来源类型 | Research Reports
|
规范类型 | 报告
|
DOI | https://doi.org/10.7249/RR2015
|
ISBN | 9780833098306
|
来源ID | RR-2015-AF
|
| Robust and Resilient Logistics Operations in a Degraded Information Environment |
| Don Snyder; Elizabeth Bodine-Baron; Mahyar A. Amouzegar; Kristin F. Lynch; Mary Lee; John G. Drew
|
发表日期 | 2017
|
出版年 | 2017
|
页码 | 66
|
语种 | 英语
|
结论 |
Critical Areas in Which to Enhance the Ability to Detect Corrupted Data- The detection must be sufficiently prompt. Promptness results from a combination of individuals detecting and reporting corrupted data quickly and detecting corrupted data early in the chain of custody.
- Highly automated processes — in which humans do not see the data during normal operations — present a significant challenge for detection. Automation requires special mechanisms to assist in detecting corruption.
- Detection of corrupted data is most critical during wartime, yet anomalies are less evident during wartime than during peacetime because wartime itself is an anomaly. Mechanisms are needed to adjust detection mechanisms from peacetime to wartime conditions.
- For workers (airmen, civilians, and contractors) to detect anomalous data, they all need to be trained to understand the expected baseline and need to be continuously vigilant when examining data.
- Leadership must create an environment that encourages workers to report suspected anomalous data.
|
摘要 |
- Define, within logistics policy, what measures the logistics community should take in response to each information operations condition level. This action is the most likely to yield positive, tangible results with the least expenditure of resources.
- Adopt simple methods to detect data corruption in fully automated processes that are routinely used in fraud detection (such as Benford's Law).
- Enhance the education and training of all members of the enterprise about the threat to operations from data corruption (and cyber attack more generally).
- Supplement current reporting mechanisms and assessments.
- Create a new central body (perhaps within an existing organization) — the Global Data Integrity Cell — that would receive all reports of suspected data anomalies to enable enterprise-wide situational awareness.
- For optimal response, enact strategies to prioritize proactive mitigations and specific reported incidents. Assign a time frame for assessment of each incident and potential mitigation.
|
主题 | Cyber and Data Sciences
; Databases and Data Collection
; Analysis
; and Processing
; Military Information Technology Systems
; Military Logistics
; United States Air Force
|
URL | https://www.rand.org/pubs/research_reports/RR2015.html
|
来源智库 | RAND Corporation (United States)
|
引用统计 |
|
资源类型 | 智库出版物
|
条目标识符 | http://119.78.100.153/handle/2XGU8XDN/108612
|
推荐引用方式 GB/T 7714 |
Don Snyder,Elizabeth Bodine-Baron,Mahyar A. Amouzegar,et al. Robust and Resilient Logistics Operations in a Degraded Information Environment. 2017.
|
文件名:
|
x1511354469348.jpg
|
格式:
|
JPEG
|
文件名:
|
RAND_RR2015.pdf
|
格式:
|
Adobe PDF
|
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。