SlideShare a Scribd company logo
Interoperability versus Cyber Security/Information
                    Assurance?


                          Mr. Jack Zavin
                     Advisor Council Member,
            NCOIC Member Executive Representative,
        & Vice Chair Net Centric Attributes Functional Team
                          11 June 2010

                         Approved for Public Release
                            Distribution Unlimited
                      NCOIC-DefDailyCyber-JZ20100611rev1
Net Centric Environment (NCE):
Objective, Goals & Description
   Objective: All users, whether known or unanticipated, are
    able to easily discover, access, trust, and use the
    data/information that supports their business/mission
    objectives unconstrained by their location or time of day.
   Goals:
     – Evolve & Populate the NCE
     – Protect & Defend the NCE
     – Manage & Operate the NCE
   The NCE is implemented with evolving balanced &
    synchronized sets of Process, Organization, People,
    Information & Materiel (POPIM) Solutions.
   Interoperability whether in an NCE or not is more than just
    the technical exchange of information rather it is composed
    of evolvable POPIM Solutions Sets. Interoperability must be
    synergized with Information Assurance to assure obtaining
    the best of both.
Net Centric Environment:
Functional Performers

                                                  Managers/Operators**           IA*

               IA

               Info Producers/publishers**
                                             Information Services                          IA
                                                  Providers     IA




                                                                                       Users/Consumers**
                                                               Computing
                                                               Resource
                                                               Providers    IA


                                                   Information Transport
                                                         Providers         IA



•   Behavior and relationship characteristics include: Quality of Service;
    Quality of Protection; Addressing; Tagging of content & roles/Identities;
•   Information Forms include voice, video, images, text, graphics….
* IA = Information Assurance – protecting & defending the information
    and information technology.
** Includes Software Applications whether hosted locally or by a
    computing resource provider.
Interoperability Model:
A composite of Materiel & Non-materiel solutions




                                 Mission/Business Objectives     IA
                                                                                      Non-Materiel
                                                                                       Solutions
                                Harmonized Strategy/Doctrines IA
                                                                      Process,
  Layers of Interoperability




                                                                      Organization,
                                      Aligned Operations         IA   People

                                      Aligned Procedures         IA

                                    Knowledge/Awareness          IA
                                                                      Data,
                                  Information Interoperability        Information,
                                                                 IA
                                                                      Knowledge
                               Data/Object Model Interoperability
                                                                IA

                                    Network Interoperability          Information
                                                                 IA
                                                                      Transport
                                                                                      Materiel
                                                                                      Solutions
                                   Physical Interoperability     IA
Interoperability Model &
End to End Quality of Service (QoS)


                                Mission/Business Objectives     IA
                                                                                   Organizational
                               Harmonized Strategy/Doctrines                          Drivers
                                                                IA    Quality of
 Layers of Interoperability




                                     Aligned Operations               Operation
                                                                IA
                                                                      Services
                                     Aligned Procedures               (QoOS)
                                                                IA


                                   Knowledge/Awareness          IA
                                                                     Quality of
                                                                     Information
                                 Information Interoperability   IA
                                                                     Services
                                                                     (QoIS)
                              Data/Object Model Interoperability
                                                               IA
                                                                     Quality of
                                   Network Interoperability     IA   Transport      Technical
                                                                     Services        Drivers
                                  Physical Interoperability     IA
                                                                     (QoTS)
End-to-End Quality of Service

                                              End-to-End Quality of Service
                                                  +                                 =   +
   Q u a l i t y o f O p e r a t i o n Services       Quality of Information Services       Quality of Transport Services

  Key Needs:                                          Key Needs:                              Key Needs:
  • Mission or business                               • Discoverability & availability        • Network interoperability
    objectives                                        • Transport interoperability            • Physical interoperability
  • Harmonized strategy or                            • Data/object model
    doctrines                                           interoperability                   Key Metrics:
  • Aligned operations                                                                     • Urgency:
  • Aligned procedures                                                                        • Transport lag or delay,
                                                      Key Metrics:                              jitter, packet loss, packet
  • Knowledge/awareness of                            • Urgency:
    actions by people and                                                                       errors
                                                          • Data/topic latency, service • Priority:
    processes                                               response time, application        • Class of service,
   Key Metrics:                                             timeliness                          differentiated service,
   • Urgency:                                         • Priority:                               precedence, preemption,
          •Timeliness                                     • Precedence of user                  guaranteed service
   • Priority:                                              requests, data, and services • Information Assurance:
          •Degree of cooperation                      • Information Assurance (IA)            • Data Trust: Availability,
   • Information Assurance (IA)                           –Data Trust: integrity &              Connectivity (fixed,
          •Fluidity of response                             availability, fault tolerance,      mobile)
          •Clarity of understanding                         accessibility                     • Security: encryption,
          •Ubiquity or extent of                          –Security: data confidentiality,      intrusion detection,
          influence                                         authentication, non-                authentication,
          •Accuracy                                         repudiation                         authorization, access 6
                                                                                                control
The unique values of NCOIC

   NCOIC is the only organization dedicated to net
    centric operations.

   NCOIC provides vendor neutral products &
    services.

   NCOIC provides multinational dialog.

   NCOIC provides a multi-discipline cadre of
    experts.
Net-Enabled
                    Future




     Stovepiped
    Systems,
Point-to-Point
Networks

More Related Content

What's hot

Big Data i CSC's optik, CSC Representative
Big Data i CSC's optik, CSC RepresentativeBig Data i CSC's optik, CSC Representative
Big Data i CSC's optik, CSC Representative
IBM Danmark
 
Future Focus Infotech Brochure
Future Focus Infotech Brochure Future Focus Infotech Brochure
Future Focus Infotech Brochure Lyf Ffi
 
48 benot-long
48 benot-long48 benot-long
48 benot-longKBIZEAU
 
Confluence Adoption: Techniques for Growing Your Wiki
Confluence Adoption: Techniques for Growing Your WikiConfluence Adoption: Techniques for Growing Your Wiki
Confluence Adoption: Techniques for Growing Your Wiki
Atlassian
 
Service Oriented Approach to Application Modernization sept 2010
Service Oriented Approach to Application Modernization sept 2010Service Oriented Approach to Application Modernization sept 2010
Service Oriented Approach to Application Modernization sept 2010
davemayo
 
Saurabh Gupta Design Portfolio 2002-08
Saurabh Gupta Design Portfolio 2002-08Saurabh Gupta Design Portfolio 2002-08
Saurabh Gupta Design Portfolio 2002-08
Saurabh Gupta
 
Sla Model 2002 Jvk
Sla Model 2002 JvkSla Model 2002 Jvk
Sla Model 2002 Jvk
DrJVK
 
Frameworks2go business insights delivered socially
Frameworks2go business insights delivered socially Frameworks2go business insights delivered socially
Frameworks2go business insights delivered socially
frameworks2go.com
 
10 steps to_4_g_service_assurance
10 steps to_4_g_service_assurance10 steps to_4_g_service_assurance
10 steps to_4_g_service_assuranceTelecosm
 
BPO Philippines
BPO PhilippinesBPO Philippines
BPO Philippinescyap09
 
20091021 At Crossroads: Internet of Services Research beyond Call 5
20091021 At Crossroads: Internet of Services Research beyond Call 520091021 At Crossroads: Internet of Services Research beyond Call 5
20091021 At Crossroads: Internet of Services Research beyond Call 5
Arian Zwegers
 
4. it governance a compass without a map v.2.6 pink elephant
4. it governance a compass without a map v.2.6   pink elephant4. it governance a compass without a map v.2.6   pink elephant
4. it governance a compass without a map v.2.6 pink elephantaventia
 
IT governance and post merger management
IT governance and post merger managementIT governance and post merger management
IT governance and post merger management
Matt Schofield
 
ICC-Education Profile
ICC-Education ProfileICC-Education Profile
ICC-Education Profile
icceducation
 
20080422 Overview of ICT research in Software & Services
20080422 Overview of ICT research in Software & Services20080422 Overview of ICT research in Software & Services
20080422 Overview of ICT research in Software & Services
Arian Zwegers
 
Rawat Ibm Compliance Webinar
Rawat Ibm Compliance WebinarRawat Ibm Compliance Webinar
Rawat Ibm Compliance Webinar
Rajeev (Raj) Rawat
 
Reflections on knowledge management practice case study
Reflections on knowledge management practice    case studyReflections on knowledge management practice    case study
Reflections on knowledge management practice case study
Richard Vines
 

What's hot (19)

Big Data i CSC's optik, CSC Representative
Big Data i CSC's optik, CSC RepresentativeBig Data i CSC's optik, CSC Representative
Big Data i CSC's optik, CSC Representative
 
Coveo
CoveoCoveo
Coveo
 
Future Focus Infotech Brochure
Future Focus Infotech Brochure Future Focus Infotech Brochure
Future Focus Infotech Brochure
 
48 benot-long
48 benot-long48 benot-long
48 benot-long
 
Confluence Adoption: Techniques for Growing Your Wiki
Confluence Adoption: Techniques for Growing Your WikiConfluence Adoption: Techniques for Growing Your Wiki
Confluence Adoption: Techniques for Growing Your Wiki
 
Service Oriented Approach to Application Modernization sept 2010
Service Oriented Approach to Application Modernization sept 2010Service Oriented Approach to Application Modernization sept 2010
Service Oriented Approach to Application Modernization sept 2010
 
Saurabh Gupta Design Portfolio 2002-08
Saurabh Gupta Design Portfolio 2002-08Saurabh Gupta Design Portfolio 2002-08
Saurabh Gupta Design Portfolio 2002-08
 
Sla Model 2002 Jvk
Sla Model 2002 JvkSla Model 2002 Jvk
Sla Model 2002 Jvk
 
Frameworks2go business insights delivered socially
Frameworks2go business insights delivered socially Frameworks2go business insights delivered socially
Frameworks2go business insights delivered socially
 
10 steps to_4_g_service_assurance
10 steps to_4_g_service_assurance10 steps to_4_g_service_assurance
10 steps to_4_g_service_assurance
 
BPO Philippines
BPO PhilippinesBPO Philippines
BPO Philippines
 
20091021 At Crossroads: Internet of Services Research beyond Call 5
20091021 At Crossroads: Internet of Services Research beyond Call 520091021 At Crossroads: Internet of Services Research beyond Call 5
20091021 At Crossroads: Internet of Services Research beyond Call 5
 
4. it governance a compass without a map v.2.6 pink elephant
4. it governance a compass without a map v.2.6   pink elephant4. it governance a compass without a map v.2.6   pink elephant
4. it governance a compass without a map v.2.6 pink elephant
 
IT governance and post merger management
IT governance and post merger managementIT governance and post merger management
IT governance and post merger management
 
Security and interoperability
Security and interoperabilitySecurity and interoperability
Security and interoperability
 
ICC-Education Profile
ICC-Education ProfileICC-Education Profile
ICC-Education Profile
 
20080422 Overview of ICT research in Software & Services
20080422 Overview of ICT research in Software & Services20080422 Overview of ICT research in Software & Services
20080422 Overview of ICT research in Software & Services
 
Rawat Ibm Compliance Webinar
Rawat Ibm Compliance WebinarRawat Ibm Compliance Webinar
Rawat Ibm Compliance Webinar
 
Reflections on knowledge management practice case study
Reflections on knowledge management practice    case studyReflections on knowledge management practice    case study
Reflections on knowledge management practice case study
 

Viewers also liked

Mercantile Coffee House
Mercantile Coffee HouseMercantile Coffee House
Mercantile Coffee House
Ramakrishnan Mohan
 
Data as a service
Data as a service Data as a service
Data as a service
Devyani Vaidya
 
Semantic Mediation Bus: An Ontology-based Runtime Infrastructure for Service ...
Semantic Mediation Bus: An Ontology-based Runtime Infrastructure for Service ...Semantic Mediation Bus: An Ontology-based Runtime Infrastructure for Service ...
Semantic Mediation Bus: An Ontology-based Runtime Infrastructure for Service ...
Wen Zhu
 
Web Services Presentation - Introduction, Vulnerabilities, & Countermeasures
Web Services Presentation - Introduction, Vulnerabilities, & CountermeasuresWeb Services Presentation - Introduction, Vulnerabilities, & Countermeasures
Web Services Presentation - Introduction, Vulnerabilities, & Countermeasures
Praetorian
 
An Architecture for Data Intensive Service Enabled by Next Generation Optical...
An Architecture for Data Intensive Service Enabled by Next Generation Optical...An Architecture for Data Intensive Service Enabled by Next Generation Optical...
An Architecture for Data Intensive Service Enabled by Next Generation Optical...
Tal Lavian Ph.D.
 
2010 ea conf ra track presentation 20100506
2010 ea conf ra track presentation 201005062010 ea conf ra track presentation 20100506
2010 ea conf ra track presentation 20100506
Andy Maes
 
Vassilios Peristeras | Promoting Semantic Interoperability for European Publi...
Vassilios Peristeras | Promoting Semantic Interoperability for European Publi...Vassilios Peristeras | Promoting Semantic Interoperability for European Publi...
Vassilios Peristeras | Promoting Semantic Interoperability for European Publi...
semanticsconference
 
Hans van Bruggen | Semantic interoperability to manage medicinal data and exc...
Hans van Bruggen | Semantic interoperability to manage medicinal data and exc...Hans van Bruggen | Semantic interoperability to manage medicinal data and exc...
Hans van Bruggen | Semantic interoperability to manage medicinal data and exc...
semanticsconference
 

Viewers also liked (8)

Mercantile Coffee House
Mercantile Coffee HouseMercantile Coffee House
Mercantile Coffee House
 
Data as a service
Data as a service Data as a service
Data as a service
 
Semantic Mediation Bus: An Ontology-based Runtime Infrastructure for Service ...
Semantic Mediation Bus: An Ontology-based Runtime Infrastructure for Service ...Semantic Mediation Bus: An Ontology-based Runtime Infrastructure for Service ...
Semantic Mediation Bus: An Ontology-based Runtime Infrastructure for Service ...
 
Web Services Presentation - Introduction, Vulnerabilities, & Countermeasures
Web Services Presentation - Introduction, Vulnerabilities, & CountermeasuresWeb Services Presentation - Introduction, Vulnerabilities, & Countermeasures
Web Services Presentation - Introduction, Vulnerabilities, & Countermeasures
 
An Architecture for Data Intensive Service Enabled by Next Generation Optical...
An Architecture for Data Intensive Service Enabled by Next Generation Optical...An Architecture for Data Intensive Service Enabled by Next Generation Optical...
An Architecture for Data Intensive Service Enabled by Next Generation Optical...
 
2010 ea conf ra track presentation 20100506
2010 ea conf ra track presentation 201005062010 ea conf ra track presentation 20100506
2010 ea conf ra track presentation 20100506
 
Vassilios Peristeras | Promoting Semantic Interoperability for European Publi...
Vassilios Peristeras | Promoting Semantic Interoperability for European Publi...Vassilios Peristeras | Promoting Semantic Interoperability for European Publi...
Vassilios Peristeras | Promoting Semantic Interoperability for European Publi...
 
Hans van Bruggen | Semantic interoperability to manage medicinal data and exc...
Hans van Bruggen | Semantic interoperability to manage medicinal data and exc...Hans van Bruggen | Semantic interoperability to manage medicinal data and exc...
Hans van Bruggen | Semantic interoperability to manage medicinal data and exc...
 

Similar to Interoperability versus Cyber Security/Information Assurance?

SAP EIM
SAP EIM SAP EIM
SmartData - Monetizing Data Assets
SmartData - Monetizing Data AssetsSmartData - Monetizing Data Assets
SmartData - Monetizing Data Assets
Ed Dodds
 
Ibm Java在企业级开发中的应用
Ibm Java在企业级开发中的应用Ibm Java在企业级开发中的应用
Ibm Java在企业级开发中的应用George Ang
 
Qcon java在企业级开发中的应用
Qcon java在企业级开发中的应用Qcon java在企业级开发中的应用
Qcon java在企业级开发中的应用youzitang
 
Thoughts on Utility, Grid, on demand, cloud computing and appliances
Thoughts on Utility, Grid, on demand, cloud computing and appliancesThoughts on Utility, Grid, on demand, cloud computing and appliances
Thoughts on Utility, Grid, on demand, cloud computing and appliances
Mark Cathcart
 
Fussion Middleware
Fussion MiddlewareFussion Middleware
Fussion Middlewaredidemtopuz
 
Business Process Management
Business Process ManagementBusiness Process Management
Business Process Management
IBMGovernmentCA
 
Business Intelligence
Business Intelligence Business Intelligence
Business Intelligence arunvanlvanoor
 
Sybase whats in_your_architecture_wp
Sybase whats in_your_architecture_wpSybase whats in_your_architecture_wp
Sybase whats in_your_architecture_wpSybase Türkiye
 
Asug SAP HANA Presentation - Perceptive Technologies SAP
Asug SAP HANA Presentation - Perceptive Technologies SAPAsug SAP HANA Presentation - Perceptive Technologies SAP
Asug SAP HANA Presentation - Perceptive Technologies SAP
Brendan Kane
 
Service Oriented Application Development Sterpka
Service Oriented Application Development   SterpkaService Oriented Application Development   Sterpka
Service Oriented Application Development Sterpkabsterpka
 
Innovations in Data Grid Technology with Oracle Coherence
Innovations in Data Grid Technology with Oracle CoherenceInnovations in Data Grid Technology with Oracle Coherence
Innovations in Data Grid Technology with Oracle Coherence
Bob Rhubart
 
Unified big data architecture
Unified big data architectureUnified big data architecture
Unified big data architecture
DataWorks Summit
 
Doculabs E Discovery 051710
Doculabs E Discovery 051710Doculabs E Discovery 051710
Doculabs E Discovery 051710Lane Severson
 
Developer and Fusion Middleware 2 _Alex Peattie _ An introduction to Oracle S...
Developer and Fusion Middleware 2 _Alex Peattie _ An introduction to Oracle S...Developer and Fusion Middleware 2 _Alex Peattie _ An introduction to Oracle S...
Developer and Fusion Middleware 2 _Alex Peattie _ An introduction to Oracle S...InSync2011
 
Overview of IBM Capabilities
Overview of IBM CapabilitiesOverview of IBM Capabilities
Overview of IBM Capabilities
IBMGovernmentCA
 
Innovations in Grid Computing with Oracle Coherence
Innovations in Grid Computing with Oracle CoherenceInnovations in Grid Computing with Oracle Coherence
Innovations in Grid Computing with Oracle Coherence
Bob Rhubart
 
Managing the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-PManaging the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-PColloquium
 
Sc World Congress Econference March 2011
Sc World Congress Econference March 2011Sc World Congress Econference March 2011
Sc World Congress Econference March 2011
Neira Jones
 

Similar to Interoperability versus Cyber Security/Information Assurance? (20)

SAP EIM
SAP EIM SAP EIM
SAP EIM
 
SmartData - Monetizing Data Assets
SmartData - Monetizing Data AssetsSmartData - Monetizing Data Assets
SmartData - Monetizing Data Assets
 
Ibm Java在企业级开发中的应用
Ibm Java在企业级开发中的应用Ibm Java在企业级开发中的应用
Ibm Java在企业级开发中的应用
 
Qcon java在企业级开发中的应用
Qcon java在企业级开发中的应用Qcon java在企业级开发中的应用
Qcon java在企业级开发中的应用
 
Thoughts on Utility, Grid, on demand, cloud computing and appliances
Thoughts on Utility, Grid, on demand, cloud computing and appliancesThoughts on Utility, Grid, on demand, cloud computing and appliances
Thoughts on Utility, Grid, on demand, cloud computing and appliances
 
Fussion Middleware
Fussion MiddlewareFussion Middleware
Fussion Middleware
 
Business Process Management
Business Process ManagementBusiness Process Management
Business Process Management
 
Business Intelligence
Business Intelligence Business Intelligence
Business Intelligence
 
Sybase whats in_your_architecture_wp
Sybase whats in_your_architecture_wpSybase whats in_your_architecture_wp
Sybase whats in_your_architecture_wp
 
Asug SAP HANA Presentation - Perceptive Technologies SAP
Asug SAP HANA Presentation - Perceptive Technologies SAPAsug SAP HANA Presentation - Perceptive Technologies SAP
Asug SAP HANA Presentation - Perceptive Technologies SAP
 
Service Oriented Application Development Sterpka
Service Oriented Application Development   SterpkaService Oriented Application Development   Sterpka
Service Oriented Application Development Sterpka
 
Innovations in Data Grid Technology with Oracle Coherence
Innovations in Data Grid Technology with Oracle CoherenceInnovations in Data Grid Technology with Oracle Coherence
Innovations in Data Grid Technology with Oracle Coherence
 
Unified big data architecture
Unified big data architectureUnified big data architecture
Unified big data architecture
 
Doculabs E Discovery 051710
Doculabs E Discovery 051710Doculabs E Discovery 051710
Doculabs E Discovery 051710
 
Developer and Fusion Middleware 2 _Alex Peattie _ An introduction to Oracle S...
Developer and Fusion Middleware 2 _Alex Peattie _ An introduction to Oracle S...Developer and Fusion Middleware 2 _Alex Peattie _ An introduction to Oracle S...
Developer and Fusion Middleware 2 _Alex Peattie _ An introduction to Oracle S...
 
Overview of IBM Capabilities
Overview of IBM CapabilitiesOverview of IBM Capabilities
Overview of IBM Capabilities
 
Innovations in Grid Computing with Oracle Coherence
Innovations in Grid Computing with Oracle CoherenceInnovations in Grid Computing with Oracle Coherence
Innovations in Grid Computing with Oracle Coherence
 
Expanding mission critical ci
Expanding mission critical ciExpanding mission critical ci
Expanding mission critical ci
 
Managing the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-PManaging the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-P
 
Sc World Congress Econference March 2011
Sc World Congress Econference March 2011Sc World Congress Econference March 2011
Sc World Congress Econference March 2011
 

More from GovCloud Network

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmark
GovCloud Network
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for me
GovCloud Network
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
GovCloud Network
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
GovCloud Network
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
GovCloud Network
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture
GovCloud Network
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
GovCloud Network
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
GovCloud Network
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
GovCloud Network
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John Brennan
GovCloud Network
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
GovCloud Network
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview Presentation
GovCloud Network
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
GovCloud Network
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
GovCloud Network
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
GovCloud Network
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
GovCloud Network
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
GovCloud Network
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...GovCloud Network
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)GovCloud Network
 

More from GovCloud Network (20)

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmark
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for me
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John Brennan
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview Presentation
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

Interoperability versus Cyber Security/Information Assurance?

  • 1. Interoperability versus Cyber Security/Information Assurance? Mr. Jack Zavin Advisor Council Member, NCOIC Member Executive Representative, & Vice Chair Net Centric Attributes Functional Team 11 June 2010 Approved for Public Release Distribution Unlimited NCOIC-DefDailyCyber-JZ20100611rev1
  • 2. Net Centric Environment (NCE): Objective, Goals & Description  Objective: All users, whether known or unanticipated, are able to easily discover, access, trust, and use the data/information that supports their business/mission objectives unconstrained by their location or time of day.  Goals: – Evolve & Populate the NCE – Protect & Defend the NCE – Manage & Operate the NCE  The NCE is implemented with evolving balanced & synchronized sets of Process, Organization, People, Information & Materiel (POPIM) Solutions.  Interoperability whether in an NCE or not is more than just the technical exchange of information rather it is composed of evolvable POPIM Solutions Sets. Interoperability must be synergized with Information Assurance to assure obtaining the best of both.
  • 3. Net Centric Environment: Functional Performers Managers/Operators** IA* IA Info Producers/publishers** Information Services IA Providers IA Users/Consumers** Computing Resource Providers IA Information Transport Providers IA • Behavior and relationship characteristics include: Quality of Service; Quality of Protection; Addressing; Tagging of content & roles/Identities; • Information Forms include voice, video, images, text, graphics…. * IA = Information Assurance – protecting & defending the information and information technology. ** Includes Software Applications whether hosted locally or by a computing resource provider.
  • 4. Interoperability Model: A composite of Materiel & Non-materiel solutions Mission/Business Objectives IA Non-Materiel Solutions Harmonized Strategy/Doctrines IA Process, Layers of Interoperability Organization, Aligned Operations IA People Aligned Procedures IA Knowledge/Awareness IA Data, Information Interoperability Information, IA Knowledge Data/Object Model Interoperability IA Network Interoperability Information IA Transport Materiel Solutions Physical Interoperability IA
  • 5. Interoperability Model & End to End Quality of Service (QoS) Mission/Business Objectives IA Organizational Harmonized Strategy/Doctrines Drivers IA Quality of Layers of Interoperability Aligned Operations Operation IA Services Aligned Procedures (QoOS) IA Knowledge/Awareness IA Quality of Information Information Interoperability IA Services (QoIS) Data/Object Model Interoperability IA Quality of Network Interoperability IA Transport Technical Services Drivers Physical Interoperability IA (QoTS)
  • 6. End-to-End Quality of Service End-to-End Quality of Service + = + Q u a l i t y o f O p e r a t i o n Services Quality of Information Services Quality of Transport Services Key Needs: Key Needs: Key Needs: • Mission or business • Discoverability & availability • Network interoperability objectives • Transport interoperability • Physical interoperability • Harmonized strategy or • Data/object model doctrines interoperability Key Metrics: • Aligned operations • Urgency: • Aligned procedures • Transport lag or delay, Key Metrics: jitter, packet loss, packet • Knowledge/awareness of • Urgency: actions by people and errors • Data/topic latency, service • Priority: processes response time, application • Class of service, Key Metrics: timeliness differentiated service, • Urgency: • Priority: precedence, preemption, •Timeliness • Precedence of user guaranteed service • Priority: requests, data, and services • Information Assurance: •Degree of cooperation • Information Assurance (IA) • Data Trust: Availability, • Information Assurance (IA) –Data Trust: integrity & Connectivity (fixed, •Fluidity of response availability, fault tolerance, mobile) •Clarity of understanding accessibility • Security: encryption, •Ubiquity or extent of –Security: data confidentiality, intrusion detection, influence authentication, non- authentication, •Accuracy repudiation authorization, access 6 control
  • 7. The unique values of NCOIC  NCOIC is the only organization dedicated to net centric operations.  NCOIC provides vendor neutral products & services.  NCOIC provides multinational dialog.  NCOIC provides a multi-discipline cadre of experts.
  • 8. Net-Enabled Future Stovepiped Systems, Point-to-Point Networks