国防采办指南项目保护

ID:23168

大小:0.88 MB

页数:43页

时间:2022-11-28

金币:20

上传者:战必胜
CH 91. Purpose
The Defense Acquisition Guidebook (DAG), Chapter 9, provides guidance for the system security
engineering (SSE) discipline and Department of Defense (DoD) program protection for defense
acquisition programs. The program manager (PM) and the systems engineer (SE) should use DAG
Chapters 3 and 9 to effectively plan and execute program protection activities across the acquisition life
cycle.
CH 92. Background
Program protection provides the processes, methodologies, and techniques to enable program offices to
identify information, components, and technologies, as well as determine the most appropriate mix of
measures to protect the information, components, and technologies from known security threats and
attacks. These protection measures impact the development of the system being acquired, the operations
of the program office, and the means by which the items are acquired.
CH 92.1 Purpose of Program Protection
The purpose of program protection is to give PMs an effective way to understand, assess, and prioritize
the broad spectrum of security threats and attacks to the acquisition program, and to identify the right,
cost-effective mixture of measures to protect against such attacks. Since the scope of the acquisition
program can include all program and system information, organization and personnel, enabling networks,
and relevant systems (i.e., systems in acquisition, enabling systems, and support systems), PMs should
consider security threats and attacks to the following program elements that can be exposed to targeting:
Government program organization
Contractor organizations and environments
Software and hardware
System interfaces
Enabling and support equipment, systems, and facilities
Fielded systems.
To address threats and vulnerabilities associated with these program elements, program protection
focuses on (as shown in Figure 1):
Information (including program and system information)
Technology (critical program information (CPI))
Components (mission-critical functionality).
Figure 1: Key Program Protection Activities
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭