首页> 外文会议>SPIE Conference on Modeling and Simulation for Defense Systems and Applications >Using Simulation And Virtual Machines To Identify Information Assurance Requirements
【24h】

Using Simulation And Virtual Machines To Identify Information Assurance Requirements

机译:使用仿真和虚拟机来识别信息保证要求

获取原文

摘要

The US military is changing its philosophy, approach, and technologies used for warfare. In the process of achieving this vision for high-speed, highly mobile warfare, there are a number of issues that must be addressed and solved; issues that are not addressed by commercial systems because Department of Defense (DoD) Information Technology (IT) systems operate in an environment different from the commercial world. The differences arise from the differences in the scope and skill used in attacks upon DoD systems, the interdependencies between DoD software systems used for network centric warfare (NCW), and the need to rely upon commercial software components in virtually every DoD system. As a result, while NCW promises more effective and efficient means for employing DoD resources, it also increases the vulnerability and allure of DoD systems to cyber attack. A further challenge arises due to the rapid changes in software and information assurance (IA) requirements and technologies over the course of a project. Therefore, the four challenges that must be addressed are determining how to specify the information assurance requirements for a DoD system, minimizing changes to commercial software, incorporation of new system and IA requirements in a timely manner with minimal impact, and insuring that the interdependencies between systems do not result in cyber attack vulnerabilities. In this paper, we address all four issues. In addition to addressing the four challenges outlined above, the interdependencies and interconnections between systems indicate that the IA requirements for a system must consider two important facets of a system's IA defensive capabilities. The facets are the types of IA attacks that the system must repel and the ability of a system to insure that any IA attack that penetrates the system is contained within the system and does not spread The IA requirements should be derived from threat assessments for the system as well as for the need to address the four requirements challenges outlined above. To address these issues, we developed a system architecture and acquisition approach designed to separate the system's IA capabilities requirements and development from the other system capability requirements; thereby, allowing the IA capabilities to be developed rapidly and assessed separately from the other system capabilities. Simulation environments and technologies allow us to test and evaluate solutions to the issues while also insuring that the system being tested and the solution are not exposed to real-world threats.
机译:美国军方正在改变其用于战争的哲学,方法和技术。在实现这一高速,高度移动战争的这种愿景的过程中,有许多问题必须得到解决和解决;商业系统未解决的问题,因为国防部(DOD)信息技术(IT)系统在不同于商业世界的环境中运作。差异来自攻击对国防部系统的攻击范围和技能的差异,用于网络中心战争(NCW)的国防部软件系统之间的相互依存性,并且需要在几乎每个国防部系统中依赖商业软件组件。因此,虽然NCW承诺为雇用国防部资源提供更有效和高效的手段,但它还增加了国防部系统到网络攻击的脆弱性和诱惑。由于软件和信息保证(IA)的快速变化,出现了进一步的挑战,因为在项目过程中的软件和信息保证(IA)的要求和技术。因此,必须解决的四项挑战正在确定如何指定国防部系统的信息保证要求,以最低的方式及时地将新系统和IA要求纳入新的系统和IA要求,并确保其间的相互依赖性系统不会导致网络攻击漏洞。在本文中,我们解决了所有四个问题。除了解决上述四个挑战之外,系统之间的相互依存性和互连表明系统的IA要求必须考虑系统的IA防御能力的两个重要方面。方面是IA攻击的类型,系统必须击退系统,并确保任何渗透系统的IA攻击的能力都包含在系统内,并且不会传播IA要求,这些要求应导出系统的威胁评估以及需要解决上述四项需求挑战。为解决这些问题,我们开发了一种系统架构和采集方法,旨在将系统的IA功能与其他系统能力要求分开;由此,允许允许快速开发的IA能力并与其他系统能力分开评估。仿真环境和技术使我们能够测试和评估问题的解决方案,同时还确保所测试的系统和解决方案没有暴露于现实世界威胁。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号