IT infrastructure – Defense information network(A) |
Speed(A.1) | <A-1-1>Average speed among main nodes |
<A-1-2> Average speed between main node and secondary node (branch line) |
<A-1-3> Average speed between secondary node and user |
Traffic(A.2) | <A-2-1> Average traffic among main nodes |
<A-2-2> Average traffic between main node and secondary node (branch line) |
<A-2-3> Average traffic between secondary node and user |
Availability/recovery time (A.3) | <A-3-1> Network availability |
<A-3-2> Recovery time |
IT infrastructure – Computer systems(B) |
Server utilization(B.1) | <B-1-1> Average (maximum) CPU use ratio |
<B-1-2> Average storage use ratio |
Server availability (B.2) | <B-2-1> Server availability |
<B-2-2> Server recovery time |
Server throughput (B.3) | <B-3-1> Average tpmC (Transaction per minute by council) |
<B-3-2> Average response time |
Work efficiency (B.4) | <B-4-1> Input automation level (Input interface level) |
IT infrastructure – Interoperability and standardization(C) |
Interoperability among ISs(C.1) | <C-1-1> Average interoperability level among battlefield management information systems (MISs) |
<C-1-2> Average data interconnection ratio among battlefield MISs |
<C-1-3> Average interoperability level between battlefield MIS and resource MIS |
<C-1-4> Average data interconnection level between battlefield MIS and resource MIS |
<C-1-5> Average interoperability level among resource MISs |
<C-1-6> Average data interconnection level among resource MISs |
Standardization of reference information (master data) (C.2) | <C-2-1> Standardization ratio of reference information/code data (master data) |
Interoperability between weapon systems and IS (C.3) | <C-3-1> Average interoperability level between weapon systems and battlefield MIS |
<C-3-2> Average data interconnection ratio between weapon systems and battlefield MIS |
IT infrastructure – Information security(D) |
Detection level (capability) of infringement incident(D.1) | <D-1-1> Intrusion detection ratio in advance |
Response level (capability) of infringement incident(D.2) | <D-2-1> Number of intrusion incidents per year |
<D-2-2> Intrusion incident response time |
Recovery of infringement incident(D.3) | <D-3-1> Trace ratio of infringement incidents |
<D-3-2> Recovery time after infringement incident |
Informatization environment(E) |
Efforts to improve informatization capability(E.1) | <E-1-1> Annual time of informatization education |
Informatization master plan(E.2) | <E-2-1> Informatization master plan |
Efficient execution of budget(E.3) | <E-3-1> Efficiency of budget execution |
IS use(F) |
Business informatization (F.1) | <F-1-1> Ratio of tasks implemented by IS |
Business use(F.2) | <F-2-1> Business use |