The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Army Cyber Institute (ACI) is a national resource for research, advice, and education in the cyber domain, engaging military, government, academic, and industrial cyber communities in impactful partnerships to build intellectual capital and expand the knowledge base for the purpose of enabling effective Army cyber defense and cyber operations. The ACI seeks to be a premier institute that expands...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Nearly all global economic trade flows through the ports and a broader intermodal transit system in which supporting technology networks are often privately owned and operated. The majority of government oversight and industry cooperation focuses on physical access and the safe construction and operation of ships. The cybersecurity of critical maritime and interconnected infrastructure remains largely...
Industrial Control Systems (ICS) networks are an increasingly attractive for attackers. The case of 2015 Ukraine cyber attack where hackers abused the ICS system to create a blackout is a good illustration of this interest. However, to achieve physical effects, it is necessary for attackers to embed themselves deep within the target network. So, attackers must protect this investment by using covert...
Traditionally, the focus of security and ensuring confidentiality, integrity, and availability of data in spacecraft systems has been on the ground segment and the uplink/downlink components. Although these are the most obvious attack vectors, potential security risks against the satellite's platform is also a serious concern. This paper discusses a notional satellite architecture and explores security...
This paper addresses contract and fiscal limitations in the acquisition process often seen as a constraint on real-time cyber capability development. First, the paper advocates for increased use of Operations and Maintenance (O&M) funds for low-cost cyber capability development. Using the Air Force's Real Time Operations and Innovation model, the paper suggests a near-term solution for other services...
Deterrence is badly needed in the cyber domain but it is hard to be achieved. Why is conventional deterrence not working effectively in the cyber domain? What specific characteristics should be considered when deterrence strategies are developed in this man-made domain? These are the questions that this paper intends to address. The research conducted helps to reveal what cyber deterrence can do and...
The global use of the cyber domain has heightened speed, agility, and interconnectivity within our societies. Consequently, it has also increased threats that share the same characteristics. No longer is reality linear, as two points in time and individuals can connect from varied locations almost instantly, shifting the balance of how we approach traditional security challenges. This paper argues...
With cyber on NATO's agenda since 2002 and cyberspace declared a domain of operations for the Alliance at its 2016 Summit, one can ask a straightforward question — how will the Alliance make this declaration work? Starting from defining cyber operations to establishing procedures and delivering practical capability, much needs to be discussed amongst the NATO nations. In a predictable security environment...
Attribution in cyberspace is one of the most difficult questions facing policy makers, lawyers, and jurists. Indeed, the first question often asked in the wake of a cyber incident is “who did it?” The answer to this question is often critical when dealing with the application of international law because it will dictate the rights and responsibilities of States both from an offensive and defensive...
This paper demonstrates a methodology for how the organizations that employ complex enterprise systems of systems can significantly improve cyber defense while decreasing overall operating costs by using formal methods. The paper demonstrates an approach that uses an event-based methodology to formalize all types of enterprise behavior, to include system, human, and environmental events.
The number of software vulnerabilities discovered and publicly disclosed is increasing every year; however, only a small fraction of them is exploited in real-world attacks. With limitations on time and skilled resources, organizations often look at ways to identify threatened vulnerabilities for patch prioritization. In this paper, we present an exploit prediction model that predicts whether a vulnerability...
The current realities of the cyber domain could be radically disrupted by the advent of quantum communications and quantum computing. The consequent challenges for future cyber security and strategy require a nuanced analysis of these technologies and their likely employment by major powers. The employment of quantum cryptography can create quantum communications systems that are theoretically unhackable...
The Twenty-First Century has seen the dawn of the Internet as a pervasive medium by which nearly all information flows. However, the permissive environment in which the Internet was founded fostered a community plagued by Internet trolls, individuals who deliberately post inflammatory, off-topic, or offensive material on online message boards to elicit angst, or other emotions, from their targets...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.