Skip to content
You are not logged in |Login  
     
Limit search to available items
Record:   Prev Next
Resources
More Information
Bestseller
BestsellerE-book
Author Snyder, Don, 1962- author.

Title Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles / by Don Snyder, James D. Powers, Elizabeth Bodine-Baron, Bernard Fox, Lauren Kendrick, Michael Powell.

Publication Info. Santa Monica, Calif. : RAND, [2015]
©2015

Item Status

Description 1 online resource (xi, 62 pages) : black and white illustrations, black and white and color charts.
text file
Series Research reports ; RR-1007-AF
Research report (Rand Corporation) ; RR-1007-AF.
Note "October 27, 2015"--Table of contents page.
Contents Preface -- Figures -- Summary -- Acknowledgments -- 1. Cybersecurity Management: Introduction -- What Should Cybersecurity in Acquisition Achieve? -- Managing Cybersecurity Risk -- Challenges for Managing Cybersecurity -- Principles for Managing Cybersecurity -- Principles for Managing Cybersecurity -- Summary -- 2. Cybersecurity Laws and Policies -- Introduction -- Legislation and Federal Cybersecurity Policy -- Department of Defense Cybersecurity Policy -- Cybersecurity and Air Force Life-Cycle Management -- Conclusion -- 3. Findings and Recommendations: Findings -- Discussion -- Recommendations -- Closing Remarks -- Abbreviations -- References.
Summary "There is increasing concern that Air Force systems containing information technology are vulnerable to intelligence exploitation and offensive attack through cyberspace. In this report, the authors analyze how the Air Force acquisition/life-cycle management community can improve cybersecurity throughout the life cycle of its military systems. The focus is primarily on the subset of procured systems for which the Air Force has some control over design, architectures, protocols, and interfaces (e.g., weapon systems, platform information technology), as opposed to commercial, off-the-shelf information technology and business systems. The main themes in the authors' findings are that cybersecurity laws and policies were created to manage commercial, off-the-shelf information technology and business systems and do not adequately address the challenges of securing military systems. Nor do they adequately capture the impact to operational missions. Cybersecurity is mainly added on to systems, not designed in. The authors recommend 12 steps that the Air Force can take to improve the cybersecurity of its military systems throughout their life cycles"--Publisher's description.
Bibliography Includes bibliographical references (pages 57-62).
Local Note JSTOR Books at JSTOR Open Access
Subject United States. Air Force -- Rules and practice.
United States. Air Force.
Parliamentary practice.
Computer networks -- Security measures -- United States.
Computer networks -- Security measures.
United States.
Cyberspace -- Security measures -- United States.
Cyberspace -- Security measures.
Cyberinfrastructure -- Security measures -- United States -- Evaluation.
Cyberinfrastructure -- Security measures.
Evaluation.
Risk assessment.
Risk assessment.
Cyberterrorism -- United States -- Prevention -- 21st century.
Cyberterrorism.
Chronological Term 21st century
Subject Cyberterrorism -- Prevention.
National security -- United States -- 21st century.
National security.
Chronological Term 2000-2099
Genre/Form Rules.
Electronic books.
Added Author Rand Corporation, issuing body.
Other Form: Print version: Snyder, Don, 1962- Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles. ©2015 (DLC) 2015952790
ISBN 9780833093387 (electronic book)
083309338X (electronic book)
9780833089007
0833089005