Security issues in the telecommunications plan for CALS implementation in Korea
Continuous Acquisition and Life-cycle Support (CALS) is an evolving strategy designed to take defense information from its current paper-intensive form to a totally electronic mode of operation by means of information integration and automation. To take full advantage of CALS, it is essential to acc...
Main Author: | |
---|---|
Other Authors: | |
Language: | en_US |
Published: |
Monterey, California. Naval Postgraduate School
2013
|
Online Access: | http://hdl.handle.net/10945/35105 |
id |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-35105 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-351052015-08-30T16:00:54Z Security issues in the telecommunications plan for CALS implementation in Korea Bae, Kichan Suh, M. W. Buddenberg, R. Information Technology Management Continuous Acquisition and Life-cycle Support (CALS) is an evolving strategy designed to take defense information from its current paper-intensive form to a totally electronic mode of operation by means of information integration and automation. To take full advantage of CALS, it is essential to accommodate distributed CALS computer networks, and to enable the interconnection of selected heterogeneous components in the networks However, as CALS telecommunications deals with multi-level security data, it is critical to incorporate adequate security plans into the telecommunication plan. This thesis analyzes the requirements for a secure telecommunications plan that includes telecommunications standards and protocols, data exchange protocols, transmission media, and methods of network security necessary to implement CALS in the Korea defense environment. Literature reviews and expert interviews are used to support findings and conclusions. To accomplish a fully digitized CALS environment, the author concludes that proper data protection standards and methods must be provided and tested as part of the overall CALS telecommunications architecture. Enabling technology and a responsive management infrastructure must be in place to ensure successful implementation of CALS. The decision to select mechanisms should be made based on the comparison between security and integrity, in terms of efficiency, effectiveness, and availability. (AN) 2013-08-13T22:06:33Z 2013-08-13T22:06:33Z 1995-09 Thesis http://hdl.handle.net/10945/35105 en_US This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted. Monterey, California. Naval Postgraduate School |
collection |
NDLTD |
language |
en_US |
sources |
NDLTD |
description |
Continuous Acquisition and Life-cycle Support (CALS) is an evolving strategy designed to take defense information from its current paper-intensive form to a totally electronic mode of operation by means of information integration and automation. To take full advantage of CALS, it is essential to accommodate distributed CALS computer networks, and to enable the interconnection of selected heterogeneous components in the networks However, as CALS telecommunications deals with multi-level security data, it is critical to incorporate adequate security plans into the telecommunication plan. This thesis analyzes the requirements for a secure telecommunications plan that includes telecommunications standards and protocols, data exchange protocols, transmission media, and methods of network security necessary to implement CALS in the Korea defense environment. Literature reviews and expert interviews are used to support findings and conclusions. To accomplish a fully digitized CALS environment, the author concludes that proper data protection standards and methods must be provided and tested as part of the overall CALS telecommunications architecture. Enabling technology and a responsive management infrastructure must be in place to ensure successful implementation of CALS. The decision to select mechanisms should be made based on the comparison between security and integrity, in terms of efficiency, effectiveness, and availability. (AN) |
author2 |
Suh, M. W. |
author_facet |
Suh, M. W. Bae, Kichan |
author |
Bae, Kichan |
spellingShingle |
Bae, Kichan Security issues in the telecommunications plan for CALS implementation in Korea |
author_sort |
Bae, Kichan |
title |
Security issues in the telecommunications plan for CALS implementation in Korea |
title_short |
Security issues in the telecommunications plan for CALS implementation in Korea |
title_full |
Security issues in the telecommunications plan for CALS implementation in Korea |
title_fullStr |
Security issues in the telecommunications plan for CALS implementation in Korea |
title_full_unstemmed |
Security issues in the telecommunications plan for CALS implementation in Korea |
title_sort |
security issues in the telecommunications plan for cals implementation in korea |
publisher |
Monterey, California. Naval Postgraduate School |
publishDate |
2013 |
url |
http://hdl.handle.net/10945/35105 |
work_keys_str_mv |
AT baekichan securityissuesinthetelecommunicationsplanforcalsimplementationinkorea |
_version_ |
1716817646740045824 |