G2TT
来源类型Research Reports
规范类型报告
DOIhttps://doi.org/10.7249/RR2015
ISBN9780833098306
来源IDRR-2015-AF
Robust and Resilient Logistics Operations in a Degraded Information Environment
Don Snyder; Elizabeth Bodine-Baron; Mahyar A. Amouzegar; Kristin F. Lynch; Mary Lee; John G. Drew
发表日期2017
出版年2017
页码66
语种英语
结论

Critical Areas in Which to Enhance the Ability to Detect Corrupted Data

  • The detection must be sufficiently prompt. Promptness results from a combination of individuals detecting and reporting corrupted data quickly and detecting corrupted data early in the chain of custody.
  • Highly automated processes — in which humans do not see the data during normal operations — present a significant challenge for detection. Automation requires special mechanisms to assist in detecting corruption.
  • Detection of corrupted data is most critical during wartime, yet anomalies are less evident during wartime than during peacetime because wartime itself is an anomaly. Mechanisms are needed to adjust detection mechanisms from peacetime to wartime conditions.
  • For workers (airmen, civilians, and contractors) to detect anomalous data, they all need to be trained to understand the expected baseline and need to be continuously vigilant when examining data.
  • Leadership must create an environment that encourages workers to report suspected anomalous data.
摘要
  • Define, within logistics policy, what measures the logistics community should take in response to each information operations condition level. This action is the most likely to yield positive, tangible results with the least expenditure of resources.
  • Adopt simple methods to detect data corruption in fully automated processes that are routinely used in fraud detection (such as Benford's Law).
  • Enhance the education and training of all members of the enterprise about the threat to operations from data corruption (and cyber attack more generally).
  • Supplement current reporting mechanisms and assessments.
  • Create a new central body (perhaps within an existing organization) — the Global Data Integrity Cell — that would receive all reports of suspected data anomalies to enable enterprise-wide situational awareness.
  • For optimal response, enact strategies to prioritize proactive mitigations and specific reported incidents. Assign a time frame for assessment of each incident and potential mitigation.
主题Cyber and Data Sciences ; Databases and Data Collection ; Analysis ; and Processing ; Military Information Technology Systems ; Military Logistics ; United States Air Force
URLhttps://www.rand.org/pubs/research_reports/RR2015.html
来源智库RAND Corporation (United States)
引用统计
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/108612
推荐引用方式
GB/T 7714
Don Snyder,Elizabeth Bodine-Baron,Mahyar A. Amouzegar,et al. Robust and Resilient Logistics Operations in a Degraded Information Environment. 2017.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
x1511354469348.jpg(5KB)智库出版物 限制开放CC BY-NC-SA浏览
RAND_RR2015.pdf(1265KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Don Snyder]的文章
[Elizabeth Bodine-Baron]的文章
[Mahyar A. Amouzegar]的文章
百度学术
百度学术中相似的文章
[Don Snyder]的文章
[Elizabeth Bodine-Baron]的文章
[Mahyar A. Amouzegar]的文章
必应学术
必应学术中相似的文章
[Don Snyder]的文章
[Elizabeth Bodine-Baron]的文章
[Mahyar A. Amouzegar]的文章
相关权益政策
暂无数据
收藏/分享
文件名: x1511354469348.jpg
格式: JPEG
文件名: RAND_RR2015.pdf
格式: Adobe PDF

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。