Department of Defense (DoD) systems increasingly depend upon complex, interconnected information technology (IT) environments. These environments are inherently vulnerable, providing opportunities for adversaries to compromise systems and negatively impact DoD missions. Potential cyber vulnerabilities, when combined with a determined and capable threat, pose
Topic: DoD Acquisition Lifecycle
A vital aspect of maintaining U.S. technological superiority and military readiness is ensuring cybersecurity of our information technology systems, weapon systems, and networks. Program Managers must assume that the system they field, including their external interfaces, will be under cyber attack. By implementing the practices in the referenced
This issue presents a framework for achieving information dominance across organizations. It also looks at the successful use of M&S throughout the acquisition life cycle in a Department of Defense program. And it discusses challenges M&S analysts face in today's environment of limited time and resources for system development, from beginning to end.
Assigns, reinforces, and prescribes procedures for acquisition responsibilities related to cybersecurity in the Defense Acquisition System
This issue discusses advances in the acquisition of secure systems based on open architectures. It also attempts to quantify productivity in software development projects.