Integrated Adaptive Cyberspace Defense: Secure Orchestration

نویسنده

  • Keith D. Willett
چکیده

The Department of Defense Strategy for Operating in Cyberspace (DSCOC) calls out the need for active cyber defense (ACD). The function of ACD is to provide sensing, sense-making, decision-making, and acting in cyber-relevant time in order to provide cyberspace defense before an adversary is able to bring about their desired effect. As automation increases and we move ever closer to automated cybersecurity operation, there is an increasing need for automated command and control (C2) to direct the tactical maneuvering of cyberspace assets as well as to provide the logic required to manage this maneuvering. The DoD ACD team is collaborating with the Department of Homeland Security (DHS) Enterprise Automated Security Environment (EASE) activity to define the needs for integrated adaptive cyberspace defense including the needs for agile C2. This paper provides a summary of the DoD/DHS collaboration and describes frameworks, activities, and results to date to define and realize integrated agile cyberspace defense agile command and control as well as a notional definition and description of an ACD Secure Orchestration capability.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Two Nationally Sponsored Initiatives for Disseminating Assurance Knowledge

Education in software assurance is an essential element in the effort to produce secure code. This paper describes two efforts that support national cybersecurity education goals: development of software assurance learning artifacts that can be integrated into conventional learning environments and development of a master of software assurance reference curriculum. SOFTWARE DEFENSE APPLICATION ...

متن کامل

Teamwork in Cyberspace: Using TEAMCORE to Make Agents Team-Ready

In complex, dynamic and uncertain environments extending from disaster rescue missions, to future battlefields, to monitoring and surveillance tasks, to virtual training environments, to future robotic space missions, intelligent agents will play a key role in information gathering and filtering, as well as in task planning and execution. Although physically distributed on a variety of platform...

متن کامل

Cyber Assessment Methods for SCADA Security

The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation’s critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) s...

متن کامل

A Survey on Various Cyber Attacks and their Classification

The role of computers and the Internet in modern society is well recognized. Recent developments in the fields of networking and cyberspace have greatly benefited mankind, but the rapid growth of cyberspace has also contributed to unethical practices by individuals who are bent on using the technology to exploit others. Such exploitation of cyberspace for the purpose of accessing unauthorized o...

متن کامل

Global Initiatives to Secure Cyberspace - An Emerging Landscape

What do you do to start reading global initiatives to secure cyberspace an emerging landscape reprint? Searching the book that you love to read first or find an interesting book that will make you want to read? Everybody has difference with their reason of reading a book. Actuary, reading habit must be from earlier. Many people may be love to read, but not a book. It's not fault. Someone will b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015