Information Technology

Information Technology

DoD Information Technology Portfolio Repository

DoD Information Technology (IT) Portfolio Repository (DITPR) contains a comprehensive unclassified inventory of the DoD’s mission-critical and mission-essential Information technology systems and their interfaces. It contains basic overview information regarding all DoD IT systems, including;  system names, acronyms, descriptions, sponsoring components, approval authority, points of contact, and other basic information required to analyze DoD inventory, portfolios, […]

Information Technology

DoD Information Technology Portfolio Repository Read More »

Information Technology

DoD Information Enterprise Architecture

  The Defense Information Enterprise Architecture (DIEA) provides a common foundation to support the Department of Defense (DoD) transformation to net-centric operations and establishes priorities to address critical barriers to its realization. It comprises the information, information resources, assets, and processes required to achieve an information advantage and share information across the DoD and mission

Information Technology

DoD Information Enterprise Architecture Read More »

Information Technology

DoD Information Assurance Certification and Accreditation Process (DIACAP) (Replaced)

Note: The DIACAP process has been replaced by the Risk Management Framework (RMF) for DoD Information Technology. (Replaced) The DoD Information Assurance Certification and Accreditation Process (DIACAP) is the Department of Defense (DoD) process to ensure that risk management is applied on information systems (IS). DIACAP defines a DoD-wide formal and standard set of activities,

Information Technology

DoD Information Assurance Certification and Accreditation Process (DIACAP) (Replaced) Read More »

Information Technology

DoD Information Sharing Strategy

The DoD Information Sharing Strategy provides a common vision to synchronize information sharing initiatives and investments throughout the Department of Defense (DoD). Sharing of information is an increasingly important element of mission success. It is imperative to effectively exchange information among components, Federal agencies, coalition partners, foreign governments, and international organizations as a critical element

Information Technology

DoD Information Sharing Strategy Read More »

Information Technology

Defense Information System Agency (DISA)

  The Defense Information System Agency (DISA) is a Combat Support Agency comprised of military, federal civilian, and our contractor partners. DISA provides the network, computing infrastructure, and enterprise services to support information sharing and decision making within the DoD and federal agencies. The mission of DISA is to provide command and control capabilities and

Information Technology

Defense Information System Agency (DISA) Read More »

Information Technology

DoD Enterprise Software Initiative

The DoD Enterprise Software Initiative (ESI) is a contract mechanism that establishes and manages Commercial-Off-The-Shelf (COTS) Information Technology (IT) agreements, assets, and policies for the purpose of lowering the total cost of ownership across the DoD, Coast Guard, and Intelligence communities. DoD ESI’s mission extends across the entire commercial IT life-cycle combining the DoD’s buying

Information Technology

DoD Enterprise Software Initiative Read More »

Information Technology

Cyberspace

Cyberspace is the global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. Among many other things, cyberspace enables users to conduct business, communicate, socialize, connect, exchange ideas, play games, participate in social forums, and share information. Cyberspace

Information Technology

Cyberspace Read More »

Information Technology

Defense Business Systems (DBS)

Note: Canceled: DoD Instruction 5000.02, “Operation of the Defense Acquisition System,” Enclosure 12 and replaced by the Business Capability Acquisition Cycle (BCAS) A Defense Business Systems (DBS) are an information system, other than a national security system (NSS), operated by, for, or on behalf of DoD, including financial systems, mixed systems, financial feeder systems, and Information Technology (IT)

Information Technology

Defense Business Systems (DBS) Read More »

Information Technology

Clinger-Cohen Act (CCA) of 1996 – What is it?

The Clinger-Cohen Act (CCA) of 1996 is designed to improve how the federal government acquires, uses, and disposes of Information Technology (IT). It encompasses the (1) Information Technology Management Reform Act (ITMRA) (Division E) and the (2) Federal Acquisition Reform Act (FARA) (Division D), which were signed into law as part of the National Defense

Information Technology

Clinger-Cohen Act (CCA) of 1996 – What is it? Read More »

Information Technology

Configuration Management Information System (CMIS)

The DoD Configuration Management Information System (CMIS) supports the configuration, engineering, and technical data management functions of the Department of Defense (DoD) community with a standard Web-Based Automated Information System (AIS). The primary objective of CMIS is to provide the DoD community with a standard AIS to support CM activities. The CM activities supported are:

Information Technology

Configuration Management Information System (CMIS) Read More »

Information Technology

Acquisition Information Assurance Strategy

The Acquisition Information Assurance (IA) Strategy provides documentation that ensures that the program has an information assurance strategy that is consistent with DoD policies, standards, and architectures, to include relevant standards. The Program Manager (PM) develops the Acquisition IA Strategy to help the program office organize and coordinate its approach to identifying and satisfying IA

Information Technology

Acquisition Information Assurance Strategy Read More »

Information Technology

Information Support Plan (ISP)

An Information Support Plan (ISP) describes a systems dependencies and interface requirements in sufficient detail to enable testing and verification of Information Technology (IT) and National Security Systems (NSS) interoperability and supportability requirements. The ISP is required for all Acquisition Category (ACAT) programs that connects in any way to the communications and information infrastructure including

Information Technology

Information Support Plan (ISP) Read More »

Information Technology

DoD Information Enterprise

The Department of Defense (DoD) Information Enterprise (IE) is an organizing construct that consists of DoD information assets, processes, activities, and resources required to achieve an information advantage and share information across the DoD. The construct is envisioned to help the DoD move to trusted network-centric operations through the acquisition of services and systems that

Information Technology

DoD Information Enterprise Read More »

Information Technology

System Security Engineer

A System Security Engineer (SSE) is the individual responsible for ensuring an acquisition program adheres to system security standards that are appointed by the Program Manager (PM) thru System Security Engineering. They ensure system security requirements are identified and included in all program documents and requirements are implemented throughout the systems engineering process. They also

Information Technology

System Security Engineer Read More »

Information Technology

Information Operations (IO)

Information Operations (IO) involve actions taken to affect adversary information and information systems while defending one’s own information and information systems. They apply across all phases of an operation, the range of military operations, and at every level of war. They are a critical factor in the Joint Force Commander’s (JFC’s) capability to achieve and

Information Technology

Information Operations (IO) Read More »

Information Technology

Cybersecurity

Cybersecurity falls under Information Operations (IO) and is used to protect and defend information and information systems. It’s the practice of keeping digital attacks from taking down important systems and sensitive information. They are meant to protect networked systems and applications from threats from inside or outside an organization. Definition: “Prevention of damage to, protection of,

Information Technology

Cybersecurity Read More »

Information Technology

Cybersecurity

Computer Security (Cybersecurity) is the protection of computer equipment from theft, hacking, natural disaster, tampering and corruption. The goal is to keep computer system running without interference from unauthorized sources. In the DoD, computer security is the responsibility of the security and Information Assurance (IA) department along with the user. DoD Computer Security Definition [1]

Information Technology

Cybersecurity Read More »

Information Technology

Data Management Strategy

The Data Management Strategy (including 10 USC 2320, DFARS part 227, Data Rights)  should describe the measures taken to acquire complete technical data packages to ensure competition. This should include describing the disciplined processes and systems that will be used to plan for, acquire, and/or access, manage, and use data throughout the life cycle, concentrating

Information Technology

Data Management Strategy Read More »

Information Technology

Major Automated Information System

A Major Automated Information System (MAIS) is a defense acquisition program for an Automated Information System (AIS) that meets Acquisition Category (ACAT) IA requirements listed below.  An AIS is a system of computer hardware, computer software, data, and/or telecommunications that performs functions such as collecting, processing, storing, transmitting, and displaying information. A MAIS is determined

Information Technology

Major Automated Information System Read More »

Information Technology

Information Technology Overview

Information Technology (IT) is the use of computers and software to manage information. It’s the career discipline responsible for storing information, protecting information, processing the information, transmitting the information as necessary, and later retrieving information as necessary. In the DoD, IT is responsible for Information Operations (IO), Cybersecurity, Information Superiority, and Interoperability (Net-Centric Operations). In

Information Technology

Information Technology Overview Read More »