90 likes | 212 Views
Interoperability versus Cyber Security/Information Assurance? The “A” Word is important. Mr. Jack Zavin Advisor Council Member NCOIC Member Executive Representative Vice Chair Net Centric Attributes Functional Team 22 September 2010. Approved for Public Release Distribution Unlimited
E N D
Interoperability versus Cyber Security/Information Assurance? The “A” Word is important Mr. Jack Zavin Advisor Council Member NCOIC Member Executive Representative Vice Chair Net Centric Attributes Functional Team 22 September 2010 Approved for Public Release Distribution Unlimited NCOIC-DefDaily-JZ20100917
The “A” Word DoDAF Viewpoints Military Aviation Architecture Security Architecture Enterprise Architecture System Architecture Operational Architecture TOGAF MoDAF NAF Open Architecture Integrated Architecture System of Systems Architecture Technical Architecture
Net Centric Environment (NCE): Objective, Goals & Description • Objective: All users, whether known or unanticipated, are able to easily discover, access, trust, and use the data/information that supports their business/mission objectives unconstrained by their location or time of day. • Goals: • Evolve & Populate the NCE • Protect & Defend the NCE • Manage & Operate the NCE • The NCE is implemented with evolving balanced & synchronized sets of Process, Organization, People, Information & Materiel (POPIM) Solutions. • Interoperability whether in an NCE or not is more than just the technical exchange of information rather it is composed of evolvable POPIM Solutions Sets. Interoperability must be synergized with Information Assurance to assure obtaining the best of both.
Net Centric Environment: Functional Performers Managers/Operators** IA* IA Information Services Providers IA IA Computing Resource Providers Users/Consumers** Info Producers/publishers** IA Information Transport Providers IA • Behavior and relationship characteristics include: Quality of Service; Quality of Protection; Addressing; Tagging of content & roles/Identities; • Information Forms include voice, video, images, text, graphics…. * IA = Information Assurance – protecting & defending the information and information technology. ** Includes Software Applications whether hosted locally or by a computing resource provider.
Interoperability Model:A composite of Materiel & Non-materiel solutions Mission/Business Objectives Non-Materiel Solutions IA Harmonized Strategy/Doctrines IA Process, Organization, People Aligned Operations IA Aligned Procedures IA Knowledge/Awareness Materiel Solutions Layers of Interoperability IA Data, Information, Knowledge Information Interoperability IA Data/Object Model Interoperability IA Network Interoperability IA Information Transport Physical Interoperability IA
Interoperability Model & End to End Quality of Service (QoS) Organizational Drivers Mission/Business Objectives IA Harmonized Strategy/Doctrines Quality of Operation Services (QoOS) IA Aligned Operations IA Aligned Procedures IA Knowledge/Awareness Quality of Information Services (QoIS) Layers of Interoperability Technical Drivers IA Information Interoperability IA Data/Object Model Interoperability IA Network Interoperability Quality of Transport Services (QoTS) IA Physical Interoperability IA
= End-to-End Quality of Service Q u a l i t y o f O p e r a t i o n Services Quality of Information Services Quality of Transport Services + + • Key Needs: • Network interoperability • Physical interoperability • Key Needs: • Discoverability & availability • Transport interoperability • Data/object model interoperability • Key Needs: • Mission or business objectives • Harmonized strategy or doctrines • Aligned operations • Aligned procedures • Knowledge/awareness of actions by people and processes • Key Metrics: • Urgency: • Transport lag or delay, jitter, packet loss, packet errors • Priority: • Class of service, differentiated service, precedence, preemption, guaranteed service • Information Assurance: • Data Trust: Availability, Connectivity (fixed, mobile) • Security: encryption, intrusion detection, authentication, authorization, access control • Key Metrics: • Urgency: • Data/topic latency, service response time, application timeliness • Priority: • Precedence of user requests, data, and services • Information Assurance (IA) • Data Trust: integrity & availability, fault tolerance, accessibility • Security: data confidentiality, authentication, non-repudiation • Key Metrics: • Urgency: • Timeliness • Priority: • Degree of cooperation • Information Assurance (IA) • Fluidity of response • Clarity of understanding • Ubiquity or extent of influence • Accuracy End-to-End Quality of Service
The unique values of NCOIC • NCOIC is the only organization dedicated to net centric operations. • NCOIC provides vendor neutral products & services. • NCOIC provides multinational dialog. • NCOIC provides a multi-discipline cadre of experts.
Net-EnabledFuture Stovepiped Systems, Point-to-PointNetworks