Next Generation Enterprise Network Business Continuity: Maintaining Operations in a Compromised Environment - COOP, Navy, Operation Rolling Tide, Command and Control (C2), Virtualization Technology

Nonfiction, History, Military, Naval, Computers, Networking & Communications
Cover of the book Next Generation Enterprise Network Business Continuity: Maintaining Operations in a Compromised Environment - COOP, Navy, Operation Rolling Tide, Command and Control (C2), Virtualization Technology by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370427727
Publisher: Progressive Management Publication: October 29, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370427727
Publisher: Progressive Management
Publication: October 29, 2016
Imprint: Smashwords Edition
Language: English

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. Operation Rolling Tide, and the events that led up to its initiation, highlighted certain areas in Navy network operations that needed improvement, including maintenance of command and control (C2) of a compromised network. The current continuity of operations plan for NGEN does not detail a contingency providing high-fidelity C2 of the enterprise in the event of an intentional compromise.
Evaluating published literature on virtualization, available technology products currently on the market, and tactics for employing virtualized environments, this research explores whether virtualization is able to provide options allowing network operators to maintain positive C2 during a compromise. It also examines if virtualization will scale appropriately for use in enterprise networks in terms of monetary and manpower costs, and any return on investment that may be realized. Using virtualization technology to create a tailored space capable of collaboration and network modelling provides an option for maintaining secure and useful C2 of the network. The costs involved, if implemented in the current NGEN contract, equate to approximately one-tenth of one percent of the contract award. The primary return on investment is increased readiness.

CHAPTER I - INTRODUCTION * A. CONTINUITY OF OPERATIONS * B. RESILIENCY * 1. Cyber Resiliency Engineering * 2. Resilience Engineering * a. Anticipate * b. Withstand * c. Recover * d Evolve * C. VIRTUALIZATION * 1. Types of Virtualization * a. Server Virtualization * b. Application Virtualization * c. Presentation Virtualization * d. Network Virtualization * e. Storage Virtualization. * 2. Virtualization Security * D. PROBLEM STATEMENT * E. RESEARCH QUESTIONS * F. BENEFITS * G. METHODS * H. LIMITATIONS * I. THESIS ORGANIZATION * 1. Chapter II: Continuity of Operation Strategies * 2. Chapter III Costs of Adopting Virtualization Technology * 3. Chapter IV: Results * CHAPTER II - CONTINUITY OF OPERATIONS STRATEGIES * A. NATURAL DISASTER VERSUS ADVERSARIAL ACTION * 1. Planning for Intentional Disasters * B. DODIN AVAILABLE OPTIONS * 1. Information Operations Condition * 2. Rerouting/Backhauling * 3. Isolation * 4. Alternate Sites * a. Hot Site * b. Warm Site * c. Cold Site * d. Mobile Site * e. Mirrored Site * f. Portable Network Infrastructure * 5. Consolidated Afloat Networks and Enterprise Services * C. VIRTUALIZATION AND COOP * D. VIRTUALIZATION TACTICS AND OPPORTUNITIES * 1. Virtual Maritime Operations Center * 2. Virtual Honeypot * a. Obfuscate * b. Delay * c. Analyze * d. Attribute * E. TACTICS FOR SECURING VIRTUALIZED ENVIRONMENTS DEPLOYED IN THE EVENT OF A COMPROMISE * 1. Virtual DMZ * 2. Moving Target Defense * CHAPTER III - COSTS OF ADOPTING VIRTUALIZATION TECHNOLOGY * A. COSTS * 1. Capabilities * 2. Personnel * a. Users * b. Virtual Network Managers * c. Network Modeler * 3. Organizations * B. AREAS OF INCURRED COST * 1. Up-Front Costs * 2. Facilities and Utilities * 3. Training * C. RETURN ON INVESTMENT * D. RETURN ON KNOWLEDGE * a. Core Areas * b. Difficulty * c. Relative Learning Time * d. Number of Personnel * e. Percentage of Automation * f. Amount of Knowledge Embedded in Automation * g. Total Amount of Knowledge * h. Percentage of Knowledge Allocation * i. Annual Expense * j. Readiness * k. Return on Knowledge * E. DRAWBACKS TO IMPLEMENTING VIRTUALIZATION INTO COOP PLANS * CHAPTER IV - CONCLUSION * A. RESULTS * 1. Is Virtualization Technology a Viable Option for COOP in the Event of a Compromise? * 2. In what Capacity could Virtualization Work to an Advantage in the Stage between Detection and Mitigation? * 3. Will a Virtualized Environment Scale Appropriately? * 4. What Are the Costs of Adopting Virtualization Technology? * B. FUTURE WORK

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. Operation Rolling Tide, and the events that led up to its initiation, highlighted certain areas in Navy network operations that needed improvement, including maintenance of command and control (C2) of a compromised network. The current continuity of operations plan for NGEN does not detail a contingency providing high-fidelity C2 of the enterprise in the event of an intentional compromise.
Evaluating published literature on virtualization, available technology products currently on the market, and tactics for employing virtualized environments, this research explores whether virtualization is able to provide options allowing network operators to maintain positive C2 during a compromise. It also examines if virtualization will scale appropriately for use in enterprise networks in terms of monetary and manpower costs, and any return on investment that may be realized. Using virtualization technology to create a tailored space capable of collaboration and network modelling provides an option for maintaining secure and useful C2 of the network. The costs involved, if implemented in the current NGEN contract, equate to approximately one-tenth of one percent of the contract award. The primary return on investment is increased readiness.

CHAPTER I - INTRODUCTION * A. CONTINUITY OF OPERATIONS * B. RESILIENCY * 1. Cyber Resiliency Engineering * 2. Resilience Engineering * a. Anticipate * b. Withstand * c. Recover * d Evolve * C. VIRTUALIZATION * 1. Types of Virtualization * a. Server Virtualization * b. Application Virtualization * c. Presentation Virtualization * d. Network Virtualization * e. Storage Virtualization. * 2. Virtualization Security * D. PROBLEM STATEMENT * E. RESEARCH QUESTIONS * F. BENEFITS * G. METHODS * H. LIMITATIONS * I. THESIS ORGANIZATION * 1. Chapter II: Continuity of Operation Strategies * 2. Chapter III Costs of Adopting Virtualization Technology * 3. Chapter IV: Results * CHAPTER II - CONTINUITY OF OPERATIONS STRATEGIES * A. NATURAL DISASTER VERSUS ADVERSARIAL ACTION * 1. Planning for Intentional Disasters * B. DODIN AVAILABLE OPTIONS * 1. Information Operations Condition * 2. Rerouting/Backhauling * 3. Isolation * 4. Alternate Sites * a. Hot Site * b. Warm Site * c. Cold Site * d. Mobile Site * e. Mirrored Site * f. Portable Network Infrastructure * 5. Consolidated Afloat Networks and Enterprise Services * C. VIRTUALIZATION AND COOP * D. VIRTUALIZATION TACTICS AND OPPORTUNITIES * 1. Virtual Maritime Operations Center * 2. Virtual Honeypot * a. Obfuscate * b. Delay * c. Analyze * d. Attribute * E. TACTICS FOR SECURING VIRTUALIZED ENVIRONMENTS DEPLOYED IN THE EVENT OF A COMPROMISE * 1. Virtual DMZ * 2. Moving Target Defense * CHAPTER III - COSTS OF ADOPTING VIRTUALIZATION TECHNOLOGY * A. COSTS * 1. Capabilities * 2. Personnel * a. Users * b. Virtual Network Managers * c. Network Modeler * 3. Organizations * B. AREAS OF INCURRED COST * 1. Up-Front Costs * 2. Facilities and Utilities * 3. Training * C. RETURN ON INVESTMENT * D. RETURN ON KNOWLEDGE * a. Core Areas * b. Difficulty * c. Relative Learning Time * d. Number of Personnel * e. Percentage of Automation * f. Amount of Knowledge Embedded in Automation * g. Total Amount of Knowledge * h. Percentage of Knowledge Allocation * i. Annual Expense * j. Readiness * k. Return on Knowledge * E. DRAWBACKS TO IMPLEMENTING VIRTUALIZATION INTO COOP PLANS * CHAPTER IV - CONCLUSION * A. RESULTS * 1. Is Virtualization Technology a Viable Option for COOP in the Event of a Compromise? * 2. In what Capacity could Virtualization Work to an Advantage in the Stage between Detection and Mitigation? * 3. Will a Virtualized Environment Scale Appropriately? * 4. What Are the Costs of Adopting Virtualization Technology? * B. FUTURE WORK

More books from Progressive Management

Cover of the book Shooting the Moon: How NASA Found Water on the Moon, the LCROSS Mission - Lunar CRater Observation and Sensing Satellite - Managing Success, Bad Day, Lunacy, Stakeholders, Having a Lasting Impact by Progressive Management
Cover of the book Turkey in Perspective: Orientation Guide and Turkish Cultural Orientation: Geography, History, Economy, Security, Istanbul, Ankara, Izmir, Bursa, Kurds, Laz, Alevi, Sufism, Cemevis, Tigris, Euphrates by Progressive Management
Cover of the book Reclamation: Managing Water in the West - The Bureau of Reclamation: Origins and Growth to 1945, Volume 1 - Part 2 - Great Depression, Glen Canyon Dam, Colorado River, Hoover Dam, Indian Land by Progressive Management
Cover of the book Analysis of Foreign Military Sales (FMS) in U.S. Army Acquisition Programs - History from World War I and II, Truman Doctrine, Who Controls FMS, TOW Procurement, Javelin Missile, Monetary Value by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: Lunar Scientist Oral Histories, including George Carruthers, Edgar Cortright, Farouk El-Baz, James Head, Wilmot Hess, William Muehlberger, Leon Silver by Progressive Management
Cover of the book NASA Report: Sleep on Earth and in Space: Risk Factors, Health and Performance Outcomes, and Countermeasures - Workshop on Lessons Learned from ISS Space Station and Shuttle Human Flights by Progressive Management
Cover of the book Biodiesel Fuel Handling and Use Guidelines for Users, Blenders, Distributors: Quality Specifications, Benefits and Drawbacks, Issues and Questions, Definitions, MSDS by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: U.S. Marine Corps (USMC) Logistics - Marine Corps Doctrinal Publication (MCDP) 4 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: Unconventional, Contrary, and Ugly: The Lunar Landing Research Vehicle (NASA SP-2004-4535) - Design and Development, LLTV, Armstrong by Progressive Management
Cover of the book Art of War Paper: Survival Through Adaptation: The Chinese Red Army and the Extermination Campaigns, 1927-1936 - Late Qing to Early Republican China, Li Lisan Line, Bolsheviks by Progressive Management
Cover of the book The Report of the Presidential Commission on the Space Shuttle Challenger Accident: The Tragedy of Mission 51-L in 1986 - Volume 5 Hearings Part Two by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Thymoma and Thymic Carcinoma - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: U.S. Marine Corps (USMC) A Book on Books - Professional Reading Lists, Read to Lead in Today's Corps (Value-Added Professional Format Series) by Progressive Management
Cover of the book The Necessity for the Military Assistance Command: Vietnam Studies and Observations Group - MACVSOG Psychological Warfare, Maritime Interdiction, Recon Patrols, and Personnel Recovery Missions by Progressive Management
Cover of the book Unmanned Tactical Autonomous Control and Collaboration (UTACC) Threat and Vulnerability Assessment - Impersonation or Spoofing an Unmanned Ground Vehicle (UGV) or Unmanned Aerial Vehicle (UAV) by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy