Cargando…

Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles /

"There is increasing concern that Air Force systems containing information technology are vulnerable to intelligence exploitation and offensive attack through cyberspace. In this report, the authors analyze how the Air Force acquisition/life-cycle management community can improve cybersecurity...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Snyder, Don, 1962- (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Santa Monica, Calif. : RAND, [2015]
Colección:Research report (Rand Corporation) ; RR-1007-AF.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ii 4500
001 JSTOROA_ocn927138395
003 OCoLC
005 20231005004200.0
006 m o d
007 cr |||||||||||
008 151029t20152015cauad ob i000 0 eng d
040 |a DOS  |b eng  |e rda  |e pn  |c DOS  |d YDXCP  |d JSTOR  |d COO  |d LND  |d VT2  |d OCLCA  |d VFL  |d LOA  |d ICG  |d OCLCA  |d U3W  |d OCLCF  |d ICN  |d CEF  |d OCLCQ  |d OCLCO  |d AU@  |d ERL  |d WYU  |d CNTRU  |d NJT  |d VLY  |d EQF  |d UWK  |d SXB  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCQ  |d OCLCO 
019 |a 1162230802  |a 1165778092  |a 1166001957  |a 1166068191  |a 1173929612 
020 |a 9780833093387  |q (electronic bk.) 
020 |a 083309338X  |q (electronic bk.) 
020 |z 9780833089007 
020 |z 0833089005 
029 1 |a AU@  |b 000061154024 
029 1 |a AU@  |b 000065455700 
029 1 |a GBVCP  |b 1008664952 
035 |a (OCoLC)927138395  |z (OCoLC)1162230802  |z (OCoLC)1165778092  |z (OCoLC)1166001957  |z (OCoLC)1166068191  |z (OCoLC)1173929612 
037 |a 22573/ctt19vrc8b  |b JSTOR 
043 |a n-us--- 
050 4 |a TK5105.59  |b .S69 2015eb online 
072 7 |a HIS027140  |2 bisacsh 
072 7 |a COM060040  |2 bisacsh 
072 7 |a TEC025000  |2 bisacsh 
072 7 |a COM043050  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Snyder, Don,  |d 1962-  |e author. 
245 1 0 |a Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles /  |c by Don Snyder, James D. Powers, Elizabeth Bodine-Baron, Bernard Fox, Lauren Kendrick, Michael Powell. 
264 1 |a Santa Monica, Calif. :  |b RAND,  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource (xi, 62 pages) :  |b black and white illustrations, black and white and color charts 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Research reports ;  |v RR-1007-AF 
500 |a "October 27, 2015"--Table of contents page 
505 0 0 |t Preface --  |t Figures --  |t Summary --  |t Acknowledgments --  |t 1. Cybersecurity Management:  |g Introduction --  |g What Should Cybersecurity in Acquisition Achieve? --  |g Managing Cybersecurity Risk --  |g Challenges for Managing Cybersecurity --  |g Principles for Managing Cybersecurity --  |g Principles for Managing Cybersecurity --  |g Summary --  |t 2. Cybersecurity Laws and Policies --  |g Introduction --  |g Legislation and Federal Cybersecurity Policy --  |g Department of Defense Cybersecurity Policy --  |g Cybersecurity and Air Force Life-Cycle Management --  |g Conclusion --  |t 3. Findings and Recommendations:  |g Findings --  |g Discussion --  |g Recommendations --  |g Closing Remarks --  |t Abbreviations --  |t References. 
520 |a "There is increasing concern that Air Force systems containing information technology are vulnerable to intelligence exploitation and offensive attack through cyberspace. In this report, the authors analyze how the Air Force acquisition/life-cycle management community can improve cybersecurity throughout the life cycle of its military systems. The focus is primarily on the subset of procured systems for which the Air Force has some control over design, architectures, protocols, and interfaces (e.g., weapon systems, platform information technology), as opposed to commercial, off-the-shelf information technology and business systems. The main themes in the authors' findings are that cybersecurity laws and policies were created to manage commercial, off-the-shelf information technology and business systems and do not adequately address the challenges of securing military systems. Nor do they adequately capture the impact to operational missions. Cybersecurity is mainly added on to systems, not designed in. The authors recommend 12 steps that the Air Force can take to improve the cybersecurity of its military systems throughout their life cycles"--Publisher's description 
588 0 |a Online resource; title from PDF title page (Rand Corporation, viewed October 28, 2015). 
504 |a Includes bibliographical references (pages 57-62). 
546 |a English. 
590 |a JSTOR  |b Books at JSTOR Open Access 
590 |a JSTOR  |b Books at JSTOR All Purchased 
610 1 0 |a United States.  |b Air Force  |x Rules and practice. 
610 1 6 |a États-Unis.  |b Air Force  |x Règlements et procédure. 
610 1 7 |a United States.  |b Air Force  |2 fast 
650 0 |a Computer networks  |x Security measures  |z United States. 
650 0 |a Cyberspace  |x Security measures  |z United States. 
650 0 |a Cyberinfrastructure  |x Security measures  |z United States  |x Evaluation. 
650 0 |a Risk assessment. 
650 0 |a Cyberterrorism  |z United States  |x Prevention  |y 21st century. 
650 0 |a National security  |z United States  |y 21st century. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |z États-Unis. 
650 6 |a Évaluation du risque. 
650 7 |a risk assessment.  |2 aat 
650 7 |a HISTORY  |x Military  |x Aviation.  |2 bisacsh 
650 7 |a Cyberspace  |x Security measures  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Cyberterrorism  |x Prevention  |2 fast 
650 7 |a National security  |2 fast 
650 7 |a Risk assessment  |2 fast 
651 7 |a United States  |2 fast 
648 7 |a 2000-2099  |2 fast 
655 7 |a Rules  |2 fast 
710 2 |a Rand Corporation,  |e issuing body. 
776 0 8 |i Print version:  |a Snyder, Don, 1962-  |t Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles.  |d ©2015  |w (DLC) 2015952790 
830 0 |a Research report (Rand Corporation) ;  |v RR-1007-AF. 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.7249/j.ctt19rmd15  |z Texto completo 
938 |a YBP Library Services  |b YANK  |n 12856742 
994 |a 92  |b IZTAP