Security issues in the telecommunications plan for CALS implementation in Korea

Continuous Acquisition and Life-cycle Support (CALS) is an evolving strategy designed to take defense information from its current paper-intensive form to a totally electronic mode of operation by means of information integration and automation. To take full advantage of CALS, it is essential to acc...

Full description

Bibliographic Details
Main Author: Bae, Kichan
Other Authors: Suh, M. W.
Language:en_US
Published: Monterey, California. Naval Postgraduate School 2013
Online Access:http://hdl.handle.net/10945/35105
id ndltd-nps.edu-oai-calhoun.nps.edu-10945-35105
record_format oai_dc
spelling ndltd-nps.edu-oai-calhoun.nps.edu-10945-351052015-08-30T16:00:54Z Security issues in the telecommunications plan for CALS implementation in Korea Bae, Kichan Suh, M. W. Buddenberg, R. Information Technology Management Continuous Acquisition and Life-cycle Support (CALS) is an evolving strategy designed to take defense information from its current paper-intensive form to a totally electronic mode of operation by means of information integration and automation. To take full advantage of CALS, it is essential to accommodate distributed CALS computer networks, and to enable the interconnection of selected heterogeneous components in the networks However, as CALS telecommunications deals with multi-level security data, it is critical to incorporate adequate security plans into the telecommunication plan. This thesis analyzes the requirements for a secure telecommunications plan that includes telecommunications standards and protocols, data exchange protocols, transmission media, and methods of network security necessary to implement CALS in the Korea defense environment. Literature reviews and expert interviews are used to support findings and conclusions. To accomplish a fully digitized CALS environment, the author concludes that proper data protection standards and methods must be provided and tested as part of the overall CALS telecommunications architecture. Enabling technology and a responsive management infrastructure must be in place to ensure successful implementation of CALS. The decision to select mechanisms should be made based on the comparison between security and integrity, in terms of efficiency, effectiveness, and availability. (AN) 2013-08-13T22:06:33Z 2013-08-13T22:06:33Z 1995-09 Thesis http://hdl.handle.net/10945/35105 en_US This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted. Monterey, California. Naval Postgraduate School
collection NDLTD
language en_US
sources NDLTD
description Continuous Acquisition and Life-cycle Support (CALS) is an evolving strategy designed to take defense information from its current paper-intensive form to a totally electronic mode of operation by means of information integration and automation. To take full advantage of CALS, it is essential to accommodate distributed CALS computer networks, and to enable the interconnection of selected heterogeneous components in the networks However, as CALS telecommunications deals with multi-level security data, it is critical to incorporate adequate security plans into the telecommunication plan. This thesis analyzes the requirements for a secure telecommunications plan that includes telecommunications standards and protocols, data exchange protocols, transmission media, and methods of network security necessary to implement CALS in the Korea defense environment. Literature reviews and expert interviews are used to support findings and conclusions. To accomplish a fully digitized CALS environment, the author concludes that proper data protection standards and methods must be provided and tested as part of the overall CALS telecommunications architecture. Enabling technology and a responsive management infrastructure must be in place to ensure successful implementation of CALS. The decision to select mechanisms should be made based on the comparison between security and integrity, in terms of efficiency, effectiveness, and availability. (AN)
author2 Suh, M. W.
author_facet Suh, M. W.
Bae, Kichan
author Bae, Kichan
spellingShingle Bae, Kichan
Security issues in the telecommunications plan for CALS implementation in Korea
author_sort Bae, Kichan
title Security issues in the telecommunications plan for CALS implementation in Korea
title_short Security issues in the telecommunications plan for CALS implementation in Korea
title_full Security issues in the telecommunications plan for CALS implementation in Korea
title_fullStr Security issues in the telecommunications plan for CALS implementation in Korea
title_full_unstemmed Security issues in the telecommunications plan for CALS implementation in Korea
title_sort security issues in the telecommunications plan for cals implementation in korea
publisher Monterey, California. Naval Postgraduate School
publishDate 2013
url http://hdl.handle.net/10945/35105
work_keys_str_mv AT baekichan securityissuesinthetelecommunicationsplanforcalsimplementationinkorea
_version_ 1716817646740045824