search for books and compare prices
Tables of Contents for Securing the U.S. Defense Information Infrastructure
Chapter/Section Title
Page #
Page Count
Preface
iii
 
Figures
ix
 
Tables
xi
 
Summary
xiii
 
Acknowledgments
xxi
 
Acronyms and Abbreviations
xxiii
 
Glossary
xxvii
 
Introduction
1
4
Problem and Purpose
1
1
Focus
2
3
The Information Warfare Threat and The MEII Response
5
12
The Threat
5
3
The MEII As a Structure or Process
8
4
Steps of the MEII Process
12
5
Vulnerabilities
17
30
Focus on Evolving Global Command, Control, Communications, and Intelligence Systems
18
5
Global Command and Control System (GCCS)
19
1
Global Combat Support System (GCSS)
20
1
Defense Information Infrastructure Common Operating Environment (DII-COE)
20
1
Internet Protocol Router Networks
21
1
Public Switched Network (PSN)
22
1
Illustrative Vulnerabilities
23
5
IP Router Networks
24
1
Public Switched Network
25
3
Generic Vulnerabilities
28
8
Inherent Design/Architecture
30
1
Behavioral Complexity
31
1
Adaptability and Manipulation
32
1
Operation/Configuration
33
2
Indirect/Nonphysical Exposure
35
1
Direct/Physical Exposure
35
1
Supporting Facilities/Infrastructures
36
1
Relative Importance of Different Vulnerabilities
36
2
From Generic to Specific
38
7
A Concluding Observation
45
2
Responsive Security Techniques
47
16
Heterogeneity
48
1
Static Resource Allocation
49
1
Dynamic Resource Allocation
49
1
Redundancy
50
1
Resilience and Robustness
50
1
Rapid Recovery and Reconstitution
51
1
Deception
52
1
Segmentation, Decentralization, and Quarantine
53
1
Immunologic Identification
54
1
Self-Organization and Collective Behavior
55
2
Personnel Management
57
1
Centralized Management of Information Resources
58
1
Threat/Warning Response Structure
58
1
Protect, Detect, React
59
1
From Generic to Specific
59
4
Identifying Security Techniques
63
14
Matching Security Techniques to Vulnerabilities
63
6
Refining the Applicable Set of Security Techniques
69
2
Testing Applied Security Techniques
71
2
Trading Security off Against Other Valued Attributes
73
4
Distribution of Research Effort
77
6
Approach
77
2
Results
79
4
Recommendations
83
70
Use Our Methodology As a Checklist
83
1
Develop a Test Set of Scenarios Involving IW Attacks
83
1
Develop Case Studies of Our Proposed Methodology
84
1
Explore Biological Analogies in More Detail
84
1
Consider R&D on Survivability Techniques to ``Fill the Gaps''
85
2
Appendix
A. Historical Note on the U.S. Minimum Essential Emergency Communications Network (MEECN)
87
2
B. How Threats Relevant to an MEII Differ from Hacker Nuisance Attacks
89
2
C. Biological Analogies for Information System Survivability
91
8
D. Prioritization in Information Systems
99
8
E. On Deception
107
6
F. Mapping Security Solution Techniques to Vulnerabilities
113
30
G. Information Assurance Research Projects Examined
143
10
References
153