Mr' John Osterholz - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

Mr' John Osterholz

Description:

Provides retention, organization, visualization, information assurance or ... Collocate and integrate network, system control with IA. Nature. Focus Area. Material ... – PowerPoint PPT presentation

Number of Views:29
Avg rating:3.0/5.0
Slides: 17
Provided by: OUS187
Category:

less

Transcript and Presenter's Notes

Title: Mr' John Osterholz


1
Data and Information - You can run but you cant
hide
Mr. John Osterholz Director Architecture
Interoperability Office of the DoD CIO and
ASD(C3I)
2
The Global Information Grid
Information Technology including National
Security Systems
Its part of the GIG if it ...
Transmits information to, receives information
from, routes information among or interchanges
information among other equipment, software and
services Provides retention, organization,
visualization, information assurance or
disposition of data, information and/or knowledge
received from or transmitted to other equipment,
software and services Processes data or
information for use by other equipment, software
and services
3
The Importance of Information
Suppliers
Communities of Interest
Network Centric Operations
  • Merged Service Providers
  • Trans National Enterprises

Policy Makers
  • Increasingly Joint AND Combined
  • Increasingly Cross Functional
  • Increasingly Data Centric
  • Increasingly Just in Time
  • Increasingly collaborative
  • Unique dependence on imagery
  • Increasingly distributed geospatially
  • Cost Is An Independent Variable
  • Clinger-Cohen Act (ITMRA)
  • 10 USC (1999)
  • Emerging Congressional Guidance

New Entrants
Technologies
Threats
  • Wavelength Division Multiplexing
  • Unattended Aerial Vehicles (UAV)
  • Public Key Infrastructure (PKI)
  • Processor and Storage technologies
  • Object Oriented Software
  • IT Outsource/Seat Management
  • Functional Service Providers
  • Insider-outsider threat
  • Trans National Organizations
  • State Sponsored Organizations
  • WMD threats (chem/bio)

Red typeface denotes significant enterprise data
impact
4
Information is Different
  • Develop Once - Use Many Times - and
    Simultaneously
  • Value is Not Created Until the End of the Last
    Mile
  • A Vulnerability Created by One is a Vulnerability
    Imposed upon Many
  • A Deficiency Created by One is a Deficiency for
    Many

Value Enhancers Value
Detractors
Lack of Interoperability and Disconnects Delays
Disruptions and Lack of Reliability Compromise St
ovepiped Information The Chaff and Overload Poor
Quality
Sharing Timeliness Assured Availability Security
and Confidence Context and Fusion The
Wheat Accuracy and Completeness
Enterprise Solutions Can Create and Protect Value
5
Joint Information Exchange Requirements
Joint Mission Area
GIG Architecture V1.0
Joint Information Requirements are tied to
operations processes
6
GIG, Information The Warfighter
Situational Awareness
The right information At the right time In
the right form to the right Warfighter
CONTEXT
7
Information A Simple Definition
INFORMATION IS DATA ELEVATED BY CONTEXT
8
Data Architecturefor the Global Information Grid
Enabled by Technology and Paced by Sociology
9
Data Management for the GIG
Community of Interest Governance
DoD CIO Governance
Dominant Maneuver Deployment/Redeployment Precisi
on Engagement Strategic Deterrence Overseas
Presence and Force Projection

Special Operations Joint Command and Control
Information Superiority Focused Logistics Full
Dimensional Protection Multinational Ops and
Interagency Coordination
COI
COI
  • Enterprise Data
  • Adjudication of cross COI issues

COI
COI
Joint Mission Areas1
Enterprise Data
COI
COI
COI
COI
1 Approved by Chairman/JCS 6 Sep 2000
10
The Peril -Increasing Vulnerabilities
Information characteristics
Social Structure
Localized info sources Minimally
interconnected Life at a tactical level Tradition
supplements focus
Tribal
Minimal
Societal
Regionalized info sources Moderately
interconnected Moderately large bureaucracies Can
focus resources with difficulty Limited but
identifiable objectives
Importance of Information to decision making
Moderate
Global
Transnational info sources Highly
interconnected Multiple bureaucracies Able to
focus significant resources Multiple competing
objectives
Significant
We may be more vulnerable than we are threatening
11
GIG Threat Baseline
Kinetic Threat to Data Center FacilitiesChemica
l/Biological Threat to Data Center
Personnel Information Threat to Networks and
Computing Systems
Covertly emplaced explosivesProjectile delivered
explosives
Aerosol delivered persistent chemical/biological
agents Insider delivered biological agent
Disclosure of operations/business
details Deception causing loss of confidence in a
system Denial of system resources to support an
operation/business Usurpation of system
resources for criminal purposes
The Global Information Grid operates in a
multi-threat environment
12
Enterprise Information Threats
Enterprise Operations Threats
Disclosure Deception Denial
Usurpation
Exposure Interception Inference Intrusion
Incapacitation Corruption Obstruction
Misappropriation Misuse
Masquerade Falsification Repudiation
Service provider focus
functional process focus
Many of these threats can be mitigated by
an Enterprise approach to Information Assurance
13
PKI - Necessary But Not Sufficient
14
A More Comprehensive Solution Is Needed
15
NetOps Is Becoming Commercial Best Practice
16
Wrap Up
  • Information Management is a vital aspect of the
    GIG
  • Information is data elevated by context
  • The DoD CIO is pursuing a Community of Interest
    approach to data management
  • Assurance that critical data bases will be
    available to the warfighter requires an
    Enterprise approach
  • NetOps is the Enterprise approach
Write a Comment
User Comments (0)
About PowerShow.com