Army installation information infrastructure architecture




















Some of the challenges that are facing Army networks such as electronic commerce and issues associated with malicious code are presented along with potential solutions that are currently being investigated including the use of technologies like e-mail scanning servers and virtual private networks. Key efforts and initiatives undertaken by the 13A Configuration Control Board's Information Assurance Working Group to develop the concepts, policies, and management processes that the Army will need to maintain its IA enabled networks are also included.

Architectures and Technologies for Information Superiority Cat. Article :. DOI: Need Help? The Army is implementing the Clinger-Cohen Act and modernizing the IT infrastructure on its installations worldwide using the unique process established in its I3A. Army I3A captures the existing state of the information infrastructure on an installation and applies a standard technically sound "target architecture model" that fully supports current and projected operational requirements.

Using the information derived from the I3A. Army IT managers can cost the difference between the existing infrastructure and the target architecture model, budget to make up the difference, and plan, program, and integrate IT upgrades and modernization.

The CCB serves as the operational management arm of I3A, carrying out its IT responsibilities to the CIO through its Working Groups to document and control configuration items, assess new technologies, and recommend changes. The Army's I3A is flexible enough to assimilate unexpected changes but provides the necessary structure to implement the Clinger-Cohen Act, and, as such, provides an important IT management model.

Architectures and Technologies for Information Superiority Cat.



0コメント

  • 1000 / 1000