Tag IT | AskTOP.net – Leader Development for Army Professionals

IT

Here is a list of everything we have published about IT

AR 25-13 Telecommunications and Unified Capabilities

This regulation establishes policies and assigns responsibilities for the management of unified capabilities. It applies to information technology contained in both business systems and national security systems developed for or purchased by the Department of Army. The full scope of …Read More

Article by

Military Cryptographic Systems Information Assurance Block Class/Briefing

Class/briefing that contains 58 slides, Soldiers will learn about the most common military cryptographic systems such as the KG-84, KIV-7, KIV-19, STE and KG-75 to include data rates, price, and practical applications. NOTE: This document is in MS PowerPoint

Article by

Military Cryptographic System Information Assurance Module 3 Class/Briefing

Class/briefing that contains 71 slides about Military Cryptographic System Information Assurance that covers: Cryptographic standards, NSA types, Military Cryptographic equipment, telephony cryptographic, fill devices, key generators, modernization program, and key management. NOTE: This document is in MS PowerPoint

Article by
Award Quick: Army Award Writing Software
Battlefield Deception Guide - From Alexander the Great to Norman Schwarzkopf

Deputy Chief of Staff G6 SOP

This document establishes local standing operating procedures specific to the U.S. Army, North Atlantic Treaty Organization (USANATO) Headquarters unclassified Local Area Network (LAN), systems connected to the network and standalone processors.  This document identifies requirements and the responsible personnel.  It …Read More

Article by

AR 73-1 Test and Evaluation Policy

This regulation implements the policies and procedures of DODD 5000.1, DODD 3200.11, and DODI 5000.2, and the Defense Acquisition Guidebook and specifically prescribes implementing policies and assigns responsibilities for test and evaluation activities during the systems acquisition processes. It applies …Read More

Article by

AR 25-2 Information Assurance

This regulation provides Information Assurance policy, mandates, roles, responsibilities, and procedures for implementing the Army Information Assurance Program, consistent with today’s technological advancements for achieving acceptable levels of security in engineering, implementation, operation, and maintenance for information systems connecting to …Read More

Article by
Army Counseling Software - Include over 250 Army Counseling Examples
Wear it Right! Army Uniform Guide

AR 25–1 Army Knowledge Management and Information Technology

This regulation establishes policies and assigns responsibilities for information management and information technology. It applies to information technology contained in both business systems and national security systems developed for or purchased by the Department of Army. It addresses the management …Read More

Article by

AR 220–1 Army Unit Status Reporting and Force Registration – Consolidated Policies

This regulation explains the processes, methodologies, and information technology systems established by the Secretary of Defense, the Chairman, Joint Chiefs of Staff, and the Secretary of the Army, pursuant to their responsibilities, for determining and reporting the readiness of military …Read More

Article by