its users with the required level of understanding of the system as a whole, or of the implications and ramifications that their individual actions may have upon the system. The decentralized, segmented, and inconsistent approach to PKI training will result in a lack of trust within the PKI. Training for the DoD PKI must be consistent, current, appropriate, and available to all users at any time. The author proposes a web-based training framework for the DoD PKI. The basic requirements and design of the framework are presented, and a prototype is developed for further testing and evaluation. Without the proper attention to training, the DoD PKI will be at risk, and may not perform its intended functions of providing the required authenticity and integrity across the various networks upon which DoD conducts business.

Defense Critical Infrastructure

Defense Critical Infrastructure PDF Author: Davi M. D'Agostino
Publisher: DIANE Publishing
ISBN: 1437911420
Category : Technology & Engineering
Languages : en
Pages : 27

Get Book

Book Description
The DoD relies on a global network of DoD and non-DoD infrastructure so critical that its unavailability could have a debilitating effect on DoD's ability to project, support, and sustain its forces and operations worldwide. DoD established the Defense Critical Infrastructure Program (DCIP) to assure the availability of mission-critical infrastructure. This report evaluates the extent to which DoD has: (1) incorporated aspects of DCIP into its exercises in the Transportation Defense Sector; and (2) developed DCIP training standards departmentwide and made installation personnel aware of existing DCIP expertise. Includes recommendations. Charts and tables.

No computer system left behind

No computer system left behind PDF Author: United States. Congress. House. Committee on Government Reform
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 120

Get Book

Book Description


Department of Defense Authorization for Appropriations for Fiscal Year 2007

Department of Defense Authorization for Appropriations for Fiscal Year 2007 PDF Author: United States. Congress. Senate. Committee on Armed Services
Publisher:
ISBN:
Category : United States
Languages : en
Pages : 1236

Get Book

Book Description


Department of Defense Authorization for Appropriations for Fiscal Year 2007, S. Hrg. 109-827, Part 1, February 7, 14, 16; March 2, 7, 9, 14, 15, 16, 2006, 109-2 Hearings, *

Department of Defense Authorization for Appropriations for Fiscal Year 2007, S. Hrg. 109-827, Part 1, February 7, 14, 16; March 2, 7, 9, 14, 15, 16, 2006, 109-2 Hearings, * PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 1264

Get Book

Book Description


Defense Critical Infrastructure: Developing Training Standards and an Awareness of Existing Expertise Would Help DOD Assure the Availability of Critical Infrastructure

Defense Critical Infrastructure: Developing Training Standards and an Awareness of Existing Expertise Would Help DOD Assure the Availability of Critical Infrastructure PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 28

Get Book

Book Description
The Department of Defense (DoD) relies on a global network of DoD and non-DoD infrastructure so critical that its unavailability could have a debilitating effect on DoD's ability to project, support, and sustain its forces and operations worldwide. DoD established the Defense Critical Infrastructure Program (DCIP) to assure the availability of mission-critical infrastructure. GAO was asked to evaluate the extent to which DoD has done the following: (1) incorporated aspects of DCIP into its exercises in the Transportation Defense Sector, and (2) developed DCIP training standards department-wide and made installation personnel aware of existing DCIP expertise. GAO examined a nonprojectable sample of 46 critical assets representing the four military services, five combatant commands, and selected installations within five defense sectors. GAO reviewed relevant DoD DCIP guidance and documents and interviewed cognizant officials regarding DCIP exercises, training, and awareness. GAO recommends that DoD do the following: (1) develop department-wide DCIP training standards and an implementation time frame, and (2) develop an effective means to communicate to installation personnel the existence and availability of DCIP expertise at the combatant command and military service levels. DoD concurred with both recommendations.

El Tigre News

El Tigre News PDF Author:
Publisher:
ISBN:
Category : Militia
Languages : en
Pages : 408

Get Book

Book Description


Department of Defense Appropriations for 1999

Department of Defense Appropriations for 1999 PDF Author: United States. Congress. House. Committee on Appropriations. Subcommittee on National Security
Publisher:
ISBN:
Category : United States
Languages : en
Pages : 980

Get Book

Book Description


Department of Defense Appropriations for 1999: Secretary of and Chief of Staff of the Army

Department of Defense Appropriations for 1999: Secretary of and Chief of Staff of the Army PDF Author: United States. Congress. House. Committee on Appropriations. Subcommittee on National Security
Publisher:
ISBN:
Category : United States
Languages : en
Pages : 972

Get Book

Book Description


Information Security

Information Security PDF Author: David L. McClure
Publisher: DIANE Publishing
ISBN: 9780756712747
Category : Computers
Languages : en
Pages : 86

Get Book

Book Description
Reviews the federal government's public key infrastructure (PKI) strategy and initiatives to assess the issues and challenges the government faces in adopting this new technology. A PKI is a system of hardware, software, policies, and people that, when fully and properly implemented, can provide a suite of information security assurances that are important in protecting sensitive communications and transactions. The report assesses (1) the progress of the federal government in planning and coordinating federal PKI initiatives and (2) remaining challenges to be overcome before PKI can be put into widespread use. Charts and tables.