Social Network Modeling and Simulation of Integrated Resilient Command and Control (C2) in Contested Cyber Environments
|
|
|
- Ariel McGee
- 10 years ago
- Views:
Transcription
1 Social Network Modeling and Simulation of Integrated Resilient Command and Control (C2) in Contested Cyber Environments Prime Award: FA Sub-Award: E Michael J. Lanham Geoffrey P. Morgan Kathleen M. Carley HDTRA MURI: FA Center for Computational Analysis of Social and Organizational Systems
2 Outline Problem Statement An Approach DoD Background Research Environment Planning Phases Scenarios of Interest Model Development Assessing Resilience Network Analytics Diffusion Simulation & Analysis Future Work 2
3 Problem Statement General: How do leaders assess the inter- and intraorganizational resilience of their organization s operations in a contested cyber environment? Specific: How does USAF leadership assure itself and its field commanders that its Air Operations Centers can continue to accomplish their missions in contested cyber environments? 3
4 An approach to solution(s) What if system for assessing the impact(s) of different types of cyber attacks on integrated C2 & identifying mitigation strategies Contested cyber environment - Multiple types of attacks Integrated C2 Alternative organizational structures Doctrine based Human + IT Why simulate? Why not inter- and intra-organizational war games, exercises and rehearsals? Expense Must expose broad sets of stakeholders to gauge broad impacts Segregated training environments Training Distractor Extrapolation of lack-of-impact everyday cyber effects to longduration/time-critical impacts Other ideas? 4
5 Research Enviroment Overall Scenario: four (4) Combatant Commands collaborating on a set of interconnected plans implementing strategic guidance Sub-implementation was at HQs level with colored Petri Nets Sub-implementation was at high-level IT abstraction implemented at packet-level granularity Sub-implementation was with four (4) USAF Air Operations Centers that have to transform strategic guidance and plans into orders that set tactical efforts in motion Model creation via network extraction from USAF Doctrine/texts Network analytics using CMU s ORA People (and role and groups) IT systems Initial dynamic network immediate impact also via ORA for two types of cyber effects: integrity and availability More robust dynamic network assessment through agent-based modeling using CMU s Construct for same cyber effects: integrity and availability 5
6 Research Enviroment AF GS Comp GMU FOCUS CMU FOCUS AF Cyber Comp STRATCOM AOC AF Cyber Ops Ctr Regional AOC AF Space Ops Ctr Regional Air Comp AF Space Comp 6
7 Scenarios of Interest For all scenarios The AOC is engaged in planning Critical to getting an integrated COA Joint Planning Group (JPG) has received a mission order (the OPORD) task is to distribute that mission order to others within the AOC and gain their input, plan how to meet the intent of the OPORD Network Structures Uncontested Cyber Environment - Normal Doctrine documents to define agent structure. Doctrine documents and SMEs to define available IT and human to IT links 5 Communication networks SIPR, NIPR, VoIP, JWICS and sneaker (face-toface) Contested Cyber Environments - Under Attack The network is changed by a cyber attack. Multiple cyber attack scenarios are considered (e.g. DNS availability, Integrity Attacks, single AOC, multiple AOCs, single IT systems, multiple IT systems) Environment Features Communications Perfect/Damaged/Destroyed Information accurate or inaccurate 7
8 Scenarios (27 cases) 1. Baseline Normal operations no attacks 2. DNS/Denial of Service a. Attack reduces DNS availability by 30% b. Attack can be against Regional AOC/All AOCs c. Attack can be against TBMCS, GCCS, C2PC, JADOCS or all d. Attack can be against limited combos (TG, GC, CJ, TGCJ) 3. Integrity Attack a. Attack injects bad JPG knowledge to key IT systems, 2-5 bits per interaction, 2 interactions per turn b. Attack can be against Regional AOC/All AOCs c. Attack can be against TBMCS, GCCS, C2PC, JADOCS d. Attack can be against limited combos (TG, GC, CJ, TGCJ) 4. DNS and Integrity paired in each combination 8
9 Model Development - AOCS 9
10 People to People Network Structure for Regional AOC Sized by Authority Centrality and Colored by Betweeness Centrality (Blue is most central) Divisions and Functional Groups Agents collapsed into metanodes 10
11 IT Systems 468 IT systems in the simulation 117 per AOC Distinct named systems identified in doctrinal references Modeled as agents capable of receiving, sending and storing information All are modeled as push agents 58 IT resources, not explicitly discussed in doctrine E.g., SIPR, NIPR, JWICS, and VoIP terminal and phone links These systems don t store knowledge in the sim, but provide mechanisms for agents to communicate with when they are not communicating face-to-face These are modeled as communication modes each of which operates at a particular level of classification, and can be separately attacked 11
12 Inter-AOC Communication Each division head can send and receive messages from his or her counterpart other AOCs Strategy, Combat Plans, Combat Ops, ISR, Air Mobility There are IT to IT direct links between AOCs These are through SIPR, NIPR, VoIP and JWICS In addition there are system to system links E.g. TBMCS in different AOCs connect through SWIC Similarly for GCCS,C2PC & JADOCS AOC A AOC B 12
13 Types of Cyber Effects 5 Pillars of Information Assurance as buckets for cyber effects Confidentiality Integrity Availability Authentication Non-Repudiation Target Breadth One AOC All AOC Location Within AOC Between AOC COCOM to AOC 13
14 Where Can Cyber Attacks Manifest CoCom A AOC A CoCom B AOC B Within CoCom Between CoCom Between CoCom and AOC Within AOC(s) Between AOCs 14
15 Assessing Resilience Many ways to assess resiliency Percentage change below some threshold(s) from baseline for one or more metrics of interest Degree of degradation in number of personnel or divisions that have minimum knowledge to operate compared to operational levels when there was no cyber attack Illustrative specific measures are: Task & Resource Congruence Fragmentation through loss of agent(s) Communication speed degradation Diffusion degradation Performance degradation Number of people with minimum ability to operate Ability to complete planning 15
16 Assessment via ORA (1 of 2) Key Take Aways: An AOC, as described in doctrinal sources, is very resilient Integrated AOCs are more resilient Its harder to trigger cascading effects than intuition might suggest IT personnel may think the system is less resilient than it is Integration within and across commands via additional communications mechanisms, social links, shared knowledge and resources counter-act specific loss of IT systems Additional resiliency can be achieved by Increased social networking Training selected personnel to handle increased communication when under attack Key Results Not highly reliant on top four IT systems Not highly reliant on top leader Combinations of system losses, even when not crossing 5% thresholds, were generally positive non-linear For AOC as a whole it takes large combination attacks to cross 5% threshold For IT-system ecosystem, most attacks resulted in over 10% degradation 16
17 Assessment via ORA (2 of 2) Immediate Impact reports for loss of single and combinations of key IT systems & humans Random targeting of IT or Humans little impact <= 4 IT systems across hundreds of runs Why: Distribution of links between ITsystems and Agents appears exponential Therefore: high probability that random attack does not hit key systems AOC s resilient to random attacks AOC s more impacted by targeted attacks Random Targeting of IT Systems (avg of 100 repetitions) Number metrics impacted = 0% <= +/- 1% <= +/- 5% <= +/- 10% % Change from Uncontested Random Targeting of Humans Number metrics (avg of 100 reps) impacted = 0% <= +/- 1% <= +/- 5% <= +/- 10% % Change from Uncontested 17
18 Effects of Targeting TBMCS: Based on Doctrinal Model of AOC (1 of 4) Network Level Measures (for IT Systems only) Name Unconteste Contested % Change d Performance As % Accuracy Clustering coefficient % Characteristic Path % Length Social Density % Communication Congruence % Betweenness Centrality (for AOC) Name Rank Value Rank Value % Before Before After After Change air_mob_div % tbmcs Entity removed gccs % strategy_div % c2pc % c_c_o % sodo % Chief of Combat Ops (cco) and Senior Operations Duty Officer (sodo) increase in criticality as GO TO people when TBMCS offline C2PC and GCCS will become next critical IT systems IT Systems only: 39% decrease in accuracy when TBMCS targeted Human-IT system: <5% decrease in accuracy when TBMCS targeted AOC remains functional in face of TBMCS loss Resiliency is provided by human power Betweenness Centrality (for IT Systems only) Name Rank Before Value Before Rank After Value After % Change tbmcs Entity removed c2pc % gccs % 18
19 Effects of Targeting Top 4 IT Network Level Measures (for IT Systems only) Name Unconteste Contested % Change d Performance As Accuracy % Diffusion % Clustering Coefficient % Characteristic Path Length % Social Density % Communication Congruence % Average Communication % Speed Fragmentation % Overall Fragmentation % Systems (2 of 4) AOC as a whole takes a performance hit apx 5% Resiliency provided by human communication which suffers less than 5% drop in communication speed despite fragmentation For the IT System ecosystem: Strategic Targeting of 4 high degree IT systems critically degrades ability to support the missions System fragments and 35% drop in communication speed Network Level Measures (for entire AOC) Name Uncontested Contested % Change Performance As Accuracy % Diffusion % Clustering Coefficient % Social Density % Number of Isolated Agents % Fragmentation % Overall Fragmentation % 19
20 Effects of Targeting Top 4 IT Systems (3 of 4) Resiliency can be enhanced by: AOCs rehearsing fail-over to these systems Training SODO in how to respond when in contested environment Providing SODO with backup Simultaneous attacks on TBMCS, C2PC, COP and GCCS results in a shift to: the Intel/JWICS network the portable flight planning system in the face Centrality (total degree centrality) (for IT Systems only) Name Rank Value Rank Value % Change Befor e Befor e After After pfps % gdss % g_t_n % trac2e s % gates % jopes % Name Rank Befor e Betweenness Centrality (for AOC) Value Rank Value Befor After After e Value Change(%) c_c_o % sodo % Name Betweenness Centrality (for IT Systems Only) Rank Value Rank Value Befor Befor After After e e Value Change(%) tacs % adsi % stars % pfps % i_w_s % jwics % 20
21 Effects of Targeting CJFACC & CCO (4 of 4) Name Performance As Accuracy Clustering Coefficient Network Level Measures Unconteste Contested % Change d % % Social Density % Number of Isolated Agents % Fragmentation % Without CJFACC & CCO all divisions are more critical SODO rises the most in criticality Resiliency can be supported by training SODO to handle this shift in responsibility AOC remains functional in face of a key leader loss ( < 5% drop in performance and communication) AOC suffers 12% drop in performance when both CJFAC & CCO are impacted Name Betweenness Centrality Rank Value Rank Before Before After Value After % Change air_mob_div % tbmcs % isrd % cbt_ops_div % c_p_d % strategy_div % c2pc % sodo % 21
22 Information Diffusion Simulation Construct - An agent-based simulation developed at CMU Validated model of agent interaction In use for projects with US DoD In use for projects with US IRS Validated against classic social network models as well as organizational behavioral models for binary classification tasks 22
23 Planning Phases General Mission Planning Phases Mission analysis identify constraints COA analysis run through war-gaming COA selection - operationalize At AOC difference in activity within and across the phases can be operationalized in terms of which actors are active FOCUS: AOC planning process that occurs in all three phases is modeled: Joint planning group JPG JPG starts off with all Operations Order (OPORD) knowledge JPG operates in a cycle of plan-brief-plan-brief Operationalized as periodic changes in who JPG members talk to as they brief other members of the AOC about the OPORD 23
24 Model Development - AOCs All AOCs are currently modeled as structurally identical This is easily modifiable based on data (same people and IT) AOCs are modeled: As a network of people and IT systems People have tasks to do Knowledge flows between people, between people and IT systems, and between IT systems Has five divisions each with a head person and a sub-head Strategy, Combat Plans, Combat Ops, ISR, and Air Mobility Has a JPG with 5 members 2 from ISR and 2 from Combat Plans and a lawyer (functional group) JPG has specialized knowledge the OPORD Has 15 functional areas each with a head person & supporting personnel Divisions and functional areas cross each other 24
25 Integrated System is Resilient to a few attack or attacks on only a regional AOC More attacks the less resilient Degradation is nonlinear Average diffusion with respect to baseline More AOCs attacked the less resilient Degradation is nonlinear Average diffusion x Number of AOCs Attacked Percentage Diffusion with respect to baseline Number of attacks effected by cyber attacks Percentage Diffusion with respect to baseline Uncontested 1 x AOC 4 x AOCs Number of AOCs attacked 25
26 Less Resilient More Resilient Best Case Typical Case 26
27 Resiliency Time to Plan Less Resilient Efficient Best Case Typical Case More Resilient 27
28 Resiliency as the breadth of the attack (more systems) are impacted Less Resilient Percentage Change from Baseline Operations More Resilient TBMCS GGCS C2PC JADOCS TG GC CJ TGCJ Nonlinear Effects JADOCS focused attack might help Both performance and communication will degrade Performance As Accuracy Diffusion Clustering Coefficient Density Average Communication Speed Which Systems Are Attacked 28
29 Diffusion Resiliency Getting the right information to the right people in time More Resilient 80.0% Average Knowledge Diffusion Across Conditions as percentage of maximum 70.0% Average Diffused Knowledge 60.0% 50.0% 40.0% 30.0% 20.0% 10.0% Regional (1xAOC) Global (4xAOC) Less Resilient 0.0% Uncontested Reliability Integrity Both Conditions of AOC Operations Nonlinear Effects Integrated system is fairly robust against regional attacks 29
30 Viewing Model in Operation Visualizations of information diffusion is available (talk with me during the conference) The color of the nodes will change based on whether they are compromised or not Dynamic bar graphs for resiliency measure Dynamic line graphs for knowledge acquisition resiliency 30
31 Future Work Identify key differences between AOCs and implement Adjust for cyber attacks that impact flow from COCOMs and/ or other external organizations (other lines of authority ) Take into account shift work Run the following three scenarios in addition to the attacks these are remediation strategies Day/Mid/Swing and Day/Night Cycles Doctrine documents to define agent structure. Agents are separated into shifts are not always available to each other. All Hands on Deck Doctrine documents define agent structure. Agents interact with all available agents at all times. Shifts no longer separate agents. Preventative Measures Hypothetical ideal structure for rapidly transmitting information. Agents are separated into 3 shifts and are not always available. 31
32 Future Work Operation Model Phasing of different tasks Task based interaction Better differentiation of IT as mediator for communications synchronous (e.g., phone, chat) and asynchronous (e.g., , web page(s), database(s)) Mediator as perfect/imperfect/dysfunctional communications aid Planning and execution modeled Impact differential based on phase of operation to be examined Impact differential based on severity of attack to be examined Alternate measures of resiliency 32
33 Points of Contact Lieutenant Colonel Michael J. Lanham Wean 5117 Carnegie Mellon University 5000 Forbes Ave. Pittsburgh, PA USA Tel: Prof. Kathleen M. Carley Wean 5130 Tel: Fax: Geoffrey P. Morgan Wean 5117 Tel:
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,
Advancing Cyber Security Using System Dynamics Simulation Modeling for System Resilience, Patching, and Software Development
Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC) 3 12 February 2015 Advancing Cyber Security Using System Dynamics Simulation Modeling for System Resilience, Patching,
EXTENSIVE FEATURE DESCRIPTION SECUNIA CORPORATE SOFTWARE INSPECTOR. Non-intrusive, authenticated scanning for OT & IT environments. secunia.
Non-intrusive, authenticated scanning for OT & IT environments The situation: convenience vs. security Interconnectivity between organizations and corporate networks, the internet and the cloud and thus
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700 OPERATIONAL TEST AND EVALUATION AUG 0 1 2014 MEMORANDUM FOR COMMANDER, ARMY TEST AND EVALUATION COMMAND COMMANDER, AIR
Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 6 R-1 Line #165
COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY 2015 FY 2015 OCO # Total FY 2016 FY 2017 FY 2018 FY 2019 Cost To Complete Total Program Element - 5.071 5.512 5.956-5.956 6.075 6.063 6.181
BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION
BlacKnight Cyber Security international A BUSINESS / MARKETING PRESENTATION The BlacKnight Mission To provide proven techniques and innovative learning services to help organizations detect, deter and
Cyber Superiority. Weapon System Normalization Update. Colonel Aaron Smith HQ AFSPC/A5I Chief, Cyberspace Superiority. AFCEA Luncheon Jan 2015
Cyber Superiority Weapon System Normalization Update AFCEA Luncheon Jan 2015 Colonel Aaron Smith HQ AFSPC/A5I Chief, Cyberspace Superiority Overview A5/8 Organization Where We Were/Are Way Forward Challenges
EBERSPÄCHER ELECTRONICS automotive bus systems. solutions for network analysis
EBERSPÄCHER ELECTRONICS automotive bus systems solutions for network analysis DRIVING THE MOBILITY OF TOMORROW 2 AUTOmotive bus systems System Overview Analyzing Networks in all Development Phases Control
White Paper: Vendor Selection for Your Life Science Company Cloud
White Paper: Vendor Selection for Your Life Science Company Cloud GlobalSubmit 123 South Broad Street, Suite 1850 Philadelphia, PA 19109 www.globalsubmit.com Methodsense, Inc. P.O. Box 110352 Durham, NC
QuickBooks Online: Security & Infrastructure
QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...
Fight the Network. Presented By Kevin Jacobs On Behalf of WIN-T TMD and CERDEC S&TCD CyberOps Branches [email protected]. Briefing name l Date (1)
Fight the Network Presented By Kevin Jacobs On Behalf of WIN-T TMD and CERDEC S&TCD CyberOps Branches [email protected] Briefing name l Date (1) Problem Army Strategy for Net-Centric Fighting Force
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN
A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN Eman Al-Harbi [email protected] Soha S. Zaghloul [email protected] Faculty of Computer and Information
Troops Time Planner and Simulation Models For Military
SUPPORTING COURSES OF ACTION PLANNING WITH INTELLIGENT MANAGEMENT OF Contact Information: CELESTINE A. NTUEN & EUI H. PARK The Institute for Human-Machine Studies North Carolina A&T State University Greensboro,
Risk Calculation and Predictive Analytics: Optimizing Governance, Risk and Compliance.
Risk Calculation and Predictive Analytics: Optimizing Governance, Risk and Compliance. Prevari makes organizations safer by providing instrumentation for managing risks to information. Prevari solutions
Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report. November 23, 2015
Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report November 23, 2015 Table of contents Background Exercise objectives Quantum Dawn 3 (QD3) cyberattack scenario
GAO. Year 2000 Computing Crisis: Business Continuity and Contingency Planning
GAO United States General Accounting Office Accounting and Information Management Division August 1998 Year 2000 Computing Crisis: Business Continuity and Contingency Planning GAO/AIMD-10.1.19 Preface
Keys to Successfully Architecting your DSI9000 Virtual Tape Library. By Chris Johnson Dynamic Solutions International
Keys to Successfully Architecting your DSI9000 Virtual Tape Library By Chris Johnson Dynamic Solutions International July 2009 Section 1 Executive Summary Over the last twenty years the problem of data
SIMULATED ATTACKS. Evaluate Susceptibility Using PhishGuru, SmishGuru, and USBGuru MEASURE ASSESS
SIMULATED ATTACKS Evaluate Susceptibility Using PhishGuru, SmishGuru, and USBGuru Technical safeguards like firewalls, antivirus software, and email filters are critical for defending your infrastructure,
Enabling the University CIO Strategic Plan 2013-2018. Vision for 2020. Mission
Enabling the University CIO Strategic Plan 2013-2018 NDU will create exceptional and innovative solutions and services that enable advanced joint education, leadership and scholarship (NDU Strategic Plan
AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration
Headquarters Air Combat Command AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration This Briefing is: UNCLASSIFIED Mr. John Vona, GS-15 AFC2IC/C2P Purpose Discuss
Stay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz [email protected] IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
XpoLog Center Suite Data Sheet
XpoLog Center Suite Data Sheet General XpoLog is a data analysis and management platform for Applications IT data. Business applications rely on a dynamic heterogeneous applications infrastructure, such
Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity
Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9
Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System
Department of Defense INSTRUCTION NUMBER 8580.1 July 9, 2004 SUBJECT: Information Assurance (IA) in the Defense Acquisition System ASD(NII) References: (a) Chapter 25 of title 40, United States Code (b)
Monitoring Best Practices for
Monitoring Best Practices for OVERVIEW Providing the right level and depth of monitoring is key to ensuring the effective operation of IT systems. This is especially true for ecommerce systems like Magento,
how to use the Bandwidth report A N A L Y T I C S
how to use the Bandwidth report A N A L Y T I C S tab 2 Tab 2 - Bandwidth Analysis: June 2010 bandwidth analysis For the Month of: June 2010 Date Created: July 17, 2010 Monthly Competitive Set Data Excludes
Windows Geo-Clustering: SQL Server
Windows Geo-Clustering: SQL Server Edwin Sarmiento, Microsoft SQL Server MVP, Microsoft Certified Master Contents Introduction... 3 The Business Need for Geo-Clustering... 3 Single-location Clustering
This course is intended for IT professionals who are responsible for the Exchange Server messaging environment in an enterprise.
10233A: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Course Number: 10233A Course Length: 5 Day Course Overview This instructor-led course provides you with the knowledge
No Free Lunch in Cyber Security
No Free Lunch in Cyber Security George Cybenko [email protected] Jeff Hughes [email protected] MTD Workshop Scottsdale AZ November 3, 2014 Acknowledgements Kate Farris, Ph.D. Student, Dartmouth Dr.
An Oracle White Paper May 2012. Oracle Database Cloud Service
An Oracle White Paper May 2012 Oracle Database Cloud Service Executive Overview The Oracle Database Cloud Service provides a unique combination of the simplicity and ease of use promised by Cloud computing
CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool
INL/CON-07-12810 PREPRINT CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool ISA Expo 2007 Kathleen A. Lee January 2008 This is a preprint of a paper intended for publication in a journal
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6
to Assess Cybersecurity Preparedness 1 of 6 Introduction Long before the signing in February 2013 of the White House Executive Order Improving Critical Infrastructure Cybersecurity, HITRUST recognized
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT OVERVIEW The National Institute of Standards of Technology Framework for Improving Critical Infrastructure Cybersecurity (The NIST Framework) is a
Monitoring Best Practices for COMMERCE
Monitoring Best Practices for COMMERCE OVERVIEW Providing the right level and depth of monitoring is key to ensuring the effective operation of IT systems. This is especially true for ecommerce systems
A Security Approach in System Development Life Cycle
A Security Approach in System Development Life Cycle (1) P.Mahizharuvi, Research Scholar, Dept of MCA, Computer Center, Madurai Kamaraj University, Madurai. [email protected] (2) Dr.K.Alagarsamy,
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic
Technical Report CMU/SEI-88-TR-024 ESD-TR-88-025
Technical Report CMU/SEI-88-TR-024 ESD-TR-88-025 System Specification Document: Shipboard Inertial Navigation System Simulator and External Computer B. Craig Meyers Nelson H. Weiderman October 1988 Technical
Data Mining + Business Intelligence. Integration, Design and Implementation
Data Mining + Business Intelligence Integration, Design and Implementation ABOUT ME Vijay Kotu Data, Business, Technology, Statistics BUSINESS INTELLIGENCE - Result Making data accessible Wider distribution
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
Department of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
Click to edit Master title style
Click to edit Master title style UNCLASSIFIED//FOR OFFICIAL USE ONLY Dr. Russell D. Richardson, G2/INSCOM Science Advisor UNCLASSIFIED//FOR OFFICIAL USE ONLY 1 UNCLASSIFIED Semantic Enrichment of the Data
Unstructured Threat Intelligence Processing using NLP
Accenture Technology Labs Elvis Hovor @kofibaron Shimon Modi @shimonmodi Shaan Mulchandani @alabama_shaan Unstructured Threat Intelligence Processing using NLP Enhancing Cyber Security Operations by Automating
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
METALOGIX REPLICATOR FOR SHAREPOINT: Supporting Government and Military Missions Worldwide
METALOGIX REPLICATOR FOR SHAREPOINT: Supporting Government and Military Missions Worldwide Contents Introduction...2 Coalition and extranet collaboration... 3 Deploying military units... 4 Fob-rob collaboration...4
GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate
Job Family Modeling. Tools to Support Job Evaluation and Career Development October 21, 2009. Vincent Milich
Job Family Modeling Tools to Support Job Evaluation and Career Development October 21, 2009 Vincent Milich Agenda What is job family modeling? What can job family modeling do for an organization? Unique
Evaluation of the Iceland State Financial and Human Resource System REPORT OF THE INDIVIDUAL EVALUATOR. Annex 2 SYSTEM AND SOFTWARE QUALITY
Evaluation of the Iceland State Financial and Human Resource System REPORT OF THE INDIVIDUAL EVALUATOR Annex 2 SYSTEM AND SOFTWARE QUALITY This paper lists the properties used in the two main models in
Security in Space: Intelsat Information Assurance
Security in Space: Intelsat Information Assurance 14/03/6997 Intelsat Information Assurance Intelsat maintains the highest standards of Information Assurance by assessing and building the Intelsat infrastructure,
Crowdclustering with Sparse Pairwise Labels: A Matrix Completion Approach
Outline Crowdclustering with Sparse Pairwise Labels: A Matrix Completion Approach Jinfeng Yi, Rong Jin, Anil K. Jain, Shaili Jain 2012 Presented By : KHALID ALKOBAYER Crowdsourcing and Crowdclustering
Visualizing Complexity in Networks: Seeing Both the Forest and the Trees
CONNECTIONS 25(1): 37-47 2003 INSNA Visualizing Complexity in Networks: Seeing Both the Forest and the Trees Cathleen McGrath Loyola Marymount University, USA David Krackhardt The Heinz School, Carnegie
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Building a Data Quality Scorecard for Operational Data Governance
Building a Data Quality Scorecard for Operational Data Governance A White Paper by David Loshin WHITE PAPER Table of Contents Introduction.... 1 Establishing Business Objectives.... 1 Business Drivers...
Introduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
Applying CMMI SM In Information Technology Organizations SEPG 2003
Applying CMMI SM In Information Technology Organizations Mark Servello, Vice President Jim Gibson, Senior Consultant ChangeBridge, Incorporated Page 1 Portions Copyright 2002 Carnegie Mellon University
The bad and the ugly: Online firestorms and hate propagation in social media networks
The bad and the ugly: Online firestorms and hate propagation in social media networks Jürgen Pfeffer Institute for Software Research School of Computer Science Carnegie Mellon University Center for Computational
NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation
NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation Market Offering: Package(s): Oracle Authors: Rick Olson, Luke Tay Date: January 13, 2012 Contents Executive summary
Certified Information Professional 2016 Update Outline
Certified Information Professional 2016 Update Outline Introduction The 2016 revision to the Certified Information Professional certification helps IT and information professionals demonstrate their ability
How to Choose Between Hadoop, NoSQL and RDBMS
How to Choose Between Hadoop, NoSQL and RDBMS Keywords: Jean-Pierre Dijcks Oracle Redwood City, CA, USA Big Data, Hadoop, NoSQL Database, Relational Database, SQL, Security, Performance Introduction A
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
What, Why and How. Hosted Payloads: A guide to commercially hosted government payloads from the Hosted Payload Alliance. www.hostedpayloadalliance.
Hosted Payloads: What, Why and How A guide to commercially hosted government payloads from the Hosted Payload Alliance The Hosted Payload Alliance (HPA) is a satellite industry alliance formed in 2011
Team Redstone Exhibition (TREx)
Team Redstone Exhibition (TREx) 08 June 2016 Dr. Ken LeSueur, Redstone Test Center Approved for public release (SMDC Public Release #6084-1) Distribution A Team Redstone Cyber Initiative Redstone Cyber
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
Cyber Situational Awareness - Big Data Solution
Cyber Situational Awareness - Big Data Solution Dan Bart & Bob Landreth DISA ID61 17 Jun 2015 1 CSAAC / RDK Overview Cyber Situational Awareness Analytical Capabilities (CSAAC) is a set of NIPRNet and
Customer Analytics. Turn Big Data into Big Value
Turn Big Data into Big Value All Your Data Integrated in Just One Place BIRT Analytics lets you capture the value of Big Data that speeds right by most enterprises. It analyzes massive volumes of data
Anatomy of a Decision
[email protected] @BlueHillBoston 617.624.3600 Anatomy of a Decision BI Platform vs. Tool: Choosing Birst Over Tableau for Enterprise Business Intelligence Needs What You Need To Know The demand
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
AF Life Cycle Management Center
AF Life Cycle Management Center Avionics Weapon Systems Cybersecurity Risk Management Framework Assessment & Authorization Update Harrell Van Norman AFLCMC/EZAS Cybersecurity Technical Expert [email protected]
Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises
Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis
Enterprise-Grade Security from the Cloud
Datasheet Website Security Enterprise-Grade Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed security
LOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION
LOGIIC Remote Access June 2015 Final Public Report Document Title LOGIIC Remote Monitoring Project Public Report Version Version 1.0 Primary Author A. McIntyre (SRI) Distribution Category LOGIIC Approved
UNCLASSIFIED R-1 ITEM NOMENCLATURE
Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Office of Secretary Of Defense DATE: April 2013 COST ($ in Millions) All Prior Years FY 2012 FY 2013 # Base OCO ## FY 2015 FY 2016 FY 2017 FY 2018
Prescriptive Analytics. A business guide
Prescriptive Analytics A business guide May 2014 Contents 3 The Business Value of Prescriptive Analytics 4 What is Prescriptive Analytics? 6 Prescriptive Analytics Methods 7 Integration 8 Business Applications
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Asset Performance Management for Collaborative and Integrated Operations
2014 Bentley Systems, Incorporated Asset Performance Management for Collaborative and Integrated Operations David Watkins Agenda Definitions Eco system Process Integration to business Visualization 2 WWW.BENTLEY.COM
Vulnerability management lifecycle: defining vulnerability management
Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By
CYBERSECURITY SLAs: MANANGING REQUIREMENTS AT ARM S LENGTH
CYBERSECURITY SLAs: MANANGING REQUIREMENTS AT ARM S LENGTH Matthew J. Butkovic, CISSP Carnegie Mellon University, The Software Engineering Institute, CERT Samuel A. Merrell, CISSP Carnegie Mellon University,
i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.
Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time. 2 Barry Brueseke (619) 401 7334 www.inetwork west.com 4/3/2014 IEEE Cyber Security Workshop
