System Engineering Concept Demonstration, Security Study. Volume 7
Final rept. Feb 90-Jul 92,
SOFTWARE PRODUCTIVITY SOLUTIONS INC INDIALANTIC FL
Pagination or Media Count:
The effective implementation of a SECD security program, that insures the proper protection of classified and sensitive information, begins by addressing the subject of security early in the life cycle of the objective system. Security issues that are addressed well into the implementation phase or those that are addressed after the fact, will result in certainty of compromise of the system information. Similarly, investigations of enabling technologies that support system implementation are not only required but should also be initiated early in the system life cycle. The investigations and technology incursions are needed to establish the feasibility and viability of the security measures needed, to provide the required degree of protection. Additionally, in any security implementation program, schedule consideration must be taken into account for the lengthy technology certification times.
- Computer Programming and Software
- Computer Hardware
- Computer Systems Management and Standards