Actualitatea și tendințele conceptului de e-defence

Referat
7/10 (1 vot)
Domeniu: Management
Conține 1 fișier: doc
Pagini : 12 în total
Cuvinte : 3157
Mărime: 16.45KB (arhivat)
Publicat de: Horatiu I.
Puncte necesare: 6
Referatul este realizat in limba engleza.

Cuprins

  1. 1.Introduction
  2. 2.Object study and purpose
  3. 3. Utility of information and communication technologies
  4. 4.Mobile network communications
  5. 5.Instructions users
  6. 6.Opţions horizons on specific solutions for e-Defence
  7. 7.Problems likely to occur as a result of applying the model developed
  8. 8.Costs and consequences of inaction or delayed action

Extras din referat

1.Introduction

In the business world, e-business concepts, along with e-economy and e-commerce, are familiar terms already consecrated. E-business is a new way of conducting business through electronic networking (Internet) effectively, with speed, innovation and the creation of new values in an organization. E-Defense, by analogy with e-business, defines interconnection military affairs, the new revolution in military affairs. The military business is any business of the military organization that supports a specific target thereof.

Information society is a society that relies on a prior information. Information society is part of the information society, using, for gathering, storing, processing, transmission and use of information, information and communication technologies ICT (Information and Communications Technology). The knowledge society is more than only the information society and information society, înglobându them actually on them.

2.Object study and purpose

The purpose of this study is to define the role and implications of e-Defence in the context of information society and knowledge society .

The goal is to achieve ever-increasing integration of the military organization as a whole, e-Defence in particular, the Romanian civil society.

The ultimate objective of e-Defence is integrating all information and computer capabilities in a national information network defense (RINA), which in turn will be integrated into NATO information networks.

This ensures interoperability and alignment to the world of IS-SC and e-Defense. Military organization - as compared to the E-Defense - must adopt the fundamental architecture, under which to develop infrastructure and specific applications, without having to justify incremental investment in infrastructure costs for each initiative to increase the value system.

3. Utility of information and communication technologies

Military organizations, despite their specificity, are not fundamentally different from any other organization and, as such, their success or failure will depend on the ability to incorporate new concepts, advanced technologies to incorporate e-business and taking advantage the whole development process - information technology. By this, it will preserve its armed forces: speed, responsiveness, efficiency, firmly.

Network centric warfare NCW (Network Centric Warfare) requires the use of integrated computer networks and communications for command and control military actions in the broader context of C4I (command, control, communications, computers and information). From this perspective, one of the main objectives of implementing the e-Defence is expanding and securing computer networks of military organizations. It is known that an efficient network in terms of reliability and security of information incur high hardware and software.

Network centric warfare NCW (Network Centric Warfare) requires the use of integrated computer networks and communications for command and control military actions in the broader context of C4I (command, control, communications, computers and information). From this perspective, one of the main objectives of implementing the e-Defence is expanding and securing computer networks of military organizations. It is known that an efficient network in terms of reliability and security of information incur high hardware and software.

A VPN is a group of two or more computer systems connected in a private communication architecture, with restricted access, and developed through a public network. Privacy of a VPN (private term emphasizes access restricted to a defined set of entities, third party access to private communications content) depends mainly on the risk assumed by the organization concerned: the requirements of secrecy and security may be minimal or very high. Generate private information through these networks do not differ too much from internal correspondence sent via mail or send a fax via the public.

A VPN can provide the link between: the Ministry of National Defense (MND), subordinate structures, military structures of NATO partner countries, Romanian military units engaged in humanitarian and peacekeeping in different areas the world, internal and external suppliers of equipment and services, etc. army. Due to the omnipresence of the Internet, users can connect to the network through a local phone call or through a dedicated line.

Philosophy is based VPN private communication is achieved through a distributed network infrastructure. Thus, a private resource is created more logical entities using common resources and not necessarily shared by using dedicated physical circuits in conjunction with communication services. Private network is not necessarily a physically private communication. It can be built between two or more systems, between two or more organizations and even between some individual applications.

Internet has created the paradigm of ubiquitous connectivity interconnected network entities are able to exchange information at any time. A VPN network communications necessarily imply isolation, but implementation of controlled communication segments for groups with common interests across a distributed infrastructure. Romanian Military organizations need a network that meets the following conditions:

• continuous availability;

• safety; • high quality services;

• data security and integrity;

• high level of performance;

• avoiding public addressing schemes.

Preview document

Actualitatea și tendințele conceptului de e-defence - Pagina 1
Actualitatea și tendințele conceptului de e-defence - Pagina 2
Actualitatea și tendințele conceptului de e-defence - Pagina 3
Actualitatea și tendințele conceptului de e-defence - Pagina 4
Actualitatea și tendințele conceptului de e-defence - Pagina 5
Actualitatea și tendințele conceptului de e-defence - Pagina 6
Actualitatea și tendințele conceptului de e-defence - Pagina 7
Actualitatea și tendințele conceptului de e-defence - Pagina 8
Actualitatea și tendințele conceptului de e-defence - Pagina 9
Actualitatea și tendințele conceptului de e-defence - Pagina 10
Actualitatea și tendințele conceptului de e-defence - Pagina 11
Actualitatea și tendințele conceptului de e-defence - Pagina 12

Conținut arhivă zip

  • Actualitatea si Tendintele Conceptului de E-defence.doc

Alții au mai descărcat și

Aspecte practice privind auditul calității

3.4. Metodologia auditului sistemelor calitatii Standardul international ISO 10011 stabileste principiile, criteriile, practicile de baza si...

Mediul și firma

Mediul extern al firmei poate fi impartit in doua mari segmente: - mediul general sau mega-mediul - mediul specific(mediul sarcina);...

Sicomed - History and Development

WHO and HOW MADE IT POSSIBLE? In order to get where Sicomed has got one has to be very talented, very intelligent an also very patient. The...

Ai nevoie de altceva?