Preface |
|
iii | |
|
|
ix | |
|
|
xi | |
Summary |
|
xiii | |
Acknowledgments |
|
xxi | |
Acronyms and Abbreviations |
|
xxiii | |
Glossary |
|
xxvii | |
|
|
1 | (4) |
|
|
1 | (1) |
|
|
2 | (3) |
|
The Information Warfare Threat and The MEII Response |
|
|
5 | (12) |
|
|
5 | (3) |
|
The MEII As a Structure or Process |
|
|
8 | (4) |
|
Steps of the MEII Process |
|
|
12 | (5) |
|
|
17 | (30) |
|
Focus on Evolving Global Command, Control, Communications, and Intelligence Systems |
|
|
18 | (5) |
|
Global Command and Control System (GCCS) |
|
|
19 | (1) |
|
Global Combat Support System (GCSS) |
|
|
20 | (1) |
|
Defense Information Infrastructure Common Operating Environment (DII-COE) |
|
|
20 | (1) |
|
Internet Protocol Router Networks |
|
|
21 | (1) |
|
Public Switched Network (PSN) |
|
|
22 | (1) |
|
Illustrative Vulnerabilities |
|
|
23 | (5) |
|
|
24 | (1) |
|
|
25 | (3) |
|
|
28 | (8) |
|
Inherent Design/Architecture |
|
|
30 | (1) |
|
|
31 | (1) |
|
Adaptability and Manipulation |
|
|
32 | (1) |
|
|
33 | (2) |
|
Indirect/Nonphysical Exposure |
|
|
35 | (1) |
|
|
35 | (1) |
|
Supporting Facilities/Infrastructures |
|
|
36 | (1) |
|
Relative Importance of Different Vulnerabilities |
|
|
36 | (2) |
|
|
38 | (7) |
|
|
45 | (2) |
|
Responsive Security Techniques |
|
|
47 | (16) |
|
|
48 | (1) |
|
Static Resource Allocation |
|
|
49 | (1) |
|
Dynamic Resource Allocation |
|
|
49 | (1) |
|
|
50 | (1) |
|
Resilience and Robustness |
|
|
50 | (1) |
|
Rapid Recovery and Reconstitution |
|
|
51 | (1) |
|
|
52 | (1) |
|
Segmentation, Decentralization, and Quarantine |
|
|
53 | (1) |
|
Immunologic Identification |
|
|
54 | (1) |
|
Self-Organization and Collective Behavior |
|
|
55 | (2) |
|
|
57 | (1) |
|
Centralized Management of Information Resources |
|
|
58 | (1) |
|
Threat/Warning Response Structure |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (4) |
|
Identifying Security Techniques |
|
|
63 | (14) |
|
Matching Security Techniques to Vulnerabilities |
|
|
63 | (6) |
|
Refining the Applicable Set of Security Techniques |
|
|
69 | (2) |
|
Testing Applied Security Techniques |
|
|
71 | (2) |
|
Trading Security off Against Other Valued Attributes |
|
|
73 | (4) |
|
Distribution of Research Effort |
|
|
77 | (6) |
|
|
77 | (2) |
|
|
79 | (4) |
|
|
83 | (70) |
|
Use Our Methodology As a Checklist |
|
|
83 | (1) |
|
Develop a Test Set of Scenarios Involving IW Attacks |
|
|
83 | (1) |
|
Develop Case Studies of Our Proposed Methodology |
|
|
84 | (1) |
|
Explore Biological Analogies in More Detail |
|
|
84 | (1) |
|
Consider R&D on Survivability Techniques to ``Fill the Gaps'' |
|
|
85 | (2) |
Appendix |
|
|
A. Historical Note on the U.S. Minimum Essential Emergency Communications Network (MEECN) |
|
|
87 | (2) |
|
B. How Threats Relevant to an MEII Differ from Hacker Nuisance Attacks |
|
|
89 | (2) |
|
C. Biological Analogies for Information System Survivability |
|
|
91 | (8) |
|
D. Prioritization in Information Systems |
|
|
99 | (8) |
|
|
107 | (6) |
|
F. Mapping Security Solution Techniques to Vulnerabilities |
|
|
113 | (30) |
|
G. Information Assurance Research Projects Examined |
|
|
143 | (10) |
References |
|
153 | |