Accession Number:

ADA265473

Title:

System Engineering Concept Demonstration, Security Study. Volume 7

Descriptive Note:

Final rept. Feb 90-Jul 92,

Corporate Author:

SOFTWARE PRODUCTIVITY SOLUTIONS INC INDIALANTIC FL

Personal Author(s):

Report Date:

1992-12-01

Pagination or Media Count:

73.0

Abstract:

The effective implementation of a SECD security program, that insures the proper protection of classified and sensitive information, begins by addressing the subject of security early in the life cycle of the objective system. Security issues that are addressed well into the implementation phase or those that are addressed after the fact, will result in certainty of compromise of the system information. Similarly, investigations of enabling technologies that support system implementation are not only required but should also be initiated early in the system life cycle. The investigations and technology incursions are needed to establish the feasibility and viability of the security measures needed, to provide the required degree of protection. Additionally, in any security implementation program, schedule consideration must be taken into account for the lengthy technology certification times.

Subject Categories:

  • Computer Programming and Software
  • Computer Hardware
  • Computer Systems Management and Standards

Distribution Statement:

APPROVED FOR PUBLIC RELEASE