Working Group 9 Cyber Analysis
|
|
|
- Emily Hardy
- 9 years ago
- Views:
Transcription
1 Working Group 9 Cyber Analysis Co-Chair: Mr. David Silvernail Space and Missile Defense Command (SMDC), Huntsville, AL. [email protected] Co-Chair: Mr. Paul Works TRADOC Analysis Center (TRAC), Ft. Leavenworth, KS. [email protected]
2 Keywords: 170A, 255-Series Warrant Officer Warrant Officer Inventory Flow Model [27 Oct 15, , Rm 14] Allan Cain United States Army Cyber Center of Excellence ABSTRACT: The United States Army Cyber Center of Excellence (CCoE) has developed an inventory flow model to forecast personnel requirements for a given Military Occupational Specialty (MOS). The 255 Series and the newly created 170A are examined using this model and the results are described in this work. Promotion, attrition, and MOS reclassification rates were represented by multiple independent Beta distributions. The number of iterations are determined by the user and the output of the simulation provides lower-bound, mean, and upper-bound values for each year of a five-year projection. Microsoft Excel was chosen as the medium to performing the simulations to allow for portability and ease of use. This tool provides career managers with timely insights regarding the expected effects of accessions over time. With respect to 170A, the model indicated that the inventory plan under consideration would have negatively impacted the careers of the upcoming Warrant Officers. Our analysis efforts corrected the issue and improved management of the MOS.
3 Cyberspace Operations Analysis Task Force (COATF) [27 Oct 15, , Rm 14] Paul Page U.S. Army Space and Missile Defense Command/Army Forces Strategic Command David L. Silvernail U.S. Army Space and Missile Defense Command/Army Forces Strategic Command Keywords: Cyberspace Operations, Cyberspace Studies ABSTRACT: Cyberspace Operations has emerged as a key analytical focus area for the DoD analytic community, both technical and operational. At this time, multiple Army, Joint, and other service Cyberspace studies and related working groups are assessing cyber impacts on strategic, operational, and tactical operations. In the Fall of 2013, the U.S. Army Space and Missile Defense Command (USASMDC) and TRADOC Analysis Center (TRAC) analysis subject matter experts (SMEs) were tasked to meet and identify potential lanes of collaboration for Cyberspace analysis. Beginning in October, 2014, TRAC and USAMDC hosted a series of meetings of the Cyberspace Operations Analysis Task Force (COATF) to determine a baseline for Army cyber analysis methodologies and develop an Army analytic strategy focused on utilization of credible analysis techniques for cyberspace analysis. The briefing will review the COATF composition, objectives, process, and progress to date to include the emerging results of the COATF Use Case Study on Defensive Cyberspace Operations Response Actions (DCO-RA) at Corps and below.
4 Concept for a Tactical Cyber Warfare Training Prototype for Current Live Virtual and Constructive (LVC) Simulations [27 Oct 15, , Rm 14] Christopher J. Metevier US Army RDECOM ARL HRED STTC [email protected] Henry Marshall Army Research Laboratory (ARL) [email protected] Joseph McDonnell Dynamic Animation Systems [email protected] Lana McGlynn McGlynn Consulting Group [email protected] Keywords: Cyber Analysis, Live, Virtual, Constructive, and Gaming, Systems Engineering, Cyber Operations Battlefield Web Services, Modeling and Simulation ABSTRACT: Current major simulations among the Live, Virtual, Constructive, and Gaming (LVC&G) domains lack a cyber implementation with the exception of a low fidelity cyber warfare effects simulation in the One Semi-Automated Forces (OneSAF) program. This shortfall was identified as a major technology gap in the simulation community. To move towards a multi-domain cyber training solution, we conducted analysis of the problem space and developed an initial prototype to refine the user requirements as well as develop implementation architecture. The domain of cyber is very broad covering the whole range of mission command, weapon control, and information systems forcing us to pick the best focus to meet a likely Army use case. After conducting a gap analysis among stakeholders, a clear missing capability was a cyber warfare mission command service that would work in a LVC&G training environment. The goal of this research is to develop a loosely coupled software service, called Cyber Operations Battlefield Web Services (COBWebS), that provides the capability to stimulate the effects of various cyberattacks on command and control communication between the synthetic entities and the Blue mission command systems. Our prototype leverages the Mission Command Adapter Web Service and adds cyber warfare effects modeling. Incorporating COBWebS in a LVC&G training event allows the trainee to recognize and make decisions that will minimize the attacks effects on overall mission. This presentation provides an overview of our front end analysis and conceptual prototype design to solicit feedback from the Army OR community.
5 Incorporation of Decision Making and Deconfliction in an Integrated Air and Missile Defense (IAMD) Scenario Using EADSIM [28 Oct 15, , Rm 14] Mr. Paul Chang Mr. John Lumpkins Center for Army Analysis Keywords: Missile defense, integrated air and missile defense, IFF, Link-16, IBCS, cyber attack, sensor fusion, deconfliction, decision making, data functional descriptor, Ballistic and Cruise missiles, and Extended Air Defense Simulation (EADSIM) ABSTRACT: Deconfliction of multiple sensors in an Integrated Air and Missile Defense (IAMD) environment has become increasingly important to effectively engage a diverse set of inbound threats. As the spoofing and jamming capabilities of airborne and missile threat systems become more complex and robust, the perception from different IAMD systems looking at the same threat can be different. This problem is complicated by the short time span from detection to impact for most threat systems. New IAMD systems use sensor fusion to present all sensor data to an IAMD commander for his/her engagement decision. In these scenarios, the IAMD commander must decide which sensor data is most reliable based on his/her knowledge of the threat. In this analysis, the data functional descriptor (DFD) within the Extended Air Defense Simulation (EADSIM) was used to code a decision-making and deconfliction hierarchy amongst different sensors. The DFD allows the user to rank the information provided by different sensors relative to each other in order to prioritize some sensors over others. Three different scenarios were modeled involving multiple external sensor inputs into a central decision making hub trying to engage a threat system with conflicting Identification Friend or Foe (IFF). All three scenarios involved the use of cyber attack to confuse the IAMD systems, thus resulting in conflicting IFF. One scenario involved incursion of new threat in a very time-sensitive situation with conflicting IFF. The scenarios were modeled using the current military tactical data exchange network, Link-16, as well as IAMD Battle Control System (IBCS).
6 Cyberspace Analysis: An Overview of the Cyberspace Domain and the Cyberspace Analysis Focus Areas of the Space and Missile Defense Command [28 Oct 15, , Rm 14] David L. Silvernail U.S. Army Space and Missile Defense Command/Army Forces Strategic Command Mike Thorne U.S. Army Space and Missile Defense Command/Army Forces Strategic Command Keywords: Cyberspace, Cyber Studies ABSTRACT: Cyberspace is a Domain -- man made, virtual, constantly expanding, and unique. It is not geographically constrained and can impact anyone anywhere within seconds. Land was once the dominant domain in ancient warfare and ancient armies fought for years to determine the outcomes. Today the Cyberspace Domain is causing a Revolution in Military Affairs (RMA). Military forces dependent on efficiencies gained by unprecedented C4I and smart weapons are at great risk. Those very efficiencies can be nullified very quickly and the Calculus of Warfare will change. Cyberspace will change warfare and the unprecedented rate of technological advance will make this domain more challenging to grasp than all the other domains and changes throughout the history of warfare. The ground Warfighter is becoming increasingly reliant on the Cyberspace domain to win at the Strategic, Operational and Tactical levels of War. The analysis examines Cyberspace operational components and quantifies the operational impacts to the current and future Warfighter during Unified Land Operations. This analysis further seeks to determine the aspects of the cyberspace domain that impact the current and future ground Warfighter; to understand the impacts and effects of cyber operations; and to identify Cyberspace key terrain that require protection against Cyber Attacks. The Army Space and Missile Defense Command (SMDC) Future Warfare Center (FWC) has completed seven studies in support of the Army Study Program (ASP) and Army Cyber Command (ARCC). These studies stem from the initial study proposal submitted in The focus areas include: (1) Brigade Combat Team (BCT) level Cyberspace Situational Awareness (SA) and key terrain identification; (2) Dynamic Cyber Defense (DyCD) in support of tactical operations; and (3) the integrating capabilities of the Cyber Electro-Magnetic Activities (CEMA) element across Cyberspace Mission Areas as identified and developed by the ARCC; (4) Defensive Cyberspace Operations-Response Actions (DCO-RA) in support of tactical operations; (5) The Landcyber 2 Study based on the Landcyber White Paper; (6) Extended Capabilities Study in support of the Tactical Commander; (7) the Army Equities in Cyberspace Study examining the Phase 0 and Phase 1 implications. The methodology has been to identify the first, second, and third order of cyberspace effects as determined by the ability to deceive, deny, degrade, disrupt, and destroy capabilities through the conduct of cyberspace operations in support of tactical operations. The specific focus was is in the area of the overall impacts to combat operations through the utilization of constructive analysis capabilities to explicitly and implicitly modeling of cyberspace operations. The overview of the SMDC FWC analysis of the cyberspace domain concludes by identifying some of the challenges inherent in the analysis of cyberspace operations and presents a way ahead to set the conditions for future analysis.
7 Cyberspace Key Terrain [28 Oct 15, , Rm 14] Mr. John L. Cole U.S. Army Research Laboratory Keywords: cyber, terrain, maneuver, targeting, fires ABSTRACT: In the two-domain (land and cyber) warfare focus of the Army, Cyberspace Key Terrain (CKT) is a composite of terrain features from cyber and land domains, and these features include information and infrastructure elements. Terrain features in the cyber and land domains intersect and overlap in a number of ways according to the variety and number of media and platforms, both fixed and mobile, used in the cyber infrastructure that exists in the battlefield; and from the reliance on information technology in the battlefield, including use of cyber-physical systems. Land domain features such as high ground are analogous to the value and use of timely information, suggesting other analogs that cross domains. CKT is dynamic, changing with time, circumstances, cyber topology, and physical location, although some attack pathways in that terrain may have longer persistence because of investment in their development. Viewed in the context of cross-domain operations, and defined by the circumstances of the moment, CKT is still only one part of cyber operations, whether defensive or offensive, in which sets of interdependent maneuvers, agility techniques, terrain considerations, and complex targeting methods are employed. Even so, understanding CKT enables commanders to categorize and prioritize assets according to mission criticality, both to protect them and to use them in cyber maneuvers directly affecting land operations. Defining CKT for each circumstance is a significant burden, but the granularity is needed for appropriate selection and execution of maneuvers, for accurate battle damage assessment, for assessment of munitions effectiveness, for adherence to rules of engagement, and to achieve minimal collateral damage. And a defined cyber terrain means that cyber fires may be used with targeting concepts analogous to danger close and collateral damage control in the land domain. The footing CKT has in two domains, along with cyber domain contributions in terms of information and infrastructure elements presents a challenge to any who need a practical definition on the fly in circumstances that are unique from one moment to another. But with awareness of the potential components of CKT and experience in evaluating this composite terrain, the challenge can be met.
8 Metrics for Tracking and Evaluating Cybersecurity Posture [28 Oct 15, , Rm 14] Ms. Jasmin Farahani and Dr. Natalie Scala Towson University LTC Paul L. Goethals Army Cyber Institute Keywords: Cybersecurity, Decision Analysis, Value-Focused Modeling ABSTRACT: In the context of security, businesses and agencies are frequently reminded of the vulnerabilities that exist in today s cyber environment. Data breaches continue to affect millions of computer users, while consuming valuable time, money, and other resources within the Department of Homeland Security, Federal Bureau of Investigation, and the Department of Defense. Privacy issues, the failure to find a standard in protection, and a constantly evolving cyber landscape all contribute to the complexity of the cybersecurity problem. In order to establish a benchmark for operational capability and facilitate decision making in this environment, analytical models are needed that provide a greater level of situational awareness with respect to the protection of information. Given the ability to assess an organization s degree of cybersecurity, the likelihood of predicting the location of a data breach may also increase. To address this problem, our research objective is to identify a measure that evaluates the posture of an organization in defending against a cyberattack. Several examples of metrics in the decision analysis literature are presented that do or potentially might align with the measurement of cybersecurity posture. Then, an application of utility theory using techniques in optimization is explored in the design of an effective model. Extensions to future work in this area are also presented. The research is motivated by a Science of Security initiative that selected improved measurement capabilities as an area of emphasis that would benefit cybersecurity and defense programs.
9 Toward a Cyberspace Situational Awareness Capability [28 Oct 15, , Rm 14] Keywords: Cyber, Situational Awareness, SA Mr. William Jay Martin, CTR U.S. Army Cyber Center of Excellence [email protected] ABSTRACT: Nearly all U.S. Army capabilities ride on some kind of network, yet, there is currently no means to provide real-time situational awareness of the cyberspace domain for Army tactical combat units. This leaves tactical commanders blind to potential cyberspace threats and opportunities, lessens their ability to defend their own networks, and places the Army s network enabled capabilities at risk. The Army considers cyberspace situational awareness a top priority, and several Cyber SA related platforms already exist, but the Army lacks the ability to aggregate, analyze, and synthesize the information, and then integrate a visual representation of that information into the common operational picture. This paper establishes the necessity of Cyber SA, describes what is needed to achieve it, and then suggests how it can be integrated into the common operational picture at Army tactical echelons. It then provides a vignette to illustrate how Cyber SA might be used in the planning, preparation, execution, and assessment of future Army operations.
10 Virtual Radio Frequency (RF) Device Interactive Simulation Environment (ViRDISE) [29 Oct 15, , Rm 3] Kevin D. Sobczak USArmy RDECOM CERDEC ABSTRACT: Virtual Radio Frequency (RF) Device Interactive Simulation Environment (ViRDISE) is an entity-level 3D simulation program designed tomodel and simulate the effects of RF energy propagation in a realistic, operationally relevant environment. The main features of ViRDISE include a C# simulation server, 3D interactive environments powered by Epic Games' Unreal Engine 3 (UE3R), and various tools and methodologies to show RF propagation. RF systems are modeled using either the intuitive block diagram structure of MathWorks Simulink or by using the hardware-in-the-loop option provided by ViRDISE. ViRDISE calculates the propagation losses between all RF systems; this information is used in real time for either the Simulink model or the optional hardware-in-the-loop integration. The end-user can create custom vignettes by selecting an environment, adding assets, and assigning behaviors. ViRDISE can either run in a single-user, stand-alone mode or it can support multiple human-controlled nodes connected via TCP/IP. ViRDISE uses shared memory for interprocess communication between the C# simulation server, the game engine's host, and Simulink. Communication between the multiple simulation nodes is handled primarily through UE3's built-in data replication. In addition, transmitted RF propagation effects from terrain and antenna configuration can be visually displayed around RF systems. ViRDISE can be used as either a training aid or a modeling tool to assess operational effects of various RF systems. ViRDISE forms a framework in which integrating a popular, commercially available game engine and proven mathematical modeling tools can contribute to the modeling and simulation community.
11 Analysis of the Use of Intelligent Agents in Cyber Operations Testing [29 Oct 15, , Rm 4] Ethan Trewhitt, Stephen Lee-Urban, Ph.D., Joel Odom, Matthew Guinn, Trevor Lewis, Michael, Riley, Kevin Dickerson, Elizabeth T. Whitaker, Ph.D. Georgia Tech Research Institute George Thurmond, Ph.D., Emanuel Tornquist PEO STRI/Threat Systems Management Office (TSMO) Keywords: Intelligent Agents, Cyber Operations Testing, Threat Analysis ABSTRACT: The goal of this study is to provide knowledge and understanding that will allow the Army to design, build or harden systems so that they are more resistant to cyber exploitation and to enhance the ability of Army systems to prevent, detect, react and recover from attacks. A set of intelligent agents can be designed to collaborate to solve a complex problem, each agent having its own set of knowledge and expertise and being able to respond to requests from other agents for help in solving the problem. Agents can also act competitively working against each other using game theoretic approaches. An intelligent agent can contain or have access to knowledge about context or problem solving and can use any of the artificial intelligence reasoning techniques that are available to larger more comprehensive software modules. Some agents are mobile, that is they can move across a network to operate on multiple network nodes. Any of the intelligent agent paradigms could be used by cyber threat actors. Intelligent agents as individual intelligent software entities or as a collaborating set or as a swarm with emergent intelligence could be designed to manifest cyber offensive tactics, techniques or procedures (TTPs). We have provided an analysis of intelligent agent architectures and modeling and simulation approaches to evaluate their feasibility in cyber operations testing. This study includes an analysis of the design parameters of intelligent agent architectures and the implications of these parameter choices for agent behaviors in a cyber operations test. In order to motivate and support this analysis we provide several scenario use cases which envision the use of advanced intelligent agent teams in a cyber operations test. We have done a preliminary analysis of the feasibility of including these approaches in current Army cyber operations testing tools.
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
Systems Engineering and Integration Efforts. 11 Dec 2013
Systems Engineering and Integration Efforts 11 Dec 2013 Mr. Leo Smith Director, PoR Engineering Support ASA(ALT) System of Systems Engineering & Integration Directorate (SOSE&I) Approved for Public Release;
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
Always On-On Demand: Supporting the Development, Test, and Training of Operational Networks & Net-Centric Systems
Always On-On Demand: Supporting the Development, Test, and Training of Operational Networks & Net-Centric Systems SoS Engineering Collaborators Info Exchange 16 September 2014 Dr. Nancy Bucher ASA(ALT)
Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach
Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach Executing a Critical Infrastructure Risk Management Approach Risk is defined as the potential for an unwanted outcome resulting
Simulation and Training Solutions
Simulation and Training Solutions Strong Learning Experiences Available Nowhere Else Advancing Operational Readiness with Leading-Edge Simulation and Training The rapid evolution of military missions,
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
Department of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
MORE CAPABLE DOD CONSTRUCTIVE SIMULATIONS ARE SUPPORTING AN EXPANDED TRAINING AUDIENCE.
MORE CAPABLE DOD CONSTRUCTIVE SIMULATIONS ARE SUPPORTING AN EXPANDED TRAINING AUDIENCE. The government/industry team has a number of efforts in progress to increase the usability, affordability, fidelity
Army Doctrine Update
Combined Arms Doctrine Directorate US Army Combined Arms Center Fort Leavenworth, Kansas Army Doctrine Update This document summarizes some doctrinal changes that have occurred or will occur in the near
U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview
U.S. Army Research, Development and Engineering Command Cyber Security CRA Overview Dr. Ananthram Swami, ST Network Science 18FEB 2014 Cyber Security Collaborative Research Alliance A Collaborative Venture
Ms. Sandy Veautour Chief Systems Engineer PSG
Ms. Sandy Veautour Chief Systems Engineer PSG SBIR Initiatives Phase I FY 07 3 Awards High Speed Wireless 3-D Video Transmission to Support Virtual Dismounted Training 2 Phase I contract awards Battlefield
Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace
, pp.137-146 http://dx.doi.org/10.14257/ijseia.2014.8.9.11 Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace Jung ho Eom Military Studies, Daejeon University, 62 Daehakro,
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Who s got the grease pencil?! What Cyber Security can Learn from the Outer Air Battle
Phantom Works Advanced Modeling & Simulation Who s got the grease pencil?! What Cyber Security can Learn from the Outer Air Battle Mark N. Clemente 15 th ICCRTS June 22, 2010 BOEING is a trademark of Boeing
The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL
The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term
Usability Study of the Department of Defense Joint Analysis System
Usability Study of the Department of Defense Joint Analysis System Doug Bardin, Estelle Hong, Daniel O Loughlin and Zachary Maodus Abstract The Department of Defense (DoD) uses modeling and simulation
Test/Cyber Requirements and Capability Gaps Abstract
Test/Cyber Requirements and Capability Gaps Abstract The use of cyberspace operations to defend supported networks and project power through the digital domain is at the leading edge of new age warfare.
Fight the Network. Presented By Kevin Jacobs On Behalf of WIN-T TMD and CERDEC S&TCD CyberOps Branches [email protected]. Briefing name l Date (1)
Fight the Network Presented By Kevin Jacobs On Behalf of WIN-T TMD and CERDEC S&TCD CyberOps Branches [email protected] Briefing name l Date (1) Problem Army Strategy for Net-Centric Fighting Force
AUSA Background Brief
AUSA Background Brief No. 96 November 2002 An Institute of Land Warfare Publication Space, Missile Defense and Computer Network Operations Challenges: Computer Network Operations: A Critical Element of
Cybersecurity on a Global Scale
Cybersecurity on a Global Scale Time-tested Leadership A global leader for more than a century with customers in 80 nations supported by offices in 19 countries worldwide, Raytheon recognizes that shared
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Director of Intelligence Proposed Research Topics
Director of Proposed Research Topics Suggested Graduate Program Thesis Topics Headquarters, U.S., 3000, Pentagon, Room 1A262B, Washington, DC 20350-3000 Sept 2011 DIRINT Suggested Graduate Program Thesis
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the
Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC
Visualization, Modeling and Predictive Analysis of Internet Attacks Thermopylae Sciences + Technology, LLC Administrative POC: Ms. Jeannine Feasel, [email protected] Technical POC: George Romas, [email protected]
Long Term Defence Study
Long Term Defence Study 2014-09-10 LtCol Johan Hansson SwAF HQ 1 Long Term Defence Studies Three main objectives: To identify uncertainties. To create some scenarios which demonstrates the coming challenges
PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM
Overlook Systems Technologies, Inc. 1950 Old Gallows Road, Suite 400 Vienna, VA 22182 (703)-893-1411 PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM A PROPOSED SOLUTION TO ADDRESS RISK TO U.S. CRITICAL INFRASTRUCTURE
AIR- SEA BATTLE. Service Collaboration to Address Anti-Access & Area Denial Challenges. May 2013
AIR- SEA BATTLE Service Collaboration to Address Anti-Access & Area Denial Challenges White PantoneBlackC PantoneReflexBlueC Pantone 116C Pantone 165C Pantone 422C Pantone 471C Pantone 551C May 2013 This
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Cybersecurity Delivering Confidence in the Cyber Domain
Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University Email:[email protected]
Applications of mobile ad-hoc networks my article applications of mobile ad-hoc networks at http://www.computingunplugged.com/issues/issue2004 09/00001371001.html Humayun Bakht School of Computing and
Project Manager Integrated
Project Manager Integrated Training Environment (PM ITE) COL Roland M. Gaddy Jr. PEO STRI Project Manager Integrated Training Environment (PM ITE) 18 June 2015 PM ITE Organization PM Integrated Training
AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration
Headquarters Air Combat Command AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration This Briefing is: UNCLASSIFIED Mr. John Vona, GS-15 AFC2IC/C2P Purpose Discuss
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Docket No. DHS-2015-0017, Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations
Submitted via [email protected] and www.regulations.gov July 10, 2015 Mr. Michael Echols Director, JPMO-ISAO Coordinator NPPD, Department of Homeland Security 245 Murray Lane, Mail Stop 0615 Arlington VA
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 3000.09 November 21, 2012 USD(P) SUBJECT: Autonomy in Weapon Systems References: See Enclosure 1 1. PURPOSE. This Directive: a. Establishes DoD policy and assigns
Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
Network Mission Assurance
Network Mission Assurance Michael F. Junod, Patrick A. Muckelbauer, PhD, Todd C. Hughes, PhD, Julius M. Etzl, and James E. Denny Lockheed Martin Advanced Technology Laboratories Camden, NJ 08102 {mjunod,pmuckelb,thughes,jetzl,jdenny}@atl.lmco.com
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
Designing Law Enforcement: Adaptive Strategies for the Complex Environment
Designing Law Enforcement: Adaptive Strategies for the Complex Environment John A. Bertetto, Police Officer, Chicago Police Department Crime Control Strategies As law enforcement professionals, we often
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
Predictive Cyber Defense A Strategic Thought Paper
Predictive Cyber Defense A Strategic Thought Paper Don Adams Vice President, Chief Technology Officer, Worldwide Government TIBCO Software Federal, Inc 2 Summary The art and science of multi-sensor data
Cybersecurity Converged Resilience :
Cybersecurity Converged Resilience : The cybersecurity of critical infrastructure 2 AECOM Port Authority of New York and New Jersey (PANYNJ), New York, New York, United States. AECOM, working with the
2011 Cyber Security and the Advanced Persistent Threat A Holistic View
2011 Cyber and the Advanced Persistent Threat A Holistic View Thomas Varney Cybersecurity & Privacy BM Global Business Services 1 31/10/11 Agenda The Threat We Face A View to Addressing the Four Big Problem
The USNA Cyber Program
The USNA Cyber Program Turning Midshipmen into Cyber Warriors CAPT Paul Tortora, USN Director, Center for Cyber Security Studies Bottom Line Up Front All Midshipmen now take two Cyber Security Courses
Some Thoughts on the Future of Cyber-security
Some Thoughts on the Future of Cyber-security Mike Thomas Information Assurance Directorate National Security Agency NSI IMPACT April 2015 1 Introduction, or Why are we here? National security missions
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
White Paper Assured PNT Inside Military Ground Vehicles Using D3
White Paper Assured PNT Inside Military Ground Vehicles Using D3 Brian Paul December 2013 Introduction Global Positioning System (GPS) technology has become an integral part of Mission Command systems
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012
(U) SIGINT Strategy 2012-2016 23 February 2012 (U) Vision (U) Ensure Signals Intelligence provides THE decisive edge in advancing the full spectrum of U.S. national security interests. (U) Mission (U)
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
Navy Information Dominance Industry Day
Navy Information Dominance Industry Day Vice Admiral Kendall Card Deputy Chief of Naval Operations for Information Dominance and Director of Naval Intelligence OPNAV N2/N6 Evolution of Warfare 1990 Non-Kinetic
DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE
DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE Originating Component: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics Effective: January 14, 2016 Releasability:
Simulating Information Warfare Using the HLA Management Object Model
Simulating Information Warfare Using the HLA Management Object Model Roger Smith BTG Inc. Orlando, Florida 32765 [email protected] Keywords: Information Operations, High Level Architecture, Management
Army Research Laboratory Technical Strategy 2015-2035
Army Research Laboratory Technical Strategy 2015-2035 1 Approved for public release; distribution unlimited April 2014 EXECUTIVE SUMMARY The Army Research Laboratory (ARL) has developed an overarching
COMBATSS-21 Scalable combat management system for the world s navies
COMBATSS-21 Scalable combat management system for the world s navies The COMBATSS-21 total ship combat management system was designed to deliver capability rapidly and affordably. Built on an open architecture,
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement 1.0 INTRODUCTION The Department of the Navy Space and Naval Warfare Systems
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett
Issue Paper Center for Strategic Leadership, U.S. Army War College May 2003 Volume 04-03 Wargaming Homeland Security and Army Reserve Component Issues By Professor Michael Pasquarett Background The President
CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63
CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 Updated: July 2015 TABLE OF CONTENTS CRYPTOLOGIC TECHNICIAN (NETWORKS) (CTN) SCOPE OF RATING GENERAL INFORMATION CRYPTOLOGIC CYBERSPACE ANALYST
CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.
Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive
Cyber R &D Research Roundtable
Cyber R &D Research Roundtable 2 May 2013 N A T I O N A L S E C U R I T Y E N E R G Y & E N V I R O N M E N T H E A L T H C Y B E R S E C U R I T Y Changing Environment Rapidly Evolving Threat Changes
The Need for a Systems Engineering Approach For Measuring and Predicting the Degradation of Aging Systems And How It Can Be Achieved
The Need for a Systems Engineering Approach For Measuring and Predicting the Degradation of Aging Systems And How It Can Be Achieved William Robinson Gisele Welch Gary O Neill Georgia Tech Research Institute
ADVANCED PERSISTENT THREATS & ZERO DAY ATTACKS
ADVANCED PERSISTENT THREATS & ZERO DAY ATTACKS AN INFORMATION SECURITY BATTLEFIELD From Static to Dynamic Defense Cyber Security Strategies, LLC 1 2008-2010 Is The Cyber Tipping Point ESTONIA GEORGIA CABLE
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
Oracle Real Time Decisions
A Product Review James Taylor CEO CONTENTS Introducing Decision Management Systems Oracle Real Time Decisions Product Architecture Key Features Availability Conclusion Oracle Real Time Decisions (RTD)
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).
G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE
G2 Industry Day 2015 29 JULY 2015 Mr. Stephen Kreider PEO IEW&S 1 PEO IEW&S Organization 2 PEO IEW&S Snap-Shot Overview Army Chartered Program Executive Officer responsible for management of assigned programs
A Risk Assessment Methodology (RAM) for Physical Security
A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to
Cybersecurity Strategic Talent Management. March, 2012
Cybersecurity Strategic Talent Management March, 2012 Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2 Talent Management Challenge Mission: Attract, Develop,
Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: What do large enterprises need in order to address increasingly
Defending against modern cyber threats
Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation
EL Program: Smart Manufacturing Systems Design and Analysis
EL Program: Smart Manufacturing Systems Design and Analysis Program Manager: Dr. Sudarsan Rachuri Associate Program Manager: K C Morris Strategic Goal: Smart Manufacturing, Construction, and Cyber-Physical
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
Northrop Grumman Cybersecurity Research Consortium
Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information
Troops Time Planner and Simulation Models For Military
SUPPORTING COURSES OF ACTION PLANNING WITH INTELLIGENT MANAGEMENT OF Contact Information: CELESTINE A. NTUEN & EUI H. PARK The Institute for Human-Machine Studies North Carolina A&T State University Greensboro,
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
September 24, 2015. Mr. Hogan and Ms. Newton:
Mr. Michael Hogan and Ms. Elaine Newton Office of the Director, Information Technology Laboratory National Institute of Standards and Technology 100 Bureau Drive Mail Stop 8930 Gaithersburg, MD 20899-8930
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Information Technology Risk Management
Find What Matters Information Technology Risk Management Control What Counts The Cyber-Security Discussion Series for Federal Government security experts... by Carson Associates your bridge to better IT
Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I Systems Integration
Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I s Integration Dr. Timothy D. Kehoe, Irene Chang, Dave Czulada, Howard Kong, Dr. Dino Konstantopoulos
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700 OPERATIONAL TEST AND EVALUATION FEB 0 1 2013 MEMORANDUM FOR COMMANDER, ARMY TEST AND EVALUATION COMMAND DIRECTOR, MARINE
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE ABSTRACT Changing regulatory requirements, increased attack surfaces and a need to more efficiently deliver access to the business
Army Intelligence Industry Day Foundation Layer Technology Focus Areas
CLEARED FOR PUBLIC RELEASE Army Intelligence Industry Day Foundation Layer Technology Focus Areas 27 JULY 2015 Mark Kitz System of Systems Engineering CLEARED FOR PUBLIC RELEASE 1 MISSION: Provide affordable,
FEDERAL RÉSUMÉ. Client Name PROFILE SUMMARY
A d d r e s s C i t y, S t a t e Z i p FEDERAL RÉSUMÉ Client Name E m a i l A d d r e s s P h o n e N u m b e r Citizenship: U.S. Citizen Veteran Status: Retired Job Announcement Number: ABDC-4894892 Job
NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;
NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will
Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the
Testimony Statement for the Record Martin Casado, Senior Vice President Networking and Security Business Unit VMware, Inc. Before the U.S. House of Representatives Committee on Science, Space, and Technology
THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
