首页> 美国政府科技报告 >Implementation of DoD Information Security Policy for Processing Accomplished at Defense Enterprise Computing Centers
【24h】

Implementation of DoD Information Security Policy for Processing Accomplished at Defense Enterprise Computing Centers

机译:在国防企业计算中心实施国防部信息安全政策

获取原文

摘要

Public Law 106-398, 'Government Information Security Reform', title X, subtitle G, FY 2001 Floyd D. Spence National Defense Authorization Act, requires that each agency obtain an independent assessment of its security posture. The Inspector General of each agency is to evaluate the agency's security posture based on a review of an independently selected subset of systems. The DoD uses information technology for thousands of processes that are integral to support and operational functions. Mission-critical, mission- essential, and support- function processes, or applications, reside on computer systems in Defense Enterprise Computing Centers and Detachments, which are part of the Defense Information Systems Agency. Customer applications from all DoD components include financial accounting; personnel; pay and disbursement; materiel shipping, receiving, and storing; munitions maintenance; and weapon-systems-associated applications.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号