Nov/Dec 2013

Real-Time Information Assurance

Download Entire November/December 2013 Issue (PDF 12.5MB)

View Online Digital Flipbook Version (Requires Adobe Flash)

Table of Contents
(click below to download individual articles from the November/December 2013 issue)

From the Sponsor
by Felipe Jauregui
Download Article (PDF)

Agile IA: Integrating Information Assurance into Agile and Rapid Technology Development
by Kathy McGinn, Monica Nelson and Dale Daigle
Collaboration, continuous monitoring, and leveraging automated testing for formal validation.
Download Article (PDF)

Disciplined Agile Delivery: The Foundation for Scaling Agile
by Scott W. Ambler and Mark Lines
Using the DAD process decision framework for scaling agile development.
Download Article (PDF)

Security Architecture Approaches
by Sarah Pramanik
The choice of architecture methodology can increase or diminish efficiency. It is necessary to understand which methodology provides the most effective approach.
Download Article (PDF)

Secure DoD Software: Considerations for the Vulnerability Market
by Major Bradley C. Panton, John M. Colombi, Ph.D., Michael R. Grimaila, Ph.D., and Robert F. Mills, Ph.D.
Through use of the vulnerability market, DoD will ensure information security is built into the application, minimize the number of distributed patches, and optimize investment in defense programs.
Download Article (PDF)

It Is Not Too Late for Software Assurance!
by Robert A. Voitle, Jr., Arthur J. Boote, and James "Woody" Woodworth
Real-time IA focuses on mitigating attacks while within that hostile environment but can be greatly aided by Software Assurance practices regardless of where an application is in its lifecycle.
Download Article (PDF)

Effective Approaches for Delivering Affordable Military Software
by Christian Hagen, Steven Hurt, and Jeff Sorenson
As the U.S. military shifts its focus from metal and mechanics to developing and integrating control systems, delivering advanced software-enabled systems affordably will become a vital success factor.
Download Article (PDF)

Integrated Circuit Security Threats and Hardware Assurance Countermeasures
by Karen Mercedes Goertzel
Too often, software and system developers take the quality of computer hardware for granted.
Download Article (PDF)

by David A. Cook,
Download Article (PDF)