{"title":"Methodology for platform IO vulnerability assessment","authors":"R.L. zum Brunnen, P. Ciolek, F.T. Beale","doi":"10.1109/MILCOM.1999.822728","DOIUrl":null,"url":null,"abstract":"The Survivability/Lethality Analysis Directorate (SLAD), US Army Research Laboratory (ARL) has been tasked with the responsibility to develop a methodology and program for use in the assessment of the vulnerabilities made possible with the internal integration C4I systems on major weapons platforms e.g.: M1A2 Abrams Main Battle Tank, AH-64 Apache Attack Helicopter, etc. The ultimate goal of this program is to develop an integrated methodology and toolset that can be used to identify and assess vulnerabilities of integrated C4I systems. The information operations vulnerability/survivability assessment (IOVSA) is a process of analytical steps, which the SLAD of the ARL applies to networked automated information systems (INFOSYS) of military interest. The goal of SLAD's information system survivability tools, techniques, and methodology (TTM) development program is to generate predictive computer models that predict, as closely as is reasonably possible, the real world observed behavior of specific information processor properties caused by various real world stimuli using an agreed upon set of metrics. These stimuli range from normal network operations to the stressing stimuli caused by various software errors, hardware errors, and the multitude of the different forms of intentional or unintentional misuse and hostile attacks to which an information processor may be subjected.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.1999.822728","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The Survivability/Lethality Analysis Directorate (SLAD), US Army Research Laboratory (ARL) has been tasked with the responsibility to develop a methodology and program for use in the assessment of the vulnerabilities made possible with the internal integration C4I systems on major weapons platforms e.g.: M1A2 Abrams Main Battle Tank, AH-64 Apache Attack Helicopter, etc. The ultimate goal of this program is to develop an integrated methodology and toolset that can be used to identify and assess vulnerabilities of integrated C4I systems. The information operations vulnerability/survivability assessment (IOVSA) is a process of analytical steps, which the SLAD of the ARL applies to networked automated information systems (INFOSYS) of military interest. The goal of SLAD's information system survivability tools, techniques, and methodology (TTM) development program is to generate predictive computer models that predict, as closely as is reasonably possible, the real world observed behavior of specific information processor properties caused by various real world stimuli using an agreed upon set of metrics. These stimuli range from normal network operations to the stressing stimuli caused by various software errors, hardware errors, and the multitude of the different forms of intentional or unintentional misuse and hostile attacks to which an information processor may be subjected.