14.04.2014 Views

DoD Directive 8500.1 - Common Access Card (CAC)

DoD Directive 8500.1 - Common Access Card (CAC)

DoD Directive 8500.1 - Common Access Card (CAC)

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

DODD <strong>8500.1</strong>, October 24, 2002<br />

E2.1.32. Portfolio. The aggregate of IT investments for <strong>DoD</strong> information systems,<br />

infrastructure and related technical activities that are linked to mission goals, strategies,<br />

and architectures, using various assessment and analysis tools to permit information and<br />

IT decisions to be based on their contribution to the effectiveness and efficiency of<br />

military missions and supporting business functions. Portfolios enable the Department<br />

of Defense to manage IT resources and align strategies and programs with<br />

Defense-wide, functional, and organizational goals and measures.<br />

E2.1.33. Proxy. Software agent that performs a function or operation on behalf of<br />

another application or system while hiding the details involved. Typical proxies accept<br />

a connection from a user, make a decision as to whether or not the user or client<br />

network address is authorized to use the requested service, optionally perform additional<br />

authentication, and then complete a connection on behalf of the user to a remote<br />

destination.<br />

E2.1.34. Public Domain Software. Software not protected by copyright laws of<br />

any nation that carries no warranties or liabilities, and may be freely used without<br />

permission of or payment to the creator.<br />

E2.1.35. Public Information. Official <strong>DoD</strong> information that has been reviewed and<br />

approved for public release by the information owner in accordance with reference (s).<br />

E2.1.36. Research and Technology. Activities that may be described as basic<br />

research, applied research, and advanced technology development, demonstrations or<br />

equivalent activities, regardless of budget activity. Definitions for Basic Research,<br />

Applied Research and Advanced Technology Development are provided in the <strong>DoD</strong> FMR,<br />

Chapter 5 (reference (ac)).<br />

E2.1.37. Robustness. A characterization of the strength of a security function,<br />

mechanism, service or solution, and the assurance (or confidence) that it is<br />

implemented and functioning correctly. The Department of Defense has three levels of<br />

robustness:<br />

E2.1.37.1. High Robustness: Security services and mechanisms that provide<br />

the most stringent protection and rigorous security countermeasures.<br />

E2.1.37.2. Medium Robustness: Security services and mechanisms that<br />

provide for layering of additional safeguards above good commercial practices.<br />

23 ENCLOSURE 2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!