[iwar] [fc:Pentagon.OKs.new.info.grid]

From: Fred Cohen (fc@all.net)
Date: 2001-10-23 08:13:48


Return-Path: <sentto-279987-3311-1003850007-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 23 Oct 2001 08:15:08 -0700 (PDT)
Received: (qmail 19766 invoked by uid 510); 23 Oct 2001 15:12:56 -0000
Received: from n18.groups.yahoo.com (216.115.96.68) by 204.181.12.215 with SMTP; 23 Oct 2001 15:12:56 -0000
X-eGroups-Return: sentto-279987-3311-1003850007-fc=all.net@returns.onelist.com
Received: from [10.1.4.53] by n18.groups.yahoo.com with NNFMP; 23 Oct 2001 15:13:29 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 23 Oct 2001 15:13:27 -0000
Received: (qmail 90440 invoked from network); 23 Oct 2001 15:13:26 -0000
Received: from unknown (10.1.10.26) by l7.egroups.com with QMQP; 23 Oct 2001 15:13:26 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta1 with SMTP; 23 Oct 2001 15:13:26 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9NFDmN21108 for iwar@onelist.com; Tue, 23 Oct 2001 08:13:48 -0700
Message-Id: <200110231513.f9NFDmN21108@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 23 Oct 2001 08:13:48 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Pentagon.OKs.new.info.grid]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Pentagon OKs new info grid

By Christopher J. Dorobek, Federal Computer Week, 10/23/2001
<a href="http://www.fcw.com/fcw/articles/2001/1001/pol-grid-10-01-01.asp">http://www.fcw.com/fcw/articles/2001/1001/pol-grid-10-01-01.asp>

As network-centric operations take pre-eminence within the Defense
Department, Pentagon officials have approved its first enterprise
architecture, the Global Information Grid, aimed at improving
inter.operability across the organization. 

GIG has been in development for several years and replaces the
inadequate and outdated Defense Information Infrastructure (DII),
created in the early 1990s.  GIG is designed to provide DOD with a
working framework for moving to network-centric operations. 

The GIG architecture Version 1.0, as this edition is called, will
provide data to military forces around the world, from regional
commanders to soldiers on the front lines. 

The overall goal is to provide the warfighter with the right information
at the right time in the right form and have it be assured and secure,
said John Osterholz, director of architecture and interoperability for
the DOD chief information officer's office. 

"This is something that we've never really had before," said Margaret
Myers, the Pentagon's acting deputy CIO. 

"We really didn't think the [DII's] paradigm and what it represented
would get us to where we needed to be," Osterholz said.  "We needed
something different. 

"Interoperability was not something that was addressed particularly as a
mainstream element of DII," he said.  "With the network-centric
operations, interoperability becomes a more critical issue for us."

The interoperability policy was more than 10 years old, and in DOD's
communication policies, the word "network" never appeared, Osterholz
said. 

DOD is even looking at the Navy Marine Corps Intranet, the Navy's $6.9
billion effort to outsource its network infrastructure to a single
vendor, as a good test case under the GIG architecture, said Bill
Curtis, director of the DOD CIO's investment and acquisition
directorate. 

GIG also changes how DOD views information security.  GIG moves the
military away from its traditional information technology security
stance of "Defense In Depth," which sought to provide multiple
protections from all attacks. 

"That's really a paradigm that no longer applies," Osterholz said,
explaining that the threats come from so many directions now that it's
difficult to decide where an organization is going to apply its depth. 

Furthermore, threats can come from many different directions even within
an organization, he noted. 

DII looked at security as an add-on, Osterholz said, "an important
add-on, but an add-on." GIG makes security central to any system. 

The GIG architecture recognizes the fact that DOD will be dealing with
intrusions every day, but reacts more biologically, he said.  "I've got
an infection every day, and I've got to control it rather than keeping
everything out," he said. 

GIG includes an operational view, which DOD officials said describes and
connects the operational elements, information flows and tasks and
activities required to accomplish mission and business operations.  But
GIG also maintains the system view, which is a more classic enterprise
architecture framework and describes and associates the systems and how
they interconnect to the operational view and its requirements. 

The document detailing GIG is not available to the public.  It is
available within DOD, however, on a CD-ROM that includes thousands of
pages of detail. 

Officials expect to update GIG annually, Osterholz said. 

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide!
http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:56 PST