LEADER 03258oam 2200505zu 450 001 9910220093103321 005 20221111181013.0 010 $a0-8330-8348-1 035 $a(CKB)3360000000476952 035 $a(SSID)ssj0001048565 035 $a(PQKBManifestationID)12440336 035 $a(PQKBTitleCode)TC0001048565 035 $a(PQKBWorkID)11014464 035 $a(PQKB)10936173 035 $a(EXLCZ)993360000000476952 100 $a20160829d2012 uy 101 0 $aeng 181 $ctxt 182 $cc 183 $acr 200 10$aRapid acquisition and fielding for information assurance and cyber security in the Navy 210 31$a[Place of publication not identified]$cRAND National Defense Research Institute$d2012 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a0-8330-7855-0 327 $aSummary -- Approach -- Key findings and recommendations from the analysis xiii -- Acknowledgments -- Abbreviations -- Introduction -- Mitigating the cyber threat through rapid acquisition -- Study approach -- Organization of this report -- Testing (certification and accreditation) challenges, best practices -- And recommendations -- Testing in the new IT acquisition strategy -- Navy modernization process challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Budgeting, funding, and contracts challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Governance, integration and training, and emergent needs challenges -- Best practices, and recommendations -- Challenges -- Recommendations -- Summary and conclusions -- Future work -- Appendix A: Survey of RAPID acquisition processes -- Appendix B: Navy RAPID acquisition options -- Appendix C: Case studies of successful RAPID/IT acquisition -- Navy case study: A-RCI -- Army case study: DRRS-A -- Marine Corps case study: Commercial hunter -- Appendix D: JCIDS and incremental acquisition background information -- Exceptions to JCIDS -- Description of "IT box" -- Appendix E: review of cyber and IT acquisition literature -- Legislation -- National research council report -- Defense Science Board report -- Other reports -- Appendix f: Air Force cyber acquisition -- Appendix G: Worms -- Worm attacks are an increasing problem -- Worm attacks require fast and frequent responses. 606 $aComputer networks$xSecurity measures$xPlanning$zUnited States 606 $aComputer networks$xAccess control$zUnited States 606 $aComputer security$zUnited States 606 $aMilitary & Naval Science$2HILCC 606 $aLaw, Politics & Government$2HILCC 606 $aNaval Science - General$2HILCC 615 0$aComputer networks$xSecurity measures$xPlanning 615 0$aComputer networks$xAccess control 615 0$aComputer security 615 7$aMilitary & Naval Science 615 7$aLaw, Politics & Government 615 7$aNaval Science - General 676 $a359.6/212 700 $aPorche$b Isaac$f1968-$0942259 712 02$aRand Corporation 801 0$bPQKB 906 $aBOOK 912 $a9910220093103321 996 $aRapid acquisition and fielding for information assurance and cyber security in the Navy$92962068 997 $aUNINA