National Academies Press: OpenBook

Information Assurance for Network-Centric Naval Forces (2010)

Chapter: Appendix B: Terms of Reference

« Previous: Appendix A: Acronyms and Abbreviations
Suggested Citation:"Appendix B: Terms of Reference." National Research Council. 2010. Information Assurance for Network-Centric Naval Forces. Washington, DC: The National Academies Press. doi: 10.17226/12609.
×

Appendix B
Terms of Reference

At the request of the Chief of Naval Operations, the Naval Studies Board of the National Academies will conduct a study to examine information assurance for network-centric naval forces. Specifically, the study will:

  • Review the Department of Defense and the Department of the Navy responsibilities for information assurance, to include policies, plans, and manuals, and identify competing and non-competing areas of responsibility between the Departments and within the Department of the Navy, as well as recommend any organizational adaptations which facilitate rapid progress;

  • Review recent information assurance-related studies conducted by and for the Department of Defense and Department of the Navy, and summarize their key recommendations and implementation status;

  • Examine the Department of Defense and Department of Navy research, development, and acquisition process for information assurance, and recommend alternative approaches to the process that allow for greater flexibility and response time in meeting the information assurance requirements of network-centric naval forces;

  • Assess potential information assurance vulnerabilities for network-centric naval forces, to include the “last mile” of information passed to embarked forces, and identify the appropriate technology and operational means to mitigate their vulnerabilities when operating only with U.S. military forces, or coalition forces;

  • Identify methodologies, including experimentation, for dealing with degraded performance and the loss of warfighting system integrity, particularly important to the effectiveness of network-centric naval forces, due to a lack of information assurance;

Suggested Citation:"Appendix B: Terms of Reference." National Research Council. 2010. Information Assurance for Network-Centric Naval Forces. Washington, DC: The National Academies Press. doi: 10.17226/12609.
×
  • Review and recommend information assurance best practices from critical industrial and commercial operations applicable to the Department of Navy and its FORCEnet initiatives;

  • Assess the role of different information architecture constructs, including information assurance approaches, for managing risks (e.g., building specially-protected “sub-nets” to handle particularly sensitive, high consequence information); and

  • Recommend investment analysis approaches, excluding cost as a consideration, for managing cyber attack risks to network-centric naval forces that address the consequences of possible cyber attacks, the likelihoods of these attacks actually occurring, and the uncertainties surrounding assumptions about these risks.

This 12-month study will produce two reports: (1) a letter report following the second full committee meeting that summarizes the key information assurance initiatives underway within the Naval NETWAR/FORCEnet Enterprise and recommends any near-term information assurance needs for network-centric naval forces, to include any defense-related efforts that the naval forces should take advantage of and/or assure compatibility with; and (2) a comprehensive report that addresses the full terms of reference.

Suggested Citation:"Appendix B: Terms of Reference." National Research Council. 2010. Information Assurance for Network-Centric Naval Forces. Washington, DC: The National Academies Press. doi: 10.17226/12609.
×
Page 149
Suggested Citation:"Appendix B: Terms of Reference." National Research Council. 2010. Information Assurance for Network-Centric Naval Forces. Washington, DC: The National Academies Press. doi: 10.17226/12609.
×
Page 150
Next: Appendix C: Biographies of Committee Members »
Information Assurance for Network-Centric Naval Forces Get This Book
×
Buy Paperback | $62.00 Buy Ebook | $49.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Owing to the expansion of network-centric operating concepts across the Department of Defense (DOD) and the growing threat to information and cybersecurity from lone actors, groups of like-minded actors, nation-states, and malicious insiders, information assurance is an area of significant and growing importance and concern. Because of the forward positioning of both the Navy's afloat and the Marine Corps expeditionary forces, IA issues for naval forces are exacerbated, and are tightly linked to operational success. Broad-based IA success is viewed by the NRC's Committee on Information Assurance for Network-Centric Naval Forces as providing a central underpinning to the DOD's network-centric operational concept and the Department of the Navy's (DON's) FORCEnet operational vision. Accordingly, this report provides a view and analysis of information assurance in the context of naval 'mission assurance'.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!