Navigating around the IA Policy Chart: Essentially, the Chart is designed around the four CIIA goals [1) Operate 2) Enable 3) Anticipate and 4) Prepare]: 1) Organize for unity of purpose and speed of action (shortened to "Organize" in the chart). 2) Enable secure mission driven access to information and services (shortened to "Enable" in the chart). 3) Anticipate and prevent successful attacks on data and networks (shortened to "Anticipate" in the chart). 4) Prepare for and operate through cyber degradation or attack (shortened to "Prepare" in the chart). These four goal areas are subdivided into activities supporting each goal.

AttributesValues
rdfs:label
  • Department of Defense Information Assurance Policy Chart (DoD IA Policy Chart)
rdfs:comment
  • Navigating around the IA Policy Chart: Essentially, the Chart is designed around the four CIIA goals [1) Operate 2) Enable 3) Anticipate and 4) Prepare]: 1) Organize for unity of purpose and speed of action (shortened to "Organize" in the chart). 2) Enable secure mission driven access to information and services (shortened to "Enable" in the chart). 3) Anticipate and prevent successful attacks on data and networks (shortened to "Anticipate" in the chart). 4) Prepare for and operate through cyber degradation or attack (shortened to "Prepare" in the chart). These four goal areas are subdivided into activities supporting each goal.
dcterms:subject
wikify
  • November 2009
dbkwik:speedydelet...iPageUsesTemplate
refimprove
  • November 2009
concern
  • Not sufficiently notable
Timestamp
  • 20120630060256(xsd:double)
abstract
  • Navigating around the IA Policy Chart: Essentially, the Chart is designed around the four CIIA goals [1) Operate 2) Enable 3) Anticipate and 4) Prepare]: 1) Organize for unity of purpose and speed of action (shortened to "Organize" in the chart). 2) Enable secure mission driven access to information and services (shortened to "Enable" in the chart). 3) Anticipate and prevent successful attacks on data and networks (shortened to "Anticipate" in the chart). 4) Prepare for and operate through cyber degradation or attack (shortened to "Prepare" in the chart). These four goal areas are subdivided into activities supporting each goal. On the left hand side of the chart is a legend that identifies the originator of each policy by a color-coding scheme. On the right hand side of the IA Policy Chart, there are boxes, which cover the legal authority for the policies, the federal/national level of IA policies, as well as operational level documents that provide details on securing the GIG and its assets. Links to these documents can be found in the Chart.
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software