Skip to main content

Currently Skimming:

Appendix D: Summary of Recent Naval Operations and Department of Defense Reports Related to Information Assurance
Pages 157-164

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 157...
... Behrens Abstract: This document catalogs the data that the Navy Cyber Defense Operations Command (NCDOC) currently collects for use in intrusion detection and forensic analysis.
From page 158...
... Recent threat activities have highlighted the need for an information assurance solution that provides consistent SIM-centric monitoring for these enclave networks. This research will improve current SIM deployments within the Air Force by addressing limitations in commercial products.
From page 159...
... They also recommend that technology risk levels be developed for GIG functional areas, that these be used to track GIG programs during development, and that network-centric implementation documents more carefully define the capabilities for core GIG enterprise services and specify the technical standards with which GIG programs will have to comply for interoperability. REPORTS PUBLISHED IN 2006 Alarm Types and Sensor Placement: Effects on Computer Network Defense Operations Author: S.W.
From page 160...
... The challenge and responsibility to assess EIT investments in the Navy lie with the Assistant Chief of Naval Operations, Information Technology (ACNO-IT) , a relatively new organization established to better manage EIT assets and their development.
From page 161...
... This project will develop a baseline honeyclient capability and document the ongoing costs of running a honeyclient installation so that informed decisions can be made about how best to apply honeyclient technologies as part of security awareness strategies. Graph-Based Worm Detection on Operational Enterprise Networks Authors: D
From page 162...
... Navy Investments in Computer Network Defense: The Essential Components Author: S.W. young Abstract: The Office of the Chief of Naval Operations N71 asked the Center for Naval Analyses (CNA)
From page 163...
... Rathmell Abstract: This report, prepared for and funded by the Information Assurance Advisory Council, analyzes the relationship between corporate governance and information assurance. The study examines the ways in which information assurance can be embedded into corporate risk management processes in the chang ing corporate governance environment.
From page 164...
... 164 INFORMATION ASSURANCE FOR NETWORK-CENTRIC NAVAL FORCES knowledge, access, target vulnerability, nonretribution, and assessment. In addi tion, a new automated tool implemented as an Excel spreadsheet is discussed; this tool greatly simplifies using the methodology and emphasizes analysis on cautions, risks, and barriers.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.