G2TT
来源类型Research Reports
规范类型报告
ISBN9780833086297
来源IDRR-620-AF
Ensuring U.S. Air Force Operations During Cyber Attacks Against Combat Support Systems: Guidance for Where to Focus Mitigation Efforts
Don Snyder; George E. Hart; Kristin F. Lynch; John G. Drew
发表日期2015
出版年2015
页码36
语种英语
结论

Making the Data Manageable Is Crucial

  • Analyzing this issue with a brute force approach is impractical because of the sheer number of permutations to assess and the constantly evolving nature of the information systems, vulnerabilities, and threats.
  • The Air Force counts 25 combat support functional communities, many of which have numerous subfunctions, and the sum of the functions are supported by hundreds of information systems.
  • There are numerous ways in which a cyber attack can occur and a variety of impacts that might result. These include denial-of-service attacks from outside a firewall, manipulating data from within a firewall, interrupting communications, taking control of a system, and others.
  • Analyzing every possible attack on all systems and assessing the impact to both combat support and operations would be impractical. Even if it were done, the results from such an analysis would be obsolete before completion.

A Sequential Process Prioritizes Those Programs Most in Need of Mitigation

  • RAND researchers developed a sequential process for identifying those functions and information systems most likely to be problematic for the operational mission during cyber attacks.
  • The approach finds the functions and information systems that are simultaneously the most critical to the mission — those that cause repercussions to the operational mission the fastest and those that have the highest risk of attack as defined by the threat, their vulnerability, and the impact of an attack.
  • The method is implemented in a Microsoft Excel-hosted decision support tool that does not require any special expertise in the cyber domain.
主题Combat Support Operations ; Critical Infrastructure Protection ; Cyber Warfare ; Cybersecurity ; Information Operations ; Military Information Technology Systems ; Netcentric Warfare
URLhttps://www.rand.org/pubs/research_reports/RR620.html
来源智库RAND Corporation (United States)
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/108043
推荐引用方式
GB/T 7714
Don Snyder,George E. Hart,Kristin F. Lynch,et al. Ensuring U.S. Air Force Operations During Cyber Attacks Against Combat Support Systems: Guidance for Where to Focus Mitigation Efforts. 2015.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
x1495316288101.jpg(5KB)智库出版物 限制开放CC BY-NC-SA浏览
RAND_RR620.pdf(1350KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Don Snyder]的文章
[George E. Hart]的文章
[Kristin F. Lynch]的文章
百度学术
百度学术中相似的文章
[Don Snyder]的文章
[George E. Hart]的文章
[Kristin F. Lynch]的文章
必应学术
必应学术中相似的文章
[Don Snyder]的文章
[George E. Hart]的文章
[Kristin F. Lynch]的文章
相关权益政策
暂无数据
收藏/分享
文件名: x1495316288101.jpg
格式: JPEG
文件名: RAND_RR620.pdf
格式: Adobe PDF

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。