The NTIS website and supporting ordering systems are undergoing a major upgrade from 8PM on September 25th through approximately October 6. During that time, much of the functionality, including subscription and product ordering, shipping, etc., will not be available. You may call NTIS at 1-800-553-6847 or (703) 605-6000 to place an order but you should expect delayed shipment. Please do NOT include credit card numbers in any email you might send NTIS.
Documents in the NTIS Technical Reports collection are the results of federally funded research. They are directly submitted to or collected by NTIS from Federal agencies for permanent accessibility to industry, academia and the public.  Before purchasing from NTIS, you may want to check for free access from (1) the issuing organization's website; (2) the U.S. Government Printing Office's Federal Digital System website; (3) the federal government Internet portal; or (4) a web search conducted using a commercial search engine such as
Accession Number ADA590269
Title Effectiveness of the Department of Defense Information Assurance Accreditation Process.
Publication Date Mar 2013
Media Count 34p
Personal Author J. L. Valladares
Abstract For many years, the Department of Defense (DoD) has used very formalized processes for authorizing the operation of its information systems. This authorization process, known as accreditation within the DoD, has always been based on certification testing of those systems and an assessment of the risks associated with operating those systems on the DoD's Global Information Grid (GIG). Despite using these various costly and process-intensive methods for certification and accreditation (C&A), it is questionable whether or not these processes have actually improved the security of DoD systems and networks commensurate with the cost and effort involved. Further, given current advances in systems security technologies, recent changes in DoD's strategy for operating in cyberspace, and even the very structure of the DoD's enterprise networks in the near future, should (or even can) the DoD continue to test and authorize information systems using these same methodologies. This paper addresses this question and proposes other ways the DoD can more effectively assess its systems and networks to better ensure their security over time.
Keywords A and a(Assessment and authorization)
C and a(Certification and accreditation)
Computer network security
Cost effectiveness
Department of defense
Fedramp(Federal risk and authorization management program)
Fisma(Federal information security management act)
Gig(Global information grid)
Information assurance
Infosec(Information security)
Iscm(Information security continuous monitoring)
Risk analysis
Risk assessment

Source Agency Non Paid ADAS
NTIS Subject Category 92 - Behavior & Society
62D - Information Processing Standards
Corporate Author Army War Coll., Carlisle Barracks, PA.
Document Type Technical report
Title Note Research paper.
NTIS Issue Number 1409
Contract Number N/A

Science and Technology Highlights

See a sampling of the latest scientific, technical and engineering information from NTIS in the NTIS Technical Reports Newsletter

Acrobat Reader Mobile    Acrobat Reader