System Security Engineering
|
|
|
- Jodie Howard
- 10 years ago
- Views:
Transcription
1 A Critical Discipline of SE Ms. Kristen Baldwin Director, Systems Analysis DDR&E/Systems Engineering 12th Annual NDIA Systems Engineering Conference 28 October /28/09 Page-1
2 Defense Research & Engineering Director, Defense Research and Engineering (DDR&E) Honorable Zachary J. Lemnios Defense Advanced Research Projects Agency (DARPA) Dr. Regina Dugan Defense Technical Information Center (DTIC) Mr. Paul Ryan Director, Research Director, Systems Engineering Director, Developmental Test & Evaluation (DT&E) Director, Rapid Fielding Dr. David Honey Mr. Stephen Welby Mr. Chris DiPetto (A) Mr. Earl Wyatt 10/28/09 Page-2
3 Increased Priority for Program Protection Threats: Nation-state, terrorist, criminal, rogue developer who: Gain control of systems through supply chain opportunities Exploit vulnerabilities remotely Vulnerabilities: All systems, networks, applications Intentionally implanted logic (e.g., back doors, logic bombs, spyware) Unintentional vulnerabilities maliciously exploited (e.g., poor quality or fragile code) Consequences: Stolen critical data & technology; corruption, denial of critical warfighting functionality Today s acquisition environment drives the increased emphasis: Then Standalone systems >>> Some software functions >>> Known supply base >>> Now Networked systems Software-intensive Prime Integrator, hundreds of suppliers 3 10/28/09 Page-3
4 Vulnerability Assessments National Defense Authorization Act Section 254 Directed DoD: Perform vulnerability assessments of major systems Vulnerability Assessments Supply chain review Program protection planning review System Engineering/In-depth design review Deputy Secretary of Defense Directive Assigned responsibilities to meet the assessment and reporting requirements of Section 254 of NDAA to ASD(NII)/DoD CIO and USD (AT&L) 10/28/09 Page-4
5 Vulnerability Assessment Highlights Assessed 3 Major Defense Acquisition Programs Assessed 42 methods for verifying trust in commercial microelectronics Report to Congress in October 2009 Summarizes assessment results, current DoD strategy, and way ahead Demonstrates understanding of wider supply chain risk not just microelectronics Recommended Actions Continue joint leadership by USD(AT&L) and ASD(NII)/DoD CIO Address counterfeits during Logistics and Sustainment Continue piloting mitigations with acquisition programs, implement findings in policy Evaluate additional verification methods, including supplier management, inspections, and testing 10/28/09 Page-5
6 Current Program Protection Challenges Policy and guidance for security is not streamlined There is a lack of useful methods, processes and tools for acquirers and developers Criticality is usually identified too late to budget and implement protection Horizontal protection process is insufficiently defined Lack of consistent method for measuring success of protection Security not typically identified as an operational requirement, and is therefore lower priority Data Source: GAO report, white papers, military service feedback 6 10/28/09 Page-6
7 10/28/09 Page-7 7 Vision of Success Prioritization Supplier Assurance Engineering- In-Depth Industry Outreach Technology Investment Assured Systems The requirement for assurance is allocated among the right systems and their critical components Awareness of supply chain risks Systems are designed and sustained at a known level of assurance Commercial sector shares ownership and builds assured products Technology investment transforms the ability to detect and mitigate system vulnerabilities 7
8 DoDI Program Protection Policy Perform comprehensive protection of Critical Program Information CPI includes elements or components of an RDA program that, if compromised, could: Cause significant degradation in mission effectiveness; Shorten the expected combat-effective life of the system; Reduce technological advantage; Significantly alter program direction; or Enable an adversary to defeat, counter, copy, or reverse engineer the technology or capability Includes information about applications, capabilities, processes, and end-items Includes technology that would reduce the US technological advantage if it came under foreign control Includes elements or components critical to a military system or network mission effectiveness -DoDI /28/09 Page-8 8
9 Protection Disciplines: Some Definitions Information Assurance: Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation (DoD E: Information Assurance) Cyber Security: Measures taken to protect a computer, networks, or information or computer system (as on the internet) and electronic information storage facilities belonging to, or operated by or for, the DoD or US Government, against unauthorized access, or attack, or attempts to access (DoDI 5205.ff: Defense Industrial Base Cyber Security/Information Assurance Activities) System Assurance: The justified confidence that the system functions as intended and is free of exploitable vulnerabilities, either intentionally or unintentionally designed or inserted as part of the system at any time during the life cycle (NDIA Engineering for System Assurance Guidebook) : An element of system engineering that applies scientific and engineering principles to identify security vulnerabilities and minimize or contain risks associated with these vulnerabilities (MIL-HDBK-1785: Program Management Requirements) 10/28/09 Page-9 9
10 A Comparison System Assurance Protects: Critical Program Information Format: End-items, critical components, integrated circuits, field programmable gate arrays, embedded software, etc. Purpose: Through design, builds in safeguards, resistance, redundancy, and intrinsic strength Verification: Systems engineering and test procedures; system security engineering Information Assurance/Cyber Security Protects: Protects any information/ functionality, not specific to CPI Format: Applications, networks, IT processes, platform IT interconnections (includes weapon systems) Purpose: Standardizing strong network security and system administration practices Verification: DIACAP CPI Protection Example: Aircraft Radar Architecture and Waveform What are the formats/locations of the information? o End-items (hardware and software), Information Systems (networks, applications), Human Knowledge, Hard Copy Documents How is the information protected in those formats? o Countermeasures and verifications vary by format 10/28/09 Page-10 10
11 is Required to Cost Effectively Design-In CPI Protection Secure Software Design and Rigorous Coding Practices are a Key Aspect of System Security 10/28/09 Page-11
12 CPI Formats and Example Protections Information Systems Information Assurance (controls for applications, networks, IT processes and platform IT interconnections) Communications Security (Encryption, decryption) Hard Copy Documents Information Security (Document markings, handling instructions) Foreign Disclosure (restrict/regulate foreign access) Physical Security (gates, guards, guns) End Items Anti-Tamper (deter, prevent, detect, respond) Information Assurance Supply Chain Risk Management (assessing supplier risk) Software Assurance (tools, processes to ensure SW function) Trusted Foundry (integrated circuit providers) Ideas/Knowledge Personnel Security (trustworthy, reliable people) Access Controls 10/28/09 Page-12 12
13 Security Specialties have evolved overtime in response to threats: Information Security Computer/Network Security Physical Security The above specialties do not adequately address end-item threats Much work is needed to fully expand this discipline Foundational science and engineering, competencies (as compared to other SE Specialties: reliability, safety, etc) Methods and tools: V&V, architecting for security Information Systems Security Community and design team recognition of SSE as a key design consideration INCOSE has chartered a Working Group that can take on many of these challenges The SE Research Center (SERC) is defining a SSE Research Initiative 10/28/09 Page-13 13
14 Our Challenge: Protection Hard Problem List CPI identification, and duration (years) of protection required Identification of attack vectors (vulnerabilities) Quantifying the amount of Protection needed to reduce program risk Cost of protection countermeasures vs security risk to CPI Effectiveness of protection throughout life cycle Measuring effects/false alarm rates as part of system design New Protection Mechanisms, Tools Technologies to improve protection available to programs (Anti-Tamper, Software Assurance, Integrated Circuit pedigree, etc.) Tools to test and assess system assurance Methodologies for assessing assurance level 17 10/28/09 Page-14
15 Questions? 10/28/09 Page-15 15
16 DODD E: Information Assurance Information assurance requirements shall be identified and included in the design, acquisition, installation, operation, upgrade, or replacement of all DoD information systems For IA purposes all DoD information systems shall be organized and managed in four categories: Automated information system (AIS) applications, Enclaves (includes networks), Outsourced IT-based processes, and Platform IT interconnections (includes weapon systems) 10/28/09 Page-16 16
17 Early, Designed-In Program Protection Acquisition Strategy, TDS, RFP, SEP, and TEMP must be revised to include PPP relevant information Milestone Decision Authority approves PPP in addition to PM Identify draft CPI, estimated protection duration and S&T Lab countermeasures MDD Materiel Solution Analysis MS A TechDev MS B CDD Engineering & Manufacturing Development & Demonstration Streamlined Program Protection Plan One-stop shopping for documentation of acquisition program security (ISP, IAS, AT appendices) Living document, easy to update, maintain Improve over time based on feedback MS C CPD Full Rate Prod DR Production & Deployment O&S Obtain threat assessments from Intel/CI, assess supplier risks Develop design strategy for CPI protection Submit PPP to Acquisition Security Database (ASDB) Contractor adds detail to Program Protection Plan Preliminary verification and validation that design meets assurance plans Enhance countermeasure information in Program Protection Plan (PPP) Evaluate that CPI Protection RFP requirements have been met 17 10/28/09 Page-17 17
18 10/28/09 Page Program Protection Tools 18
19 10/28/09 Page
20 Path Forward Create a policy framework to link multiple security disciplines Leverage and implement Program Protection Planning policy Link with acquisition oversight and program management processes Provide training and support Establish horizontal protection procedures Augment system engineering guidance and practice to implement protection throughout lifecycle Engineering for System Assurance v1.0 Guidebook Raise the bar: Awareness Protection - Knowledge of the supply chain - Who has access to our critical assets - Protect critical assets through security - Engineer our systems for assurance 20 10/28/09 Page-20
DoD Software Assurance (SwA) Overview
DoD Software Assurance (SwA) Overview Tom Hurt Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Program Protection Summit / Workshop McLean, VA May 19, 2014 May 19, 2014
Implementing Program Protection and Cybersecurity
Implementing Program Protection and Cybersecurity Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering Mark Godino Office of the Deputy Assistant Secretary of Defense
Software Engineering Framing DoD s Issues
Software Engineering Framing DoD s Issues Ms. Kristen Baldwin Director, Systems Analysis 15 September 2009 09/15/09 Page-1 DDR&E Organization WSARA 2009 - D,DT&E - D,SE - Dev Planning Director, Defense
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.44 November 5, 2012 DoD CIO/USD(AT&L) SUBJECT: Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN) References: See Enclosure
DoD Software Assurance Initiative. Mitchell Komaroff, OASD (NII)/DCIO
DoD Software Assurance Initiative Mitchell Komaroff, OASD (NII)/DCIO Agenda Background Software Assurance Definition and Strategy Guiding Principles for SwA DoD SwA Strategy Elements Industry Outreach
System Security Engineering and Comprehensive Program Protection
System Security Engineering and Comprehensive Program Protection Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering 16th Annual NDIA Systems Engineering Conference
System Security Engineering and Program Protection Integration into SE
System Security Engineering and Program Protection Integration into SE Melinda Reed Deputy Director for Program Protection Office of the Deputy Assistant Secretary of Defense for Systems Engineering 17
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation
Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals
Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals JANUARY 2014 Deputy Assistant Secretary of Defense for Systems
NDIA Manufacturing Council: DoD Systems Engineering / Manufacturing Update
NDIA Manufacturing Council: DoD / Manufacturing Update 12 May 2010 Nicholas Torelli Director, Mission Assurance Office of the Secretary of Defense 05/12/2010 Page-1 DISTRIBUTION STATEMENT A -- Cleared
SYSTEMS SECURITY ENGINEERING
SYSTEMS SECURITY ENGINEERING Mission Statement Integrating Security into Every Solution We Deliver Reducing Risk and Providing Fully Reliable and Trusted Solutions Utilizing Best Practices and Rigorous
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology [email protected] 256.922.
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS 1 Steve Mills Professor of Information Technology [email protected] 256.922.8761 Overview Cybersecurity Policy Overview Questions Challenge #1 -
Cybersecurity Throughout DoD Acquisition
Cybersecurity Throughout DoD Acquisition Tim Denman Cybersecurity Performance Learning Director DAU Learning Capabilities Integration Center [email protected] [email protected] Cybersecurity
AF Life Cycle Management Center
AF Life Cycle Management Center Avionics Weapon Systems Cybersecurity Risk Management Framework Assessment & Authorization Update Harrell Van Norman AFLCMC/EZAS Cybersecurity Technical Expert [email protected]
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS Steve Mills DAU-South 1 Overview Questions Cybersecurity Owners and Stakeholders Cybersecurity Why It Matters to DoD Program Managers Defense Science
Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System
Department of Defense INSTRUCTION NUMBER 8580.1 July 9, 2004 SUBJECT: Information Assurance (IA) in the Defense Acquisition System ASD(NII) References: (a) Chapter 25 of title 40, United States Code (b)
Vulnerability Analysis Techniques to Support Trusted Systems and Networks (TSN) Analysis
Vulnerability Analysis Techniques to Support Trusted Systems and Networks (TSN) Analysis Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering 17th Annual NDIA Systems
Supply Chain Risk Management. Operating ahead of the threat, not behind the vulnerabilities
Supply Chain Risk Management Operating ahead of the threat, not behind the vulnerabilities Navigation in the Meeting Room Notes box for audio information and other announcements To enlarge the slide, click
Trusted Systems and Networks (TSN) Analysis
Trusted Systems and Networks (TSN) Analysis JUNE 2014 Deputy Assistant Secretary of Defense for Systems Engineering and Department of Defense Chief Information Officer Washington, D.C. Deputy Assistant
The United States Department of Defense Revitalization of System Security Engineering Through Program Protection
The United States Department of Defense Revitalization of System Security Engineering Through Program Protection Kristen Baldwin Principal Deputy, DASD, Systems Engineering United States Department of
How To Protect Your Data From Being Hacked
Cyber Division & Manufacturing Division Joint Working Group Cyber Security for the Advanced Manufacturing Enterprise Manufacturing Division Meeting June 4, 2014 Michael McGrath, ANSER [email protected]
1 July 2015 Version 1.0
1 July 2015 Version 1.0 Cleared for Open Publication June 26, 2015 DoD Office of Prepublication and Security Review Cybersecurity T&E Guidebook ii July 1, 2015 Version 1.0 Table of Contents 1 INTRODUCTION...
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 16 R-1 Line #145
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 3000.09 November 21, 2012 USD(P) SUBJECT: Autonomy in Weapon Systems References: See Enclosure 1 1. PURPOSE. This Directive: a. Establishes DoD policy and assigns
DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO
DoD CIO s 10-Point Plan for IT Modernization Ms. Teri Takai DoD CIO Executive Summary Proactive Partnerships for IT Modernization IT Modernization Strategy Consolidate Infrastructure Streamline Processes
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
RMF. Cybersecurity and the Risk Management. Framework UNCLASSIFIED
Cybersecurity and the Risk Management Framework Wherewe ve been and where we re going Information Assurance DoD Instruction 8500.01,Para 1(d),adoptsthe term cybersecurity as it is defined in National Security
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 NOV 1 0 2015 CHIEF INFORMATION OFFICER MEMORANDUM FOR ASSISTANT SECRETARY OF THE ARMY FOR ACQUISITION, LOGISTICS AND TECHNOLOGY ASSIST
Supply Chain Attack Patterns: Framework and Catalog
OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE FOR RESEARCH AND ENGINEERING OFFICE OF THE DEPUTY ASSISTANT SECRETARY OF DEFENSE FOR SYSTEMS ENGINEERING Supply Chain Attack Patterns: Framework and Catalog
Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
Missile Defense Agency Small Business Conference Supply Chain Risk Management (SCRM) Information Briefing
Missile Defense Agency Small Business Conference Supply Chain Risk Management (SCRM) Information Briefing Mr. David S. Lane Assistant Director BMDS Acquisition Security Missile Defense Agency 13-14 August
The Software Supply Chain Integrity Framework. Defining Risks and Responsibilities for Securing Software in the Global Supply Chain.
The Software Supply Chain Integrity Framework Defining Risks and Responsibilities for Securing Software in the Global Supply Chain July 21, 2009 Editor Stacy Simpson, SAFECode Contributors Dan Reddy, EMC
Department of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems
Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 DoD CIO SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure 1 1. PURPOSE. This Instruction:
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
Cybersecurity is one of the most important challenges for our military today. Cyberspace. Cybersecurity. Defending the New Battlefield
Cybersecurity Defending the New Battlefield Steven J. Hutchison, Ph.D. Cybersecurity is one of the most important challenges for our military today. Cyberspace is a new warfighting domain, joining the
Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise
Department of Defense DIRECTIVE SUBJECT: Management of the Department of Defense Information Enterprise References: See Enclosure 1 NUMBER 8000.01 February 10, 2009 ASD(NII)/DoD CIO 1. PURPOSE. This Directive:
Department of Defense. SUBJECT: Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS)
Department of Defense DIRECTIVE NUMBER 4630.05 May 5, 2004 Certified Current as of April 23, 2007 ASD(NII)/DoD CIO SUBJECT: Interoperability and Supportability of Information Technology (IT) and National
Report No. D-2010-058 May 14, 2010. Selected Controls for Information Assurance at the Defense Threat Reduction Agency
Report No. D-2010-058 May 14, 2010 Selected Controls for Information Assurance at the Defense Threat Reduction Agency Additional Copies To obtain additional copies of this report, visit the Web site of
Adding a Security Assurance Dimension to Supply Chain Practices
Adding a Security Assurance Dimension to Supply Chain Practices John Whited, CISSP, CSSLP Randall Brooks, CISSP, CSSLP Raytheon Company Session ID: GRC-401 Session Classification: Intermediate Agenda What
Writing a Systems Engineering Plan, or a Systems Engineering Management Plan? Think About Models and Simulations
Writing a Systems Engineering Plan, or a Systems Engineering Management Plan? Think About Models and Simulations Philomena Zimmerman Office of the Deputy Assistant Secretary of Defense for Systems Engineering
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services
1. Computer Security: An Introduction Definitions Security threats and analysis Types of security controls Security services Mar 2012 ICS413 network security 1 1.1 Definitions A computer security system
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville [email protected]
Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville [email protected] Current State of Cybersecurity in the DoD Current Needs Communications focus Changing
AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Cybersecurity Controls Over a Major National Nuclear Security Administration Information System DOE/IG-0938
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8115.01 October 10, 2005 ASD(NII)/DoD CIO SUBJECT: Information Technology Portfolio Management References: (a) Subtitle III of title 40, United States Code (formerly
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700 OPERATIONAL TEST AND EVALUATION AUG 0 1 2014 MEMORANDUM FOR COMMANDER, ARMY TEST AND EVALUATION COMMAND COMMANDER, AIR
Achieving True Risk Reduction through Effective Risk Management
Achieving True Risk Reduction through Effective Pete Nolte Deputy Director, Major Program Support Office of the Deputy Assistant Secretary of Defense for Systems Engineering 16th Annual NDIA Systems Engineering
Cyber Security for Advanced Manufacturing Next Steps
Status Update Cyber Security for Advanced Manufacturing Next Steps NDIA Manufacturing Division February 19, 2015 Michael McGrath Consultant, Analytic Services Inc. [email protected] NDIA White
Civil Aviation and CyberSecurity Dr. Daniel P. Johnson Honeywell Aerospace Advanced Technology
Civil Aviation and CyberSecurity Dr. Daniel P. Johnson Honeywell Aerospace Advanced Technology Outline Scope Civil aviation regulation History Cybersecurity threats Cybersecurity controls and technology
Update: OSD Systems Engineering Revitalization Efforts
Update: OSD Systems Engineering Revitalization Efforts 23 October 2007 Col Rich Hoeferkamp Ms. Sharon Vannucci Systems and Software Engineering (Enterprise Development) Office of the Deputy Under Secretary
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Evaluation Report. Office of Inspector General
Evaluation Report OIG-08-035 INFORMATION TECHNOLOGY: Network Security at the Office of the Comptroller of the Currency Needs Improvement June 03, 2008 Office of Inspector General Department of the Treasury
Is the Cost of Reliability, Maintainability, and Availability Affordable for Software Intensive Systems?
Is the Cost of Reliability, Maintainability, and Availability Affordable for Software Intensive Systems? Presented to IEEE Software Technology Conference Long Beach, CA Myron Hecht April, 2014 1 The Aerospace
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia
Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Marshall D. Abrams, The MITRE Corporation Joe Weiss, Applied Control Solutions, LLC Annual Computer Security
GAO. IT SUPPLY CHAIN Additional Efforts Needed by National Security- Related Agencies to Address Risks
GAO For Release on Delivery Expected at 10:00 a.m. EDT Tuesday, March 27, 2012 United States Government Accountability Office Testimony Before the Subcommittee on Oversight and Investigations, Committee
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Introduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
Security Control Standard
Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
How To Ensure Your Software Is Secure
Software Assurance Countermeasures in Program Protection Planning MARCH 2014 Deputy Assistant Secretary of Defense for Systems Engineering and Department of Defense Chief Information Officer Washington,
Joint Interoperability Certification
Joint Interoperability Certification What the Program Manager Should Know Chris Watson (Note: This article is an updated version of Joint Interoperability Certification: What the Program Manager Should
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Capabilities for Cybersecurity Resilience
Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances
Risk Management Handbook
Risk Management Handbook 1999 Introduction Risk management is the process of selecting and implementing countermeasures to achieve an acceptable level of risk at an acceptable cost. The analytical risk
GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate
DoDI 8500-2 IA Control Checklist - MAC 3-Public. Version 1, Release 1.4. 28 March 2008
DoDI 8500-2 IA Control Checklist - MAC 3-Public Version 1, Release 1.4 Developed by DISA for the DOD UNTILL FILLED IN CIRCLE ONE FOR OFFICIAL USE ONLY (mark each page) CONFIDENTIAL and SECRET (mark each
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide
COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the
FOUNDATION: Material Solution Analysis Is More Than Selecting an Alternative
Establishing the Technical FOUNDATION: Material Solution Analysis Is More Than Selecting an Alternative Aileen G. Sedmak, Zachary S. Taylor, and Lt Col William A. Riski, USAF (Ret.) Several government
Risk Management in DoD Programs
in DoD Programs James Thompson Director, Major Program Support Office of the Deputy Assistant Secretary of Defense for Systems Engineering National Defense Industrial Association (NDIA) Industrial Committee
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Presidential Directive NSPD 54/HSPD 23, Cybersecurity Policy, established United States policy, strategy, guidelines,
Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes
Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes Joe Jarzombek, PMP, CSSLP Director for Software & Supply Chain Assurance Stakeholder
Software Assurance in Acquisition and Contract Language
Software Assurance in Acquisition and Contract Language Acquisition & Outsourcing, Volume I Version 1.1, July 31, 2009 Software Assurance (SwA) Pocket Guide Resources This is a resource for getting started
PENETRATION TESTING GUIDE. www.tbgsecurity.com 1
PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a
U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)
Using Parametric Software Estimates During Program Support Reviews
Using Parametric Software Estimates During Program Support Reviews Version 1.0 Chris Miller Office of the Deputy Director, Software Engineering and System Assurance SYSTEMS & SOFTWARE ENGINEERING Office
NASCIO 2015 State IT Recognition Awards
NASCIO 2015 State IT Recognition Awards Title: State of Georgia Private Security Cloud Implementation Category: Cybersecurity Contact: Mr. Calvin Rhodes CIO, State of Georgia Executive Director, GTA [email protected]
Services we provide. Tel: +1 561-623-8810 email: [email protected] http://www.eetengineering.com
EET Engineering specializes in providing timely, cost-efficient, quality engineering solutions to support the successful implementation of our customer s requirements. For over 24 years, our leadership
Announcement of a new IAEA Co-ordinated Research Programme (CRP)
Announcement of a new IAEA Co-ordinated Research Programme (CRP) 1. Title of Co-ordinated Research Programme Design and engineering aspects of the robustness of digital instrumentation and control (I&C)
Information Assurance Manual
THE SECRETARY OF THE NAVY SECNAV M-5239.1 Department of the Navy Information Assurance Program Information Assurance Manual Published By The Department of the Navy Chief Information Officer DEPARTMENT
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
National Infrastructure Protection Center
National Infrastructure Protection Center Risk Management: An Essential Guide to Protecting Critical Assets November 2002 Summary As organizations increase security measures and attempt to identify vulnerabilities
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Integrating Cyber Security into Nuclear Power Plant Safety Systems Design
Integrating Cyber Security into Nuclear Power Plant Safety Systems Design Deanna Zhang U.S. Nuclear Regulatory Commission Document Date: 05/21/2010 Objectives To provide methods for utilizing safety features,
Table of Contents CYBER SECURITY STRATEGIC PLAN VERSION 1.0
U.S DEPARTMENT OF ENERGY CYBER SECURITY PROGRAM CYBER SECURITY STRATEGIC PLAN FEBRUARY 12, 2007 Table of Contents INTRODUCTION... 4 CYBER SECURITY STRATEGY OVERVIEW... 5 CYBER SECURITY VISION AND MISSION...
Cybersecurity Delivering Confidence in the Cyber Domain
Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your
System/Data Requirements Definition Analysis and Design
EXECUTIVE SUMMARY This document provides an overview of the Systems Development Life-Cycle (SDLC) process of the U.S. House of Representatives. The SDLC process consists of seven tailored phases that help
Cyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
