首页> 外文会议>International Conference on US Air Force T E Days >A Combat-Effectiveness Approach to Information Assurance
【24h】

A Combat-Effectiveness Approach to Information Assurance

机译:关于信息保证的战斗效率方法

获取原文

摘要

This paper describes results of 2008 and 2009 investigations into approaching information assurance as a component of a network-centric system's combat effectiveness. The proposed approach would provide timely and quantitative assessments of the vulnerability of network-centric systems as they progress through development, prior to full-rate production, and after fielding. The motivation rests on the proposition that vulnerabilities associated with computer networks have many similarities to vulnerabilities on conventional weapon system platforms. However, the vulnerabilities of networked environments have their own unique challenges. In particular, while sophisticated kinetic threats are relatively static, the network threat has changed significantly over the past decade, and continues to change as new technologies arc developed and fielded. The identities, motivations, objectives, targets, and tactics of the threat agents are constantly changing. Unlike many kinetic threats, the tools of network malicious activities are inexpensive and deployable from almost anywhere. To complicate matters the most serious network threat is not a denial of service or a major disruption in the network, but rather one in which the adversaries are able to maintain the integrity of the network while manipulating mission data and applications. When adversaries are able to penetrate without affecting the network it becomes very difficult to detect and react to the threat. Operators and organizations must be able to fight through such attacks, but currently system operators are not armed with the proper knowledge or processes defined to defend against these attacks. And in many cases, the systems are not designed to detect such attacks. In this paper we describe a series of proposed steps to systematically assess any vulnerability a new system might bring to a network environment, estimate which of those vulnerabilities might be susceptible to postulated threat exploitations, then develop and test recovery mechanisms. Results of such tests should allow management to evaluate system protection and detection features, as well as the ability of operators to react and recover from attacks. In the summer of 2008, we applied these steps to plan and conduct a small demonstration test at the Air Force's 46th Test Squadron. Then in the summer of 2009 we conducted a tabletop exercise at United States Joint Forces Command to build on the previous summer's results. In this paper we will discuss results of these activities as well as our assessments of the effectiveness and suitability of the proposed approach.
机译:本文介绍了2008年和2009年对接近信息保证的调查的结果,作为网络中心的战斗效率的组成部分。该拟议的方法将在全速率生产之前及时通过开发以及在线之后进行网络以网络为中心的脆弱性评估。动机依赖于提出与计算机网络相关的漏洞与传统武器系统平台上的漏洞有许多相似之处。但是,网络环境的漏洞有自己独特的挑战。特别是,虽然复杂的动力学威胁是相对静态的,但在过去十年中,网络威胁发生了显着变化,并且随着新技术的开发和界定的,继续变化。威胁代理商的身份,动机,目标,目标和策略不断变化。与许多动力学威胁不同,网络恶意活动的工具价格低廉,几乎可以从任何地方部署。复杂化问题最严重的网络威胁不是拒绝服务或网络中的重大中断,而是在操纵任务数据和应用程序的同时,对手能够维持网络的完整性。当对手能够穿透而不影响网络时,它变得非常难以检测和对威胁作出反应。运营商和组织必须能够通过此类攻击进行战斗,但目前系统运营商并未携带违反措施抵御这些攻击的适当知识或流程。在许多情况下,系统不设计用于检测此类攻击。在本文中,我们描述了一系列提出的措施来系统地评估任何新系统可能带来网络环境的漏洞,估计这些漏洞中的哪一个可能易于假设威胁利用,然后开发和测试恢复机制。此类测试的结果应允许管理层评估系统保护和检测功能,以及运营商从攻击中恢复和恢复的能力。在2008年夏天,我们应用了这些步骤来规划和对空军第46次测试中队进行小型示范试验。然后在2009年夏天,我们在美国联合部队命令进行了桌面练习,以建立前夏天的结果。在本文中,我们将讨论这些活动的结果,以及我们对拟议方法的有效性和适用性的评估。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号