483,108 research outputs found

    An Operational Utility Assessment: Measuring the Effectiveness of the Joint Concept Technology Demonstration (JCTD), Joint Forces Protection Advance Security System (JFPASS)

    Get PDF
    Sponsored Report (for Acquisition Research Program)Planning modern military operations requires an accurate intelligence assessment of potential threats, combined with a detailed assessment of the physical theater of operations. This information can then be combined with equipment and manpower resources to set up a logistically supportable operation that mitigates as much of the enemy threat as possible. Given such a daunting challenge, military planners often turn to intelligent software agents to support their efforts. The success of the mission often hinges on the accuracy of these plans and the integrity of the security umbrella provided. The purpose of this project is to provide a comprehensive assessment of the Joint Forces Protection Advanced Security System (JFPASS) Joint Concept Technology Demonstration (JCTD) to better meet force-protection needs. It will also address the adaptability of this technology to an ever-changing enemy threat by the use of intelligent software. This project will collect and analyze data pertaining to the research, development, testing, and effectiveness of the JFPASS and develop an operational effectiveness model to quantify overall system performance.Naval Postgraduate School Acquisition Research ProgramApproved for public release; distribution is unlimited

    Development and management of high-fidelity test technology for comprehensive performance evaluation of electronic warfare systems in multi-threat environments.

    Get PDF
    This thesis addresses the key challenge of improving multi-threat RF environment simulator capability and fidelity to the level where most, if not all electronic warfare receiver performance could be adequately proven on ground-based test facilities rather than by expensive and difficult to repeat flight trials. For over 25 years the author has investigated his claim that this could be achieved, enabled by suitably enhanced RF threat simulators. The author’s technology development and management leadership has significantly influenced high-fidelity, multi-threat RF emitter scenario simulation capabilities during this period. The published works and this thesis demonstrate this claim to be justified via the many simulator technology developments he has managed to fruition, those many potential enhancements he has identified, and four further research directions he has proposed. Many prior limitations have been overcome by technological developments and the author considers it likely that most remaining ones will be overcome within the next decade, leaving only those receiver performance verification tests that can only be done in flight to be done via flight test. When taken as a whole, the 12 published works represent a significant contribution to the body of aerospace knowledge across the domains of survivability, electronic warfare systems and their test and evaluation, and radio/radar frequency threat simulation. Synthesis of those works demonstrates a coherent theme that links improved multi-threat RF environment simulation capability to more affordable, shorter and less risky receiver development programmes, which thereby also offers improved air platform survivability. The key importance of defence sector affordability is also recognised via development, described in the thesis, of a technology prioritisation assessment method to aid decision making on threat simulation fidelity enhancements. Originality is also demonstrated in the works’ and this thesis’ development of public release reference material in the sensitive topic area of electronic warfare and test and evaluation, for the education of novices of graduate level and upwards, for the advisement of technical professionals, experienced testers and academics, and for the guidance of programme managers

    A Threat Intelligence Framework for Access Control Security In The Oil Industry

    Get PDF
    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better asses and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry

    Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE

    Full text link
    As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are concerned. Security experts, however, must still be able to acquire and analyze data in a methodical, rigorous and forensically sound manner. This work applies the STRIDE asset-based risk assessment method to cloud computing infrastructure for the purpose of identifying and assessing an organization's ability to respond to and investigate breaches in cloud computing environments. An extension to the STRIDE risk assessment model is proposed to help organizations quickly respond to incidents while ensuring acquisition and integrity of the largest amount of digital evidence possible. Further, the proposed model allows organizations to assess the needs and capacity of their incident responders before an incident occurs.Comment: 13 pages, 3 figures, 3 tables, 5th International Conference on Digital Forensics and Cyber Crime; Digital Forensics and Cyber Crime, pp. 223-236, 201

    Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications

    Get PDF
    Over the last years, we have seen several security incidents that compromised system safety, of which some caused physical harm to people. Meanwhile, various risk assessment methods have been developed that integrate safety and security, and these could help to address the corresponding threats by implementing suitable risk treatment plans. However, an overarching overview of these methods, systematizing the characteristics of such methods, is missing. In this paper, we conduct a systematic literature review, and identify 7 integrated safety and security risk assessment methods. We analyze these methods based on 5 different criteria, and identify key characteristics and applications. A key outcome is the distinction between sequential and non-sequential integration of safety and security, related to the order in which safety and security risks are assessed. This study provides a basis for developing more effective integrated safety and security risk assessment methods in the future

    The RFID PIA – developed by industry, agreed by regulators

    Get PDF
    This chapter discusses the privacy impact assessment (PIA) framework endorsed by the European Commission on February 11th, 2011. This PIA, the first to receive the Commission's endorsement, was developed to deal with privacy challenges associated with the deployment of radio frequency identification (RFID) technology, a key building block of the Internet of Things. The goal of this chapter is to present the methodology and key constructs of the RFID PIA Framework in more detail than was possible in the official text. RFID operators can use this article as a support document when they conduct PIAs and need to interpret the PIA Framework. The chapter begins with a history of why and how the PIA Framework for RFID came about. It then proceeds with a description of the endorsed PIA process for RFID applications and explains in detail how this process is supposed to function. It provides examples discussed during the development of the PIA Framework. These examples reflect the rationale behind and evolution of the text's methods and definitions. The chapter also provides insight into the stakeholder debates and compromises that have important implications for PIAs in general.Series: Working Papers on Information Systems, Information Business and Operation

    Towards Automating the Construction & Maintenance of Attack Trees: a Feasibility Study

    Full text link
    Security risk management can be applied on well-defined or existing systems; in this case, the objective is to identify existing vulnerabilities, assess the risks and provide for the adequate countermeasures. Security risk management can also be applied very early in the system's development life-cycle, when its architecture is still poorly defined; in this case, the objective is to positively influence the design work so as to produce a secure architecture from the start. The latter work is made difficult by the uncertainties on the architecture and the multiple round-trips required to keep the risk assessment study and the system architecture aligned. This is particularly true for very large projects running over many years. This paper addresses the issues raised by those risk assessment studies performed early in the system's development life-cycle. Based on industrial experience, it asserts that attack trees can help solve the human cognitive scalability issue related to securing those large, continuously-changing system-designs. However, big attack trees are difficult to build, and even more difficult to maintain. This paper therefore proposes a systematic approach to automate the construction and maintenance of such big attack trees, based on the system's operational and logical architectures, the system's traditional risk assessment study and a security knowledge database.Comment: In Proceedings GraMSec 2014, arXiv:1404.163

    Encouraging Corporate Innovation for Our Homeland During the Best of Times for the Worst of Times: Extending Safety Act Protections to Natural Disasters’

    Get PDF
    This article first analyzes the innovative tort reform of the SAFETY Act and then argues for expansion of SAFETY Act type risk protection to natural disasters such as hurricanes, earthquakes and wildfires. The SAFETY Act was drafted to stimulate the development and deployment of technologies that combat terrorism by providing liability protection. Applying the same type of legislation to natural disasters will provide a commensurate benefit of encouraging preparedness and development of technologies that could mitigate harms resulting from natural disasters. The Department of Homeland Security voiced a desire to increase the use of the SAFETY Act by private industry. This article argues that one way to increase the utility of the SAFETY Act and provide more value for the American public is for Congress to extend SAFETY Act protections, by amendment or new legislation, to cover risk related to national catastrophes
    • …
    corecore