(redirected from defended asset list)
Category filter:
DALDelta Air Lines (NYSE stock ticker symbol, ICAO code)
DALData Access Layer
DALDalhousie University
DALDarkness and Light (game)
DALDroit Au Logement (French: The Right to have a Home)
DALDeutsche Afrika-Linien (German: German Africa-Lines)
DALDirect Access Link
DALDomain Access License
DALDatabase Access Language
DALDelegate at Large
DALDesarrollando América Latina (Spanish: Developing Latin America)
DALData Access Language
DALData Abstraction Layer
DALData Access Logic
DALDedicated Access Line
DALDefended Asset List (US DoD)
DALDiffuse Aggressive Lymphoma (oncology)
DALDigital Asset Library (various locations)
DALDesign Assurance Level
DALDirect Algebraic Logic (Sharp calculators)
DALDispositif d'Aide a la Lactation (French: Lactation Aid Device)
DALDisk Access Lockout
DALDetached Address Label (US Postal Service)
DALData Accession List
DALData Access Line
DALDirect Access Line
DALDefect Action Level
DALDallas, TX, USA - Love Field (Airport Code)
DALDear Administrator Letter
DALDissemination Authority List
DALDedicated Advertising Location
DALData Aided Loop
DALDaily Activity Log
DALDigital Access Line
DALData Acquisition List
DALData Access List
DALDirect Applied Labor
DALDigital Acoustic Log (Geophysics)
DALDesign Accident Load
Copyright 1988-2018 AcronymFinder.com, All rights reserved.
References in periodicals archive ?
This process allows planners to prioritize critical assets, create a Critical Asset List, determine which assets should be defended, develop a Defended Asset List, and then identify key terrain in relation to these assets and mission objectives.
Defended Asset List: A listing of those assets from the critical asset list prioritized by the joint force commander to be defended with the resources available.
Reverse breach planning, defensive planning, defended asset list planning, engagements, route reconnaissance, and area security must be addressed.
We focus on identifying and defending those interfaces that are essential to mission success--Gen Keith Alexander, commander of US Cyber Command, would call this capability "recon/counter-recon." A key facet of this defensive effort is identifying and focusing on a commander's prioritized "defended asset list," those critical areas that must be able to operate through a contested environment or attack.
Vautrinot: It's what I referred to as the defended asset list but at a discrete level instead of an enterprise level.
There is a great deal of attention being focused on the development of two lists for the integration of protection--the critical asset list and the defended asset list. With limited protection assets, these lists can help commanders focus and prioritize protection assets.
The successful allocation of resources to support BCT survivability efforts depends on the agreed-upon defended asset list. This list is a compilation of the survivability needs that BCT leaders decided to act upon, based on the limited number of blade assets and time available.