Unmanned Tactical Autonomous Control and Collaboration (UTACC) Threat and Vulnerability Assessment - Impersonation or Spoofing an Unmanned Ground Vehicle (UGV) or Unmanned Aerial Vehicle (UAV)

Nonfiction, History, Military, Aviation, United States
Cover of the book Unmanned Tactical Autonomous Control and Collaboration (UTACC) Threat and Vulnerability Assessment - Impersonation or Spoofing an Unmanned Ground Vehicle (UGV) or Unmanned Aerial Vehicle (UAV) by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310883934
Publisher: Progressive Management Publication: March 10, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310883934
Publisher: Progressive Management
Publication: March 10, 2016
Imprint: Smashwords Edition
Language: English

Professionally converted for accurate flowing-text e-book format reproduction, this report assesses threats to the Unmanned Tactical Autonomous Control and Collaboration (UTACC) system, which faces many diverse threats and is vulnerable on various fronts, but by applying security mitigation strategies this autonomous technology may be useful for the Marine Corps Warfighting Lab (MCWL).

CHAPTER I * INTRODUCTION * A. RESEARCH SPONSOR, OBJECTIVE AND RESULTS * B. BENEFITS TO THE MARINE CORPS WARFIGHTING LAB * C. RESEARCH METHODOLOGY OVERVIEW * D. RELATED WORK * E. THE NEED FOR A THREAT AND VULNERABILITY ASSESSMENT * F. ROAD MAP * CHAPTER II * LITERATURE REVIEW * A. INFORMATION ASSURANCE * 1. The Five Pillars of IA * a. Availability * b. Confidentiality * c. Integrity * d. Authentication * e. Non-repudiation * 2. Risk Management * a. Risk Management Framework Background... * b. RMF Steps * 3. Security Classification of National Security Systems * a. Classification Method * b. Security Controls * 4. DOD Information Assurance Certification and Accreditation Process (DIACAP) * B. THE CYBER SECURITY MATRIX * 1. People * 2. Technology * 3. Operations * 4. Threats * 5. Vulnerabilities * 6. Security Controls and Defense in Depth * CHAPTER III * METHODOLOGY OF ANALYSIS * A. TEMPLATE CREATION * B. BREAKDOWN OF THREAT TEMPLATE * 1. Threat Area * 2. Threat Selection Process * 3. Threat Summary * 4. Impact to the CIA Triad * 5. Vulnerability Analysis * 6. Assumptions * 7. Security Controls * CHAPTER IV * ANALYSIS * A. THREAT TYPE CLASSIFICATION * B. AIRSPACE INTEGRATION * 1. Threat Area /Threat * 2. Threat Summary * 3. Impact to the CIA Triad * 4. Vulnerability Analysis * 5. Assumptions * 6. Security Controls * CHAPTER V * CONCLUSIONS * A. RESEARCH QUESTION 1: WHAT THREATS EXIST THAT HAVE THE POTENTIAL TO AFFECT THE UTACC? * B. RESEARCH QUESTION 2: WHAT VULNERABILITIES ARE INHERENT IN THE UTACC CONCEPT? * C. RESEARCH QUESTION 3: WHAT CAN BE DONE TO MITIGATE THOSE THREATS AND VULNERABILITIES WITHIN UTACC? * D. FUTURE WORK * APPENDIX A * INSIDER THREAT * APPENDIX B * PHISHING * APPENDIX C * MAINTENANCE OF THE UTACC SYSTEM * APPENDIX D * ATTITUDE TOWARDS EMERGING TECHNOLOGIES * APPENDIX E * AUTONOMY AS AN ETHICAL CONCERN * APPENDIX F * SPYWARE * APPENDIX G * JAMMING OF COMMAND AND CONTROL AND DATA LINKS * APPENDIX H * DENIAL OF SERVICE ATTACK * APPENDIX I * EAVESDROPPING * APPENDIX J * AN ATTACK ON MOBILE DEVICES ON A WIRELESS NETWORK * APPENDIX K * A COMPUTER VIRUS ATTACK ON THE UTACC SYSTEM * APPENDIX L * IMPERSONATION OR SPOOFING AN UNMANNED GROUND VEHICLE (UGV) OR UNMANNED AERIAL VEHICLE (UAV) * APPENDIX M * SPOOFING AN INTERNET PROTOCOL (IP) OR MEDIA ACCESS CONTROL (MAC) ADDRESS OF A UTACC SYSTEM COMPONENT * APPENDIX N * UNPROTECTED INFORMATION STORED ON THE UTACC SYSTEM * APPENDIX O * FREQUENCY MANAGEMENT AND DE-CONFLICTION * APPENDIX P * UTACC SYSTEM INTEGRATION WITH LEGACY AND NEWLY PROCURED SYSTEMS * APPENDIX Q * AUTONOMOUS SOFTWARE * APPENDIX R * UNENCRYPTED C2 AND DATA LINKS * APPENDIX S * CONTROLLED CRYPTOGRAPHIC ITEM EMPLOYMENT ONBOARD AN AUTONOMOUS SYSTEM * APPENDIX T * COST THREAT TO THE UTACC SYSTEM RESEARCH, DEVELOPMENT, AND TESTING * APPENDIX U * AIRSPACE INTEGRATION * APPENDIX V * SURFACE SPACE INTEGRATION OF UTACC * APPENDIX W * HUMAN MACHINE INTERACTION * APPENDIX X * RECONNAISSANCE TEAM EMPLOYMENT OF UTACC * APPENDIX Y * SURVIVABILITY OF THE SYSTEM FROM ENEMY WEAPONRY * APPENDIX Z * ENVIRONMENTAL THREATS * APPENDIX AA * TERRAIN * APPENDIX BB * SHIPBOARD OPERATIONS * APPENDIX CC * OPERATIONAL ENDURANCE * LIST OF REFERENCES * INITIAL DISTRIBUTION LIST

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Professionally converted for accurate flowing-text e-book format reproduction, this report assesses threats to the Unmanned Tactical Autonomous Control and Collaboration (UTACC) system, which faces many diverse threats and is vulnerable on various fronts, but by applying security mitigation strategies this autonomous technology may be useful for the Marine Corps Warfighting Lab (MCWL).

CHAPTER I * INTRODUCTION * A. RESEARCH SPONSOR, OBJECTIVE AND RESULTS * B. BENEFITS TO THE MARINE CORPS WARFIGHTING LAB * C. RESEARCH METHODOLOGY OVERVIEW * D. RELATED WORK * E. THE NEED FOR A THREAT AND VULNERABILITY ASSESSMENT * F. ROAD MAP * CHAPTER II * LITERATURE REVIEW * A. INFORMATION ASSURANCE * 1. The Five Pillars of IA * a. Availability * b. Confidentiality * c. Integrity * d. Authentication * e. Non-repudiation * 2. Risk Management * a. Risk Management Framework Background... * b. RMF Steps * 3. Security Classification of National Security Systems * a. Classification Method * b. Security Controls * 4. DOD Information Assurance Certification and Accreditation Process (DIACAP) * B. THE CYBER SECURITY MATRIX * 1. People * 2. Technology * 3. Operations * 4. Threats * 5. Vulnerabilities * 6. Security Controls and Defense in Depth * CHAPTER III * METHODOLOGY OF ANALYSIS * A. TEMPLATE CREATION * B. BREAKDOWN OF THREAT TEMPLATE * 1. Threat Area * 2. Threat Selection Process * 3. Threat Summary * 4. Impact to the CIA Triad * 5. Vulnerability Analysis * 6. Assumptions * 7. Security Controls * CHAPTER IV * ANALYSIS * A. THREAT TYPE CLASSIFICATION * B. AIRSPACE INTEGRATION * 1. Threat Area /Threat * 2. Threat Summary * 3. Impact to the CIA Triad * 4. Vulnerability Analysis * 5. Assumptions * 6. Security Controls * CHAPTER V * CONCLUSIONS * A. RESEARCH QUESTION 1: WHAT THREATS EXIST THAT HAVE THE POTENTIAL TO AFFECT THE UTACC? * B. RESEARCH QUESTION 2: WHAT VULNERABILITIES ARE INHERENT IN THE UTACC CONCEPT? * C. RESEARCH QUESTION 3: WHAT CAN BE DONE TO MITIGATE THOSE THREATS AND VULNERABILITIES WITHIN UTACC? * D. FUTURE WORK * APPENDIX A * INSIDER THREAT * APPENDIX B * PHISHING * APPENDIX C * MAINTENANCE OF THE UTACC SYSTEM * APPENDIX D * ATTITUDE TOWARDS EMERGING TECHNOLOGIES * APPENDIX E * AUTONOMY AS AN ETHICAL CONCERN * APPENDIX F * SPYWARE * APPENDIX G * JAMMING OF COMMAND AND CONTROL AND DATA LINKS * APPENDIX H * DENIAL OF SERVICE ATTACK * APPENDIX I * EAVESDROPPING * APPENDIX J * AN ATTACK ON MOBILE DEVICES ON A WIRELESS NETWORK * APPENDIX K * A COMPUTER VIRUS ATTACK ON THE UTACC SYSTEM * APPENDIX L * IMPERSONATION OR SPOOFING AN UNMANNED GROUND VEHICLE (UGV) OR UNMANNED AERIAL VEHICLE (UAV) * APPENDIX M * SPOOFING AN INTERNET PROTOCOL (IP) OR MEDIA ACCESS CONTROL (MAC) ADDRESS OF A UTACC SYSTEM COMPONENT * APPENDIX N * UNPROTECTED INFORMATION STORED ON THE UTACC SYSTEM * APPENDIX O * FREQUENCY MANAGEMENT AND DE-CONFLICTION * APPENDIX P * UTACC SYSTEM INTEGRATION WITH LEGACY AND NEWLY PROCURED SYSTEMS * APPENDIX Q * AUTONOMOUS SOFTWARE * APPENDIX R * UNENCRYPTED C2 AND DATA LINKS * APPENDIX S * CONTROLLED CRYPTOGRAPHIC ITEM EMPLOYMENT ONBOARD AN AUTONOMOUS SYSTEM * APPENDIX T * COST THREAT TO THE UTACC SYSTEM RESEARCH, DEVELOPMENT, AND TESTING * APPENDIX U * AIRSPACE INTEGRATION * APPENDIX V * SURFACE SPACE INTEGRATION OF UTACC * APPENDIX W * HUMAN MACHINE INTERACTION * APPENDIX X * RECONNAISSANCE TEAM EMPLOYMENT OF UTACC * APPENDIX Y * SURVIVABILITY OF THE SYSTEM FROM ENEMY WEAPONRY * APPENDIX Z * ENVIRONMENTAL THREATS * APPENDIX AA * TERRAIN * APPENDIX BB * SHIPBOARD OPERATIONS * APPENDIX CC * OPERATIONAL ENDURANCE * LIST OF REFERENCES * INITIAL DISTRIBUTION LIST

More books from Progressive Management

Cover of the book The Development of Military Night Aviation to 1919: Emergence of Night Bombing, Tactical and Strategic Bombardment, Foundations of Night Fighting, Reconnaissance, Voisin, Breguet, Sopwith, Caproni by Progressive Management
Cover of the book 2012 People's Republic of China: Military and Security Developments Annual Report to Congress, People's Liberation Army (PLA), Space, Cyber Capabilities, Earlier Reports to 2006 by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: On The Moon With Apollo 16 - A Guidebook to the Descartes Region by Progressive Management
Cover of the book Extending the Thin Blue Line: Constabulary Police Development in Phase Zero (Pre-Crisis Environment) Operations - U.S. Police in Germany 1945, Australian Police in East Timor and Solomon Islands by Progressive Management
Cover of the book Replacing America's Aging Bomber Fleet (B-52, B-1, B-2): Long-Range Strike Bomber (LRS-B) Concepts, Ground Attack, Nuclear, Prompt Global Strike, Conventional ICBMs, Space-Based Systems by Progressive Management
Cover of the book Pakistan's Nuclear Future: Reining in the Risk - Indo-Pakistani Nuclear Confrontation, Risk of Nuclear War in South Asia, Pakistan Economy, Nuclear Power, Demographics, Alternative Ethnic Futures by Progressive Management
Cover of the book United States Postal Service: A Sustainable Path Forward - 2018 Task Force on the USPS Report: Universal Service Obligation, International Models, Mail and Package Markets, Long-term Liabilities by Progressive Management
Cover of the book 2014 Defense Department China Military and Security Report: People's Liberation Army (PLA), Space and Missiles, Force Modernization, Technology, Taiwan, Air Defenses, First Aircraft Carrier by Progressive Management
Cover of the book The Cape: Military Space Operations 1971-1992 - USAF Space Programs, Space Shuttle, Titan Rocket, Delta II, Navstar, Atlas/Centaur, Starbird, Red Tigress by Progressive Management
Cover of the book History of the Joint Chiefs of Staff: Volume VII: The Joint Chiefs of Staff and National Policy 1957-1960 - Nuclear Arms Control, Missile Gap, Germany and Berlin, Cold War in Africa by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: Lunar Receiving Laboratory (LRL) Project History and To Create Space on Earth: The Space Environment Simulation Laboratory (SESL) and Project Apollo by Progressive Management
Cover of the book 21st Century FEMA Study Course: Leadership and Influence (IS-240.a) - Case Studies, Rule of Six, Paradigms, Balancing Inquiry and Advocacy, Personal Influence and Political Savvy by Progressive Management
Cover of the book Algal Biofuels Guide: Renewable Energy from Algae, Macroalgae (Seaweed), Cyanobacteria, Feedstocks, Cultivation, Harvesting, Extraction, Conversion, Distribution and Utilization by Progressive Management
Cover of the book Saturn V Flight Manual: Astronaut's Guide to the Apollo Moon Rocket by Progressive Management
Cover of the book The Assassin's Dagger: An Exploration of the German Judiciary in the Third Reich - Upholding Nazi Laws for Adolf Hitler, Legalization and Enablement of Holocaust, Murder of Jews, Nuremberg Tribunals by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy