Acquisition Security

The proactive planning and integration of all security disciplines and other defensive methods into the defense acquisition process to protect weapons systems and related sensitive technology; technical information such as research data with military applications; and support systems from foreign intelligence collection, unauthorized disclosure, sabotage, theft, or damage throughout the technology’s life cycle.
Channel Thumbnail
 Public, Restricted and Moderated
1 Media
8 Members
The proactive planning and integration of all security disciplines and other defensive methods into the defense acquisition process to protect weapons systems and related sensitive technology; technical information such as research data with military applications; and support systems from foreign intelligence collection, unauthorized disclosure, sabotage, theft, or damage throughout the technology’s life cycle.
The proactive planning and integration of all security disciplines and other defensive methods into the defense acquisition process to protect weapons systems and related sensitive technology; technical information such as research data with military applications; and support systems from foreign intelligence collection, unauthorized disclosure, sabotage, theft, or damage throughout the technology’s life cycle.

 Public, Restricted and Moderated

1 Media
8 Members
Managers:
Moderators:
Appears In:
Knowledge Areas