Return-Path: <sentto-279987-3311-1003850007-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 23 Oct 2001 08:15:08 -0700 (PDT) Received: (qmail 19766 invoked by uid 510); 23 Oct 2001 15:12:56 -0000 Received: from n18.groups.yahoo.com (216.115.96.68) by 204.181.12.215 with SMTP; 23 Oct 2001 15:12:56 -0000 X-eGroups-Return: sentto-279987-3311-1003850007-fc=all.net@returns.onelist.com Received: from [10.1.4.53] by n18.groups.yahoo.com with NNFMP; 23 Oct 2001 15:13:29 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 23 Oct 2001 15:13:27 -0000 Received: (qmail 90440 invoked from network); 23 Oct 2001 15:13:26 -0000 Received: from unknown (10.1.10.26) by l7.egroups.com with QMQP; 23 Oct 2001 15:13:26 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta1 with SMTP; 23 Oct 2001 15:13:26 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9NFDmN21108 for iwar@onelist.com; Tue, 23 Oct 2001 08:13:48 -0700 Message-Id: <200110231513.f9NFDmN21108@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 23 Oct 2001 08:13:48 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Pentagon.OKs.new.info.grid] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Pentagon OKs new info grid By Christopher J. Dorobek, Federal Computer Week, 10/23/2001 <a href="http://www.fcw.com/fcw/articles/2001/1001/pol-grid-10-01-01.asp">http://www.fcw.com/fcw/articles/2001/1001/pol-grid-10-01-01.asp> As network-centric operations take pre-eminence within the Defense Department, Pentagon officials have approved its first enterprise architecture, the Global Information Grid, aimed at improving inter.operability across the organization. GIG has been in development for several years and replaces the inadequate and outdated Defense Information Infrastructure (DII), created in the early 1990s. GIG is designed to provide DOD with a working framework for moving to network-centric operations. The GIG architecture Version 1.0, as this edition is called, will provide data to military forces around the world, from regional commanders to soldiers on the front lines. The overall goal is to provide the warfighter with the right information at the right time in the right form and have it be assured and secure, said John Osterholz, director of architecture and interoperability for the DOD chief information officer's office. "This is something that we've never really had before," said Margaret Myers, the Pentagon's acting deputy CIO. "We really didn't think the [DII's] paradigm and what it represented would get us to where we needed to be," Osterholz said. "We needed something different. "Interoperability was not something that was addressed particularly as a mainstream element of DII," he said. "With the network-centric operations, interoperability becomes a more critical issue for us." The interoperability policy was more than 10 years old, and in DOD's communication policies, the word "network" never appeared, Osterholz said. DOD is even looking at the Navy Marine Corps Intranet, the Navy's $6.9 billion effort to outsource its network infrastructure to a single vendor, as a good test case under the GIG architecture, said Bill Curtis, director of the DOD CIO's investment and acquisition directorate. GIG also changes how DOD views information security. GIG moves the military away from its traditional information technology security stance of "Defense In Depth," which sought to provide multiple protections from all attacks. "That's really a paradigm that no longer applies," Osterholz said, explaining that the threats come from so many directions now that it's difficult to decide where an organization is going to apply its depth. Furthermore, threats can come from many different directions even within an organization, he noted. DII looked at security as an add-on, Osterholz said, "an important add-on, but an add-on." GIG makes security central to any system. The GIG architecture recognizes the fact that DOD will be dealing with intrusions every day, but reacts more biologically, he said. "I've got an infection every day, and I've got to control it rather than keeping everything out," he said. GIG includes an operational view, which DOD officials said describes and connects the operational elements, information flows and tasks and activities required to accomplish mission and business operations. But GIG also maintains the system view, which is a more classic enterprise architecture framework and describes and associates the systems and how they interconnect to the operational view and its requirements. The document detailing GIG is not available to the public. It is available within DOD, however, on a CD-ROM that includes thousands of pages of detail. Officials expect to update GIG annually, Osterholz said. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide! http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:56 PST