Unmanned Tactical Autonomous Control and Collaboration (UTACC) Threat and Vulnerability Assessment - Impersonation or Spoofing an Unmanned Ground Vehicle (UGV) or Unmanned Aerial Vehicle (UAV)

Nonfiction, History, Military, Aviation, United States
Cover of the book Unmanned Tactical Autonomous Control and Collaboration (UTACC) Threat and Vulnerability Assessment - Impersonation or Spoofing an Unmanned Ground Vehicle (UGV) or Unmanned Aerial Vehicle (UAV) by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310883934
Publisher: Progressive Management Publication: March 10, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310883934
Publisher: Progressive Management
Publication: March 10, 2016
Imprint: Smashwords Edition
Language: English

Professionally converted for accurate flowing-text e-book format reproduction, this report assesses threats to the Unmanned Tactical Autonomous Control and Collaboration (UTACC) system, which faces many diverse threats and is vulnerable on various fronts, but by applying security mitigation strategies this autonomous technology may be useful for the Marine Corps Warfighting Lab (MCWL).

CHAPTER I * INTRODUCTION * A. RESEARCH SPONSOR, OBJECTIVE AND RESULTS * B. BENEFITS TO THE MARINE CORPS WARFIGHTING LAB * C. RESEARCH METHODOLOGY OVERVIEW * D. RELATED WORK * E. THE NEED FOR A THREAT AND VULNERABILITY ASSESSMENT * F. ROAD MAP * CHAPTER II * LITERATURE REVIEW * A. INFORMATION ASSURANCE * 1. The Five Pillars of IA * a. Availability * b. Confidentiality * c. Integrity * d. Authentication * e. Non-repudiation * 2. Risk Management * a. Risk Management Framework Background... * b. RMF Steps * 3. Security Classification of National Security Systems * a. Classification Method * b. Security Controls * 4. DOD Information Assurance Certification and Accreditation Process (DIACAP) * B. THE CYBER SECURITY MATRIX * 1. People * 2. Technology * 3. Operations * 4. Threats * 5. Vulnerabilities * 6. Security Controls and Defense in Depth * CHAPTER III * METHODOLOGY OF ANALYSIS * A. TEMPLATE CREATION * B. BREAKDOWN OF THREAT TEMPLATE * 1. Threat Area * 2. Threat Selection Process * 3. Threat Summary * 4. Impact to the CIA Triad * 5. Vulnerability Analysis * 6. Assumptions * 7. Security Controls * CHAPTER IV * ANALYSIS * A. THREAT TYPE CLASSIFICATION * B. AIRSPACE INTEGRATION * 1. Threat Area /Threat * 2. Threat Summary * 3. Impact to the CIA Triad * 4. Vulnerability Analysis * 5. Assumptions * 6. Security Controls * CHAPTER V * CONCLUSIONS * A. RESEARCH QUESTION 1: WHAT THREATS EXIST THAT HAVE THE POTENTIAL TO AFFECT THE UTACC? * B. RESEARCH QUESTION 2: WHAT VULNERABILITIES ARE INHERENT IN THE UTACC CONCEPT? * C. RESEARCH QUESTION 3: WHAT CAN BE DONE TO MITIGATE THOSE THREATS AND VULNERABILITIES WITHIN UTACC? * D. FUTURE WORK * APPENDIX A * INSIDER THREAT * APPENDIX B * PHISHING * APPENDIX C * MAINTENANCE OF THE UTACC SYSTEM * APPENDIX D * ATTITUDE TOWARDS EMERGING TECHNOLOGIES * APPENDIX E * AUTONOMY AS AN ETHICAL CONCERN * APPENDIX F * SPYWARE * APPENDIX G * JAMMING OF COMMAND AND CONTROL AND DATA LINKS * APPENDIX H * DENIAL OF SERVICE ATTACK * APPENDIX I * EAVESDROPPING * APPENDIX J * AN ATTACK ON MOBILE DEVICES ON A WIRELESS NETWORK * APPENDIX K * A COMPUTER VIRUS ATTACK ON THE UTACC SYSTEM * APPENDIX L * IMPERSONATION OR SPOOFING AN UNMANNED GROUND VEHICLE (UGV) OR UNMANNED AERIAL VEHICLE (UAV) * APPENDIX M * SPOOFING AN INTERNET PROTOCOL (IP) OR MEDIA ACCESS CONTROL (MAC) ADDRESS OF A UTACC SYSTEM COMPONENT * APPENDIX N * UNPROTECTED INFORMATION STORED ON THE UTACC SYSTEM * APPENDIX O * FREQUENCY MANAGEMENT AND DE-CONFLICTION * APPENDIX P * UTACC SYSTEM INTEGRATION WITH LEGACY AND NEWLY PROCURED SYSTEMS * APPENDIX Q * AUTONOMOUS SOFTWARE * APPENDIX R * UNENCRYPTED C2 AND DATA LINKS * APPENDIX S * CONTROLLED CRYPTOGRAPHIC ITEM EMPLOYMENT ONBOARD AN AUTONOMOUS SYSTEM * APPENDIX T * COST THREAT TO THE UTACC SYSTEM RESEARCH, DEVELOPMENT, AND TESTING * APPENDIX U * AIRSPACE INTEGRATION * APPENDIX V * SURFACE SPACE INTEGRATION OF UTACC * APPENDIX W * HUMAN MACHINE INTERACTION * APPENDIX X * RECONNAISSANCE TEAM EMPLOYMENT OF UTACC * APPENDIX Y * SURVIVABILITY OF THE SYSTEM FROM ENEMY WEAPONRY * APPENDIX Z * ENVIRONMENTAL THREATS * APPENDIX AA * TERRAIN * APPENDIX BB * SHIPBOARD OPERATIONS * APPENDIX CC * OPERATIONAL ENDURANCE * LIST OF REFERENCES * INITIAL DISTRIBUTION LIST

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Professionally converted for accurate flowing-text e-book format reproduction, this report assesses threats to the Unmanned Tactical Autonomous Control and Collaboration (UTACC) system, which faces many diverse threats and is vulnerable on various fronts, but by applying security mitigation strategies this autonomous technology may be useful for the Marine Corps Warfighting Lab (MCWL).

CHAPTER I * INTRODUCTION * A. RESEARCH SPONSOR, OBJECTIVE AND RESULTS * B. BENEFITS TO THE MARINE CORPS WARFIGHTING LAB * C. RESEARCH METHODOLOGY OVERVIEW * D. RELATED WORK * E. THE NEED FOR A THREAT AND VULNERABILITY ASSESSMENT * F. ROAD MAP * CHAPTER II * LITERATURE REVIEW * A. INFORMATION ASSURANCE * 1. The Five Pillars of IA * a. Availability * b. Confidentiality * c. Integrity * d. Authentication * e. Non-repudiation * 2. Risk Management * a. Risk Management Framework Background... * b. RMF Steps * 3. Security Classification of National Security Systems * a. Classification Method * b. Security Controls * 4. DOD Information Assurance Certification and Accreditation Process (DIACAP) * B. THE CYBER SECURITY MATRIX * 1. People * 2. Technology * 3. Operations * 4. Threats * 5. Vulnerabilities * 6. Security Controls and Defense in Depth * CHAPTER III * METHODOLOGY OF ANALYSIS * A. TEMPLATE CREATION * B. BREAKDOWN OF THREAT TEMPLATE * 1. Threat Area * 2. Threat Selection Process * 3. Threat Summary * 4. Impact to the CIA Triad * 5. Vulnerability Analysis * 6. Assumptions * 7. Security Controls * CHAPTER IV * ANALYSIS * A. THREAT TYPE CLASSIFICATION * B. AIRSPACE INTEGRATION * 1. Threat Area /Threat * 2. Threat Summary * 3. Impact to the CIA Triad * 4. Vulnerability Analysis * 5. Assumptions * 6. Security Controls * CHAPTER V * CONCLUSIONS * A. RESEARCH QUESTION 1: WHAT THREATS EXIST THAT HAVE THE POTENTIAL TO AFFECT THE UTACC? * B. RESEARCH QUESTION 2: WHAT VULNERABILITIES ARE INHERENT IN THE UTACC CONCEPT? * C. RESEARCH QUESTION 3: WHAT CAN BE DONE TO MITIGATE THOSE THREATS AND VULNERABILITIES WITHIN UTACC? * D. FUTURE WORK * APPENDIX A * INSIDER THREAT * APPENDIX B * PHISHING * APPENDIX C * MAINTENANCE OF THE UTACC SYSTEM * APPENDIX D * ATTITUDE TOWARDS EMERGING TECHNOLOGIES * APPENDIX E * AUTONOMY AS AN ETHICAL CONCERN * APPENDIX F * SPYWARE * APPENDIX G * JAMMING OF COMMAND AND CONTROL AND DATA LINKS * APPENDIX H * DENIAL OF SERVICE ATTACK * APPENDIX I * EAVESDROPPING * APPENDIX J * AN ATTACK ON MOBILE DEVICES ON A WIRELESS NETWORK * APPENDIX K * A COMPUTER VIRUS ATTACK ON THE UTACC SYSTEM * APPENDIX L * IMPERSONATION OR SPOOFING AN UNMANNED GROUND VEHICLE (UGV) OR UNMANNED AERIAL VEHICLE (UAV) * APPENDIX M * SPOOFING AN INTERNET PROTOCOL (IP) OR MEDIA ACCESS CONTROL (MAC) ADDRESS OF A UTACC SYSTEM COMPONENT * APPENDIX N * UNPROTECTED INFORMATION STORED ON THE UTACC SYSTEM * APPENDIX O * FREQUENCY MANAGEMENT AND DE-CONFLICTION * APPENDIX P * UTACC SYSTEM INTEGRATION WITH LEGACY AND NEWLY PROCURED SYSTEMS * APPENDIX Q * AUTONOMOUS SOFTWARE * APPENDIX R * UNENCRYPTED C2 AND DATA LINKS * APPENDIX S * CONTROLLED CRYPTOGRAPHIC ITEM EMPLOYMENT ONBOARD AN AUTONOMOUS SYSTEM * APPENDIX T * COST THREAT TO THE UTACC SYSTEM RESEARCH, DEVELOPMENT, AND TESTING * APPENDIX U * AIRSPACE INTEGRATION * APPENDIX V * SURFACE SPACE INTEGRATION OF UTACC * APPENDIX W * HUMAN MACHINE INTERACTION * APPENDIX X * RECONNAISSANCE TEAM EMPLOYMENT OF UTACC * APPENDIX Y * SURVIVABILITY OF THE SYSTEM FROM ENEMY WEAPONRY * APPENDIX Z * ENVIRONMENTAL THREATS * APPENDIX AA * TERRAIN * APPENDIX BB * SHIPBOARD OPERATIONS * APPENDIX CC * OPERATIONAL ENDURANCE * LIST OF REFERENCES * INITIAL DISTRIBUTION LIST

More books from Progressive Management

Cover of the book South Korea in Perspective: Orientation Guide and South Korean Cultural Orientation: Geography, History, Economy, Security, Korean War, Seoul, Busan, Incheon, Chosun, Naktong, Daegu, Kum, Han, Silla by Progressive Management
Cover of the book Oil Spills in Arctic Waters: An Introduction and Inventory of Research Activities and USARC Recommendations - Mitigation, Containment, Countermeasures, Cleanup and Recovery, Environmental Effects by Progressive Management
Cover of the book Demographics of the American Military: Profile of the Military Community 2012 - Total Force, Active Duty Members, Reserve and Guard Members, Families, Pay, Installation Populations by Progressive Management
Cover of the book The Moment of Truth: The Final Report of the National Commission on Fiscal Responsibility and Reform, with Additional Member Comments - Federal Deficit, Social Security, Medicare, Entitlements by Progressive Management
Cover of the book 20th Century Spy in the Sky Satellites: Secrets of the National Reconnaissance Office (NRO) Volume 5 - NRO Leaders, Founders, Pioneers, and the Robert Perry History Volume IV by Progressive Management
Cover of the book Back to Basics: A Study of the Second Lebanon War and Operation CAST LEAD - Israeli IDF Incursions into Lebanon and Gaza 2006 and 2008 Against Hezbollah and Hamas, Tactics, Hard Lessons Learned by Progressive Management
Cover of the book Global Trends 2030: Alternative Worlds - American Intelligence Agency Report on the Megatrends, Gamechangers, and Black Swans of the Future, the Rise of China, Alternative World Scenarios by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Thymoma and Thymic Carcinoma - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book Crony Attack: Strategic Attack's Silver Bullet? Targeting Key Elite Supporters of an Enemy Leader - Operation Allied Force, Slobodan Milosevic, Yugoslavia, RICO, Kleptocracies, Coercive Air Strategy by Progressive Management
Cover of the book Malaysia in Perspective: Orientation Guide and Malay Cultural Orientation: Anwar Ibrahim, History Timeline, Politics and Government, Economy, Society, Security, Religion, Traditions by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: The Targeting Process - Field Manual 3-60 - Principles and Philosophy, Dynamic Targeting (Professional Format Series) by Progressive Management
Cover of the book The Quest: Haywood Hansell and American Strategic Bombing in World War II - Legendary Airman, Doctrine of Precision Bombing, Incendiary Bombing of Japan by Progressive Management
Cover of the book The Strategic Air War Against Germany and Japan: A Memoir - Integrating Strategy, Air Doctrine, Plans, Early Operations, German Electric Power Complex as a Target System by Progressive Management
Cover of the book Boko Haram in Nigeria Encyclopedia: Confronting Terrorism from the Islamic Sect, Threat to Homeland, Political History and Expansion, Attacks, President Goodluck Jonathan by Progressive Management
Cover of the book Whole of Government Approach to Transnational Organized Crime (TOC): Where and How Does the Military Fit In? Case Studies of Colombia, Mexico, and Peacebuilding in Kosovo and Liberia by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy