2015
DOI: 10.21236/ada623114
|View full text |Cite
|
Sign up to set email alerts
|

Operational Exercise Integration Recommendations for DoD Cyber Ranges

Abstract: Cyber-enabled and cyber-physical systems connect and engage virtually every mission-critical military capability today. And as more warfighting technologies become integrated and connected, both the risks and opportunities from a cyberwarfare continue to grow-motivating sweeping requirements and investments in cybersecurity assessment capabilities to evaluate technology vulnerabilities, operational impacts, and operator effectiveness.Operational testing of cyber capabilities, often in conjunction with major mi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…This is especially true if simulations are intended to become immersive for the trainees, increasing 3D graphics, the number of actors/players, realistic sensor inputs, and other environment simulations. Minimal infrastructure overhead will also ensure that CRs do not significantly impact the monitor software that collects and analyses trainee performance and simulation data (Hwang & Bush, 2015). A part of scalability is the quantity of data generated and used during a scenario.…”
Section: Scalabilitymentioning
confidence: 99%
See 2 more Smart Citations
“…This is especially true if simulations are intended to become immersive for the trainees, increasing 3D graphics, the number of actors/players, realistic sensor inputs, and other environment simulations. Minimal infrastructure overhead will also ensure that CRs do not significantly impact the monitor software that collects and analyses trainee performance and simulation data (Hwang & Bush, 2015). A part of scalability is the quantity of data generated and used during a scenario.…”
Section: Scalabilitymentioning
confidence: 99%
“…Lastly, we wish to discuss a method to improve launching realistic training exercise scalability within range to specifically address cyber-security in the maritime context, which is, as explained, unique. One term for this is federation, which was mentioned in papers like Yamin et al (2019), Hwang and Bush (2015) to share activities, explore portable aspects, and compose cyber range capabilities on demand by connecting ranges. These aspects of cyber ranges and testbeds have not been addressed as much as scalability; however, they are becoming more sought after.…”
Section: Federationmentioning
confidence: 99%
See 1 more Smart Citation
“…The first method, the penetration test, is conducted by numerous businesses on their actual network infrastructure to identify vulnerabilities and attack-susceptible surfaces and select more effective defensive systems. Even in the military sector, divisions frequently conduct penetration tests to share valuable information regarding newly learned lessons and potential ideas for improvements [5]. However, applying penetration testing to large-scale networks and systems is expensive in terms of cost, time, and personnel requirements, and the cost of multiple perspectives increases proportionally when testing is applied to a variety of attack scenarios.…”
Section: Introductionmentioning
confidence: 99%