首页> 外文期刊>The ITEA Journal of Test and Evaluation >U.S. Air force information assurance computer security system vulnerability assessment process
【24h】

U.S. Air force information assurance computer security system vulnerability assessment process

机译:美国空军信息保证计算机安全系统漏洞评估流程

获取原文
获取原文并翻译 | 示例
       

摘要

To meet the ever-increasing threat of computer attacks on all Department of Defense systems, the U. S. Air Force has developed, through years of experience, procedures to help deny such attacks. The 92nd Information Warfare Aggressor Squadron (92 IWAS), Systems Vulnerabilities Flight, is in the day-to-day business of protecting all Air Force computer systems, encompassing those for ground, air, ship, space and homeland defense. The 92 IWAS mission statement calls for conducting opposing force information warfare operations and information warfare vulnerability assessments by replicating threat capabilities and tactics. This paper examines the following 92 IWAS capabilities: information assurance, leading-edge security tactics, exercise support and system vulnerabilities assessments. Each one of these functions is equally weighted in providing the customer with the best possible service available.
机译:为了应对对所有国防部系统的计算机攻击的日益增长的威胁,美国空军已经通过多年的经验开发了有助于拒绝此类攻击的程序。第92信息战侵略者中队(92 IWAS),系统漏洞飞行,是每天保护所有空军计算机系统的业务,包括地面,空中,舰船,太空和国土防御系统。 IWAS的92项任务声明呼吁通过复制威胁能力和战术进行敌对部队信息战行动和信息战脆弱性评估。本文研究了以下92种IWAS功能:信息保证,前沿安全策略,演习支持和系统漏洞评估。在向客户提供尽可能最佳的可用服务方面,这些功能中的每一项都具有同等的权重。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号