General Dynamics Awarded $2MGeneral Dynamics Awarded $2M
General Dynamics awarded $2 million to study controlling US military, government encryption devices
April 19, 2007
SCOTTSDALE, Ariz. –- General Dynamics C4 Systems, a business unit of General Dynamics (NYSE: GD), has been awarded a $2.2 million task order from the U.S. Air Force Cryptographic Modernization Program to conduct a proof of concept study proposing standards for monitoring and controlling National Security Agency-certified cryptographic devices. The award is funded through the U.S. Air Force NETCENTS program which is responsible for integrating the Air Force Command and Control (C2) Constellation Net into the Global Information Grid.
Called the Secure Cryptographic Enterprise Management (SCEM) study, the effort is the first step in a full-scale development program for uniform cryptographic network management processes encompassing encryption devices operating on U.S. military and government networks. The study will examine control of encryption device interoperability, software upgrades and updates for the Key Management Infrastructure (KMI). KMI enables secure communications through the distribution of electronically generated encryption information or “keys.” General Dynamics will publish the study during the fourth quarter of 2007.
General Dynamics C4 Systems, a business unit of General Dynamics (NYSE: GD), is a leading integrator of secure communication and information systems and technology. With more than 11,000 employees worldwide, the company specializes in command and control, communications networking, space systems, computing and information assurance for defense, government and select commercial customers in the United States and abroad. General Dynamics Corp.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Quantifying the Gap Between Perceived Security and Comprehensive MITRE ATT&CK Coverage
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
Managed Security and the 3rd Party Cyber Risk Opportunity Whitepaper