12.07.2015 Views

N - Multilateral Planners Conference

N - Multilateral Planners Conference

N - Multilateral Planners Conference

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

UNCLASSIFIEDviACP 200(B) Vol 1ANNEX A TO CHAPTER 3 ------------------------------------------------------------------------------------------------ 3A-1ANNEX B TO CHAPTER 3 -------------------------------------------------------------------------------------------------3B-1ANNEX C TO CHAPTER 3 -------------------------------------------------------------------------------------------------3C-1ANNEX D TO CHAPTER 3 ------------------------------------------------------------------------------------------------ 3D-1CHAPTER 4 ...................................................................................................................................................... 4-1SECURITY ......................................................................................................................................................... 4-1INTRODUCTION --------------------------------------------------------------------------------------------------------------- 4-1AIM -------------------------------------------------------------------------------------------------------------------------------- 4-1OVERVIEW ---------------------------------------------------------------------------------------------------------------------- 4-1DEFINITIONS ------------------------------------------------------------------------------------------------------------------- 4-1REFERENCE --------------------------------------------------------------------------------------------------------------------- 4-2NETWORK TOPOLOGY ------------------------------------------------------------------------------------------------------ 4-2POINT OF PRESENCE / BOUNDARY PROTECTION DEVICES --------------------------------------------------- 4-3THREATS ------------------------------------------------------------------------------------------------------------------------- 4-4RESPONSIBILITIES ----------------------------------------------------------------------------------------------------------- 4-5EXPORT SANCTION ---------------------------------------------------------------------------------------------------------- 4-5ASSUMPTIONS ----------------------------------------------------------------------------------------------------------------- 4-6RECOMMENDED SECURITY ARCHITECTURES -------------------------------------------------------------------- 4-6NETWORK CONNECTIVITY ----------------------------------------------------------------------------------------------- 4-6SHIPBOARD “AIR GAP” ARCHITECTURE ----------------------------------------------------------------------------- 4-7SHIPBOARD “NETWORKED” ARCHITECTURE ---------------------------------------------------------------------- 4-8SHIPBOARD “FULLY INTEGRATED” TARGET ARCHITECTURE. --------------------------------------------- 4-9ACCREDITATION ----------------------------------------------------------------------------------------------------------- 4-11SECURITY DEVICE INTEROPERABILITY --------------------------------------------------------------------------- 4-11CHAPTER 5 ...................................................................................................................................................... 5-1TRAINING AND INTEROPERABILITY ......................................................................................................... 5-1INTRODUCTION --------------------------------------------------------------------------------------------------------------- 5-1AIM -------------------------------------------------------------------------------------------------------------------------------- 5-1OVERVIEW ---------------------------------------------------------------------------------------------------------------------- 5-1TRAINING------------------------------------------------------------------------------------------------------------------------ 5-1INTEROPERABILITY LEVEL ----------------------------------------------------------------------------------------------- 5-1DETERMINING INTEROPERABILITY LEVEL ------------------------------------------------------------------------ 5-1REPORTING PROCEDURES ------------------------------------------------------------------------------------------------ 5-2CHAPTER 6 ...................................................................................................................................................... 6-1MESSAGING ..................................................................................................................................................... 6-1INTRODUCTION --------------------------------------------------------------------------------------------------------------- 6-1AIM -------------------------------------------------------------------------------------------------------------------------------- 6-1OVERVIEW ---------------------------------------------------------------------------------------------------------------------- 6-1TYPES OF MESSAGING------------------------------------------------------------------------------------------------------ 6-2TEXT-BASED FORMATS ---------------------------------------------------------------------------------------------------- 6-2CHAT ------------------------------------------------------------------------------------------------------------------------------ 6-2MULTIMEDIA FORMATS --------------------------------------------------------------------------------------------------- 6-2E-MAIL ---------------------------------------------------------------------------------------------------------------------------- 6-3WEB SERVICES ---------------------------------------------------------------------------------------------------------------- 6-3MESSAGING SELECTION --------------------------------------------------------------------------------------------------- 6-3MULTICAST MESSAGING -------------------------------------------------------------------------------------------------- 6-4PUBLIC KEY INFRASTRUCTURE (PKI)--------------------------------------------------------------------------------- 6-7CONCLUSION ------------------------------------------------------------------------------------------------------------------- 6-7ANNEX A TO CHAPTER 6 ------------------------------------------------------------------------------------------------ 6A-1CHAPTER 7 ...................................................................................................................................................... 7-1COMMON OPERATIONAL PICTURE (COP) ................................................................................................. 7-1INTRODUCTION --------------------------------------------------------------------------------------------------------------- 7-1AIM -------------------------------------------------------------------------------------------------------------------------------- 7-1UNCLASSIFIEDOriginalUncontrolled copy when printed

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!