G2TT
来源类型Research Brief
规范类型简报
来源IDRB-9835-AF
Cybersecurity of Air Force Weapon Systems: Ensuring Cyber Mission Assurance Throughout a System's Life Cycle
Don Snyder; James D. Powers; Elizabeth Bodine-Baron; Bernard Fox; Lauren Kendrick; Michael H. Powell
发表日期2015-10-27
出版年2015
页码4
语种英语
结论

Key Findings

  1. Current policies are better suited to simple, stable, and predictable environments than to the complex, rapidly changing, and unpredictable reality of today's cybersecurity environment.
  2. Implementation of cybersecurity is not continuously vigilant throughout the life cycle of a military system.
  3. Control of and accountability for military system cybersecurity is spread over numerous organizations and is poorly integrated.
  4. Monitoring and feedback for cybersecurity is incomplete, uncoordinated, and insufficient for effective decision-making or accountability.
摘要

Air Force weapon systems today are heavily reliant on complex software and high interconnectivity to perform their missions. Cyber capabilities enable many of the advanced features (e.g., electronic attack, sensor fusion, and communications) that give the Air Force its edge over potential adversaries. But they also create potential opportunities — and incentives — for adversaries to counter U.S. advantages through cyberattacks. For example, a sophisticated adversary may seek to discover and exploit vulnerabilities in an aircraft's software, supporting systems, or supply chain in order to gain intelligence or to sabotage operations. Nor are the potential risks limited to the newest and most advanced systems: Legacy aircraft, which make up the majority of Air Force inventory, are also exposed to attack from evolving cyber threats and must remain vigilant.

主题Critical Infrastructure Protection ; Cyber Warfare ; Cybersecurity ; Military Acquisition and Procurement ; Military Information Technology Systems ; United States Air Force
URLhttps://www.rand.org/pubs/research_briefs/RB9835.html
来源智库RAND Corporation (United States)
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/110549
推荐引用方式
GB/T 7714
Don Snyder,James D. Powers,Elizabeth Bodine-Baron,et al. Cybersecurity of Air Force Weapon Systems: Ensuring Cyber Mission Assurance Throughout a System's Life Cycle. 2015.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
research_briefs.gif(3KB)智库出版物 限制开放CC BY-NC-SA浏览
RAND_RB9835.pdf(119KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Don Snyder]的文章
[James D. Powers]的文章
[Elizabeth Bodine-Baron]的文章
百度学术
百度学术中相似的文章
[Don Snyder]的文章
[James D. Powers]的文章
[Elizabeth Bodine-Baron]的文章
必应学术
必应学术中相似的文章
[Don Snyder]的文章
[James D. Powers]的文章
[Elizabeth Bodine-Baron]的文章
相关权益政策
暂无数据
收藏/分享
文件名: research_briefs.gif
格式: GIF
文件名: RAND_RB9835.pdf
格式: Adobe PDF

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。