来源类型 | Research Reports
|
规范类型 | 报告
|
ISBN | 9780833086297
|
来源ID | RR-620-AF
|
| Ensuring U.S. Air Force Operations During Cyber Attacks Against Combat Support Systems: Guidance for Where to Focus Mitigation Efforts |
| Don Snyder; George E. Hart; Kristin F. Lynch; John G. Drew
|
发表日期 | 2015
|
出版年 | 2015
|
页码 | 36
|
语种 | 英语
|
结论 |
Making the Data Manageable Is Crucial - Analyzing this issue with a brute force approach is impractical because of the sheer number of permutations to assess and the constantly evolving nature of the information systems, vulnerabilities, and threats.
- The Air Force counts 25 combat support functional communities, many of which have numerous subfunctions, and the sum of the functions are supported by hundreds of information systems.
- There are numerous ways in which a cyber attack can occur and a variety of impacts that might result. These include denial-of-service attacks from outside a firewall, manipulating data from within a firewall, interrupting communications, taking control of a system, and others.
- Analyzing every possible attack on all systems and assessing the impact to both combat support and operations would be impractical. Even if it were done, the results from such an analysis would be obsolete before completion.
A Sequential Process Prioritizes Those Programs Most in Need of Mitigation - RAND researchers developed a sequential process for identifying those functions and information systems most likely to be problematic for the operational mission during cyber attacks.
- The approach finds the functions and information systems that are simultaneously the most critical to the mission — those that cause repercussions to the operational mission the fastest and those that have the highest risk of attack as defined by the threat, their vulnerability, and the impact of an attack.
- The method is implemented in a Microsoft Excel-hosted decision support tool that does not require any special expertise in the cyber domain.
|
主题 | Combat Support Operations
; Critical Infrastructure Protection
; Cyber Warfare
; Cybersecurity
; Information Operations
; Military Information Technology Systems
; Netcentric Warfare
|
URL | https://www.rand.org/pubs/research_reports/RR620.html
|
来源智库 | RAND Corporation (United States)
|
资源类型 | 智库出版物
|
条目标识符 | http://119.78.100.153/handle/2XGU8XDN/108043
|
推荐引用方式 GB/T 7714 |
Don Snyder,George E. Hart,Kristin F. Lynch,et al. Ensuring U.S. Air Force Operations During Cyber Attacks Against Combat Support Systems: Guidance for Where to Focus Mitigation Efforts. 2015.
|
文件名:
|
x1495316288101.jpg
|
格式:
|
JPEG
|
文件名:
|
RAND_RR620.pdf
|
格式:
|
Adobe PDF
|
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。