Skip to main content

Active Automation of the DITSCAP

  • Conference paper
Intelligence and Security Informatics (ISI 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3495))

Included in the following conference series:

  • 4020 Accesses

Abstract

The Defense Information Infrastructure (DII) connects Department of Defense (DoD) mission support, command and control, and intelligence computers and users through voice, data, imagery, video, and multimedia services, and provides information processing and value-added services. For such a critical infrastructure to effectively mitigate risk, optimize its security posture and evaluate its information assurance practices, we identify the need for a structured and comprehensive certification and accreditation (C&A) framework with appropriate tool support. In this paper, we present an active approach to provide effective tool support that automates the DoD Information Technology Security C&A Process (DITSCAP) for information networks in the DII.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Committee on National Security Systems (CNSS) Instruction No. 4009.: National Information Assurance (IA) Glossary (2003)

    Google Scholar 

  2. DoD 8510.1-M: DITSCAP Application Manual (2000)

    Google Scholar 

  3. DoD Instruction 5200.40.: DITSCAP (1997)

    Google Scholar 

  4. Kotonya, G., Sommerville, I.: Requirements Engineering with Viewpoints. BCS/IEEE Software Engineering Journal 11(1), 5–18 (1996)

    Article  Google Scholar 

  5. Lee, S.W., Rine D.C.: Missing Requirements and Relationship Discovery through Proxy Viewpoints Model. Studia Informatica Universalis: International Journal on Informatics (December 2004)

    Google Scholar 

  6. Lee, S.W., Yavagal, D.: GenOM User’s Guide. Technical Report: Dept. of Software and Information Systems, UNC Charlotte (2004)

    Google Scholar 

  7. Lee, S.W., Ahn, G., Gandhi, R.A.: Engineering Information Assurance for Critical Infrastructures: The DITSCAP Automation Study. To apprear in: Proceedings of the Fifteenth Annual International Symposium of the International Council on Systems Engineering (INCOSE 2005), Rochester, New York (July 2005)

    Google Scholar 

  8. Swanson, M., Nadya, B., Sabato, J., Hash, J., Graffo, L.: Security Metrics Guide for information Technology Systems. NIST #800-55 (2003)

    Google Scholar 

  9. Swanson, M.: Security Self-Assessment Guide for Information Technology Systems. NIST #800-26 (2001)

    Google Scholar 

  10. Swartout, W., Tate, A.: Ontologies. IEEE Intelligent Systems 14(1) (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, S.W., Gandhi, R.A., Ahn, GJ., Yavagal, D.S. (2005). Active Automation of the DITSCAP. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_46

Download citation

  • DOI: https://doi.org/10.1007/11427995_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25999-2

  • Online ISBN: 978-3-540-32063-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics