DoD Directive 8500.1 - Common Access Card (CAC)
DoD Directive 8500.1 - Common Access Card (CAC)
DoD Directive 8500.1 - Common Access Card (CAC)
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
DODD <strong>8500.1</strong>, October 24, 2002<br />
E2.1.32. Portfolio. The aggregate of IT investments for <strong>DoD</strong> information systems,<br />
infrastructure and related technical activities that are linked to mission goals, strategies,<br />
and architectures, using various assessment and analysis tools to permit information and<br />
IT decisions to be based on their contribution to the effectiveness and efficiency of<br />
military missions and supporting business functions. Portfolios enable the Department<br />
of Defense to manage IT resources and align strategies and programs with<br />
Defense-wide, functional, and organizational goals and measures.<br />
E2.1.33. Proxy. Software agent that performs a function or operation on behalf of<br />
another application or system while hiding the details involved. Typical proxies accept<br />
a connection from a user, make a decision as to whether or not the user or client<br />
network address is authorized to use the requested service, optionally perform additional<br />
authentication, and then complete a connection on behalf of the user to a remote<br />
destination.<br />
E2.1.34. Public Domain Software. Software not protected by copyright laws of<br />
any nation that carries no warranties or liabilities, and may be freely used without<br />
permission of or payment to the creator.<br />
E2.1.35. Public Information. Official <strong>DoD</strong> information that has been reviewed and<br />
approved for public release by the information owner in accordance with reference (s).<br />
E2.1.36. Research and Technology. Activities that may be described as basic<br />
research, applied research, and advanced technology development, demonstrations or<br />
equivalent activities, regardless of budget activity. Definitions for Basic Research,<br />
Applied Research and Advanced Technology Development are provided in the <strong>DoD</strong> FMR,<br />
Chapter 5 (reference (ac)).<br />
E2.1.37. Robustness. A characterization of the strength of a security function,<br />
mechanism, service or solution, and the assurance (or confidence) that it is<br />
implemented and functioning correctly. The Department of Defense has three levels of<br />
robustness:<br />
E2.1.37.1. High Robustness: Security services and mechanisms that provide<br />
the most stringent protection and rigorous security countermeasures.<br />
E2.1.37.2. Medium Robustness: Security services and mechanisms that<br />
provide for layering of additional safeguards above good commercial practices.<br />
23 ENCLOSURE 2