CZ:Computers Workgroup
Workgroups are no longer used for group communications, but they still are used to group articles into fields of interest. Each article is assigned to 1-3 Workgroups via the article's Metadata. |
| ||||||||
Computers article | All articles (1,094) | To Approve (0) | Editors: active (3) / inactive (77) and Authors: active (815) / inactive (0) |
Workgroup Discussion | ||||
Recent changes | Citable Articles (12) | |||||||
Subgroups (10) |
Checklist-generated categories:
Subpage categories:
|
Missing subpage categories:
Article statuses:
|
The Computers Workgroup coordinates the Citizendium articles related to computers and computer science. You are welcome to participate in improving, or adding to, the Computers_Workgroup articles. To author for this workgroup, please add [[:Category:Computers Authors]] to the bottom of your user page so it appears on the Category:Computers Authors page. Likewise, Editors should have [[:Category:Computers Editors]] at the bottom of their user page so they'll appear on the Category:Computers Editors page.
You are welcome to start an article that you believe is missing. Some authors have made an attempt to catalog articles that are needed; see their list at Core articles. A good thing to do is to link to the future article in existing articles; those red links encourage other authors to write about those topics. Please subscribe to the workgroup email list; it is the only way to reach all Computers authors at once. The discussion page for this article is a good place to raise policy questions.
Building, operating and securing the Global Information Grid (GIG) for the Department of Defense is a complex and ongoing challenge. The Deputy Assistant Secretary of Defense (DASD) for Cyber Identity and Information Assurance has developed a strategy for meeting this challenge, which is available here: http://iase.disa.mil/policy-guidance/dasd_ciia__strategy_aug2009.pdf. In the CIIA Strategy, the primary goal areas are as listed as follows :
1.Organize for unity of purpose and speed of action (shortened to "Organize" in the chart). 2.Enable secure mission driven access to information and services (shortened to "Enable" in the chart). 3.Anticipate and prevent successful attacks on data and networks (shortened to "Anticipate" in the chart). 4.Prepare for and operate through cyber degradation or attack (shortened to "Prepare" in the chart).
DASD CIIA Strategy
The IA Policy Chart was inspired by the creation of a similar Acquisition Security Policy Chart by the Office of the Under Secretary of Defense for Acquisition, Technology & Logistics. The goal of the IA Policy Chart is to capture the tremendous breadth of applicable policies, some of which many IA practitioners may not even be aware, in a helpful organizational scheme. The use of color, hatching, fonts and hyperlinks are all designed to provide additional assistance to IA professionals navigating their way through policy issues in order to build, operate and secure the GIG.
At the bottom center of the chart is a legend that identifies the originator of each policy by a color-coding scheme. On the right hand side of the IA Policy Chart, there are boxes, which cover the legal authority for the policies, the federal/national level of IA policies, as well as operational and subordinate level documents that provide details on securing the GIG and its assets. Links to these documents can be found in the Chart.
Click on the chart preview to download the full PDF file with links to all policies:
Updated July 16, 2010
Check back often as the Policy Chart is updated regularly.
Because IA Policy development is a wide-ranging and ongoing process, we ask for input from all who download this chart, advising us of any policies that may have been overlooked, but should be included. In addition, we ask for any policy updates that may not be properly reflected on the IA Policy Chart or any suggestions to improve the chart.
[[Category:Computers Workgroup]]
Recruiting people
We are actively seeking more authors and editors for this workgroup. Here is a potential recruitment letter; please consider inviting to your colleagues to join us.