Military Cyber Affairs最新文献

筛选
英文 中文
Combining Frameworks to Improve Military Health System Quality and Cybersecurity 结合框架提高军队卫生系统质量和网络安全
Military Cyber Affairs Pub Date : 2023-05-01 DOI: 10.5038/2378-0789.6.1.1088
Dr. Maureen L Schafer, Dr. Joseph H Schafer
{"title":"Combining Frameworks to Improve Military Health System Quality and Cybersecurity","authors":"Dr. Maureen L Schafer, Dr. Joseph H Schafer","doi":"10.5038/2378-0789.6.1.1088","DOIUrl":"https://doi.org/10.5038/2378-0789.6.1.1088","url":null,"abstract":"Existing conceptual frameworks and commercially available technology could be considered to rapidly operationalize the use of Quality Measures (QM) within military health systems (Costantino et al. 2020). Purchased healthcare as well as digital healthcare services have paved the way for data collection from multiple information systems thus offering stakeholders actionable intelligence to both guide and measure healthcare outcomes. However, the collection of data secondary to Smart Devices, disparate information systems, cloud services, and the Internet of Medical Things (IOMT) is a complication for security experts that also affect clients, stakeholders, organizations, and businesses delivering patient care. We have combined three conceptual frameworks: (1) Donabedian’s Quality Attributes Framework (DQA), (2) The National Academy of Medicine (NAM) framework, and the (3) Healthcare and Public Health (HPH) Cybersecurity Framework (HCF). Each of these frameworks is well-tested, widely accepted, and referenced as the gold standard in delivering quality care (DQA and NAM) and cybersecurity (HCF) for healthcare. Separately, each framework provides long-used analysis, guidance, and application of quality reliable measures of healthcare services. The combined frameworksmay enhance data integrity (collection and standardized safety of data in regard to regulatory compliance). The combined frameworks also support identifying gaps in quality of care, support the prioritization of cost-effective methodologies that predictably improve patient outcomes, and support DHA’s quality measures. Finally, we offer the importance of understanding the components of quality measures in a more precise manner while maintaining information technology (IT) governance compliance.","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115859474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Operationalizing Deterrence by Denial in the Cyber Domain 在网络领域实施拒止威慑
Military Cyber Affairs Pub Date : 2023-05-01 DOI: 10.5038/2378-0789.6.1.1093
Gentry Lane
{"title":"Operationalizing Deterrence by Denial in the Cyber Domain","authors":"Gentry Lane","doi":"10.5038/2378-0789.6.1.1093","DOIUrl":"https://doi.org/10.5038/2378-0789.6.1.1093","url":null,"abstract":"","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133906090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security-Enhanced Serial Communications 安全增强的串行通信
Military Cyber Affairs Pub Date : 2023-05-01 DOI: 10.5038/2378-0789.6.1.1092
J. White, Alexander Beall, Joseph Maurio, Dane Fichter, M. Davis, Zachary Birnbaum
{"title":"Security-Enhanced Serial Communications","authors":"J. White, Alexander Beall, Joseph Maurio, Dane Fichter, M. Davis, Zachary Birnbaum","doi":"10.5038/2378-0789.6.1.1092","DOIUrl":"https://doi.org/10.5038/2378-0789.6.1.1092","url":null,"abstract":"Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and integrity techniques, such as those provided by Transport Layer Security (TLS). Our approach seeks to address the challenges of providing authentication to serial communications while keeping the existing serial communications bus in place and adding minimal hardware. Here we demonstrate the integration of field-programmable gate arrays (FPGAs) on the bus to inject message authentication codes into an out-of-band (OOB) communications channel, leveraging Power Line Communication (PLC) techniques. Our results show that simple solutions can be integrated into existing serial communications to provide necessary security features in critically important systems. The presented solution is inexpensive, scales well, is modular and extensible, and has low temporal overhead. Providing authenticated serial communications for critical infrastructure systems will improve their ability to resist cyber attacks.","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133476976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What Senior U.S. Leaders Say We Should Know About Cyber 美国高级领导人说我们应该了解网络
Military Cyber Affairs Pub Date : 2023-05-01 DOI: 10.5038/2378-0789.6.1.1089
Dr. Joseph H Schafer
{"title":"What Senior U.S. Leaders Say We Should Know About Cyber","authors":"Dr. Joseph H Schafer","doi":"10.5038/2378-0789.6.1.1089","DOIUrl":"https://doi.org/10.5038/2378-0789.6.1.1089","url":null,"abstract":"On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121961555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing the Battleverse: The People’s Liberation Army’s Digital Twin Strategy 增强战场:中国人民解放军的数字孪生战略
Military Cyber Affairs Pub Date : 2023-05-01 DOI: 10.5038/2378-0789.6.1.1091
Joshua Baughman
{"title":"Enhancing the Battleverse: The People’s Liberation Army’s Digital Twin Strategy","authors":"Joshua Baughman","doi":"10.5038/2378-0789.6.1.1091","DOIUrl":"https://doi.org/10.5038/2378-0789.6.1.1091","url":null,"abstract":"Part of the Chinese Studies Commons, Cognitive Psychology Commons, Cognitive Science Commons, Computer and Systems Architecture Commons, Computer Law Commons, Digital Communications and Networking Commons, Intellectual Property Law Commons, International Relations Commons, Military, War, and Peace Commons, National Security Law Commons, Other Computer Engineering Commons, and the Systems Science Commons","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124015366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Three Emerging Innovative Technologies Required for Cyber Operations to Execute Commander’s Intent at Machine Speed 网络作战以机器速度执行指挥官意图所需的三种新兴创新技术
Military Cyber Affairs Pub Date : 2020-12-01 DOI: 10.5038/2378-0789.4.2.1069
Andrew Stewart
{"title":"Three Emerging Innovative Technologies Required for Cyber Operations to Execute Commander’s Intent at Machine Speed","authors":"Andrew Stewart","doi":"10.5038/2378-0789.4.2.1069","DOIUrl":"https://doi.org/10.5038/2378-0789.4.2.1069","url":null,"abstract":"Decision advantage for the DoD and Combined Cyber Operations results from the secure, seamless, and rapid maneuver of data and information. In the DoD’s 2018 Artificial Intelligence Strategy, the DoD recognized that it must, “put in place key building blocks and platforms to scale and democratize access to AI. This includes creating a common foundation of shared data, reusable tools, frameworks and standards, and cloud and edge services.” More than ever, integrated, adaptive cyber operations provide the means of maneuver for data to enable DoD’s decision advantage-based goals. To support this vision, the integrated implementation three innovative cyber technologies must be rapidly realized across DoD Networks in order to execute cyber operations according to Commander’s Intent—at machine speed.\u0000Getting Information to the “edge” is what makes DoD competitive and provides advantage. The word “edge” in this context reflects the distributed individual platforms, sensors, and people who comprise the scale and scope of today’s globally networked DoD operations. That edge is creating the demand to access data and consume information as never before, and a greater need for more innovation to support DoD cyber operations on the DoD Information Network (DODIN). At the heart of the need for innovation is an increased demand for data and information, as well as the size and scale of networks and networking exploding without a proportionate growth in the IT resources to support today’s cyber operational demand. If the network continues to grow exponentially and must function as the medium of maneuver for the data that provides DoD decision advantage to the edge, then the DoD must deploy revolutionary innovations to reinvent the network as an integrated platform for cyber operations—across the enterprise and to the edge and implemented natively as hybrid multicloud-ready.\u0000Three innovative, next-generation networking technologies, integrated tightly together, offer the opportunity for DoD to provide revolutionary cyber operations capabilities across the DODIN and produce improved, data-enabled mission results. The scalable and seamless integration of: (1) advanced identity management, (2) software-defined networking, and (3) hybrid multicloud capabilities provides a Commander’s Intent-driven Cyber Platform implemented in a zero trust architecture that operates at machine speed and ensures decision advantage for the DoD.","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126775927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cyber Metaphors and Cyber Goals: Lessons from “Flatland” 网络隐喻与网络目标:来自《平面世界》的启示
Military Cyber Affairs Pub Date : 2019-10-01 DOI: 10.5038/2378-0789.4.1.1045
P. Trepagnier
{"title":"Cyber Metaphors and Cyber Goals: Lessons from “Flatland”","authors":"P. Trepagnier","doi":"10.5038/2378-0789.4.1.1045","DOIUrl":"https://doi.org/10.5038/2378-0789.4.1.1045","url":null,"abstract":"Reasoning about complex and abstract ideas is greatly influenced by the choice of metaphors through which they are represented. In this paper we consider the framing effect in military doctrine of considering cyberspace as a domain of action, parallel to the traditional domains of land, sea, air, and space. By means of the well-known Victorian science-fiction novella Flatland, we offer a critique of this dominant cyber metaphor. In Flatland, the problems of lower-dimensional beings comprehending additional dimensions are explored at some length. Inspired by Flatland, our suggested alternate metaphor for cyber is an additional (fourth) dimension. We then propose three common characteristics between the world of Spaceland as experienced by Flatland natives and that of Cyberland as experienced by humans, and finally explore some possible new insights suggested by the Flatland dimensional metaphor.","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129029476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Command and Control for Cyberspace Operations - A Call for Research 网络空间作战的指挥与控制——研究呼吁
Military Cyber Affairs Pub Date : 2019-10-01 DOI: 10.5038/2378-0789.4.1.1051
A. Morgan, S. Stone
{"title":"Command and Control for Cyberspace Operations - A Call for Research","authors":"A. Morgan, S. Stone","doi":"10.5038/2378-0789.4.1.1051","DOIUrl":"https://doi.org/10.5038/2378-0789.4.1.1051","url":null,"abstract":"The United States Department of Defense (DoD) declared cyberspace as an operational domain in 2011. The DoD subsequently formed US Cyber Command and the Cyber Mission Force to conduct operations to achieve national and military objectives in and through cyberspace. Since that time, the DoD has implemented and evolved through multiple command and control (C2) structures for cyberspace operations, derived from traditional military C2 doctrine, to achieve unity of effort across both the global cyberspace domain and with military operations in the physical domains (land, sea, air, and space). The DoD continues to struggle to adapt its C2 methods from the physical domains to the cyber domain. Applying traditional military C2 constructs to the cyberspace domain leads to several problems due to the uniqueness of cyberspace from the other domains. Cyberspace presents a very different operational environment than the physical domains, where time and space are compressed.\u0000In this paper, we describe the factors that make cyberspace different from the other operational domains and the challenges those differences impose on existing C2 constructs. We propose a campaign of experimentation, consisting of a series cyberspace C2 experiments, to address these challenges by conducting research into the taxonomy of C2 nodes, decisions, information, and relationships, which can be used to simulate and refine DoD cyberspace operations C2 constructs.","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133775928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strategic Challenges of Declining International Power for Democracies in a Hostile Cyber World: The Case of China 在充满敌意的网络世界中,国际力量衰落对民主国家的战略挑战:以中国为例
Military Cyber Affairs Pub Date : 2018-12-01 DOI: 10.5038/2378-0789.3.2.1054
Nigel Inkster
{"title":"Strategic Challenges of Declining International Power for Democracies in a Hostile Cyber World: The Case of China","authors":"Nigel Inkster","doi":"10.5038/2378-0789.3.2.1054","DOIUrl":"https://doi.org/10.5038/2378-0789.3.2.1054","url":null,"abstract":"","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127810460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strategy Needed to Protect National Sovereignty of US Telecommunications Backbone 保护美国电信主干网国家主权的必要战略
Military Cyber Affairs Pub Date : 2018-12-01 DOI: 10.5038/2378-0789.3.2.1058
T. Donahue
{"title":"Strategy Needed to Protect National Sovereignty of US Telecommunications Backbone","authors":"T. Donahue","doi":"10.5038/2378-0789.3.2.1058","DOIUrl":"https://doi.org/10.5038/2378-0789.3.2.1058","url":null,"abstract":"","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122225403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信