Presentation is loading. Please wait.

Presentation is loading. Please wait.

Trade-offs to establish an integrated, comprehensive protection scheme

Similar presentations


Presentation on theme: "Trade-offs to establish an integrated, comprehensive protection scheme"— Presentation transcript:

1 Trade-offs to establish an integrated, comprehensive protection scheme
Figure 1: Program Protection Focus Areas Information Technology Components What to Protect : Information on the system and about the program How to Protect: Classification Export Controls Information Security RMF for DoD IT Goal: Ensure key system and program data are protected from adversary collection What to Protect: A capability element that contributes to the warfighters’ technical advantage (CPI) How to Protect: Anti-Tamper Exportability Features Goal: Prevent the compromise and loss of CPI What to Protect : Mission-critical functions and components How to Protect: Software Assurance Hardware Assurance/Trusted Microelectronics Supply Chain Risk Management Anti-Counterfeits Goal: Protect key mission-critical components from malicious activity Trade-offs to establish an integrated, comprehensive protection scheme


Download ppt "Trade-offs to establish an integrated, comprehensive protection scheme"

Similar presentations


Ads by Google