Unmanned Tactical Autonomous Control and Collaboration (UTACC) Threat and Vulnerability Assessment - Impersonation or Spoofing an Unmanned Ground Vehicle (UGV) or Unmanned Aerial Vehicle (UAV)

Nonfiction, History, Military, Aviation, United States
Cover of the book Unmanned Tactical Autonomous Control and Collaboration (UTACC) Threat and Vulnerability Assessment - Impersonation or Spoofing an Unmanned Ground Vehicle (UGV) or Unmanned Aerial Vehicle (UAV) by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310883934
Publisher: Progressive Management Publication: March 10, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310883934
Publisher: Progressive Management
Publication: March 10, 2016
Imprint: Smashwords Edition
Language: English

Professionally converted for accurate flowing-text e-book format reproduction, this report assesses threats to the Unmanned Tactical Autonomous Control and Collaboration (UTACC) system, which faces many diverse threats and is vulnerable on various fronts, but by applying security mitigation strategies this autonomous technology may be useful for the Marine Corps Warfighting Lab (MCWL).

CHAPTER I * INTRODUCTION * A. RESEARCH SPONSOR, OBJECTIVE AND RESULTS * B. BENEFITS TO THE MARINE CORPS WARFIGHTING LAB * C. RESEARCH METHODOLOGY OVERVIEW * D. RELATED WORK * E. THE NEED FOR A THREAT AND VULNERABILITY ASSESSMENT * F. ROAD MAP * CHAPTER II * LITERATURE REVIEW * A. INFORMATION ASSURANCE * 1. The Five Pillars of IA * a. Availability * b. Confidentiality * c. Integrity * d. Authentication * e. Non-repudiation * 2. Risk Management * a. Risk Management Framework Background... * b. RMF Steps * 3. Security Classification of National Security Systems * a. Classification Method * b. Security Controls * 4. DOD Information Assurance Certification and Accreditation Process (DIACAP) * B. THE CYBER SECURITY MATRIX * 1. People * 2. Technology * 3. Operations * 4. Threats * 5. Vulnerabilities * 6. Security Controls and Defense in Depth * CHAPTER III * METHODOLOGY OF ANALYSIS * A. TEMPLATE CREATION * B. BREAKDOWN OF THREAT TEMPLATE * 1. Threat Area * 2. Threat Selection Process * 3. Threat Summary * 4. Impact to the CIA Triad * 5. Vulnerability Analysis * 6. Assumptions * 7. Security Controls * CHAPTER IV * ANALYSIS * A. THREAT TYPE CLASSIFICATION * B. AIRSPACE INTEGRATION * 1. Threat Area /Threat * 2. Threat Summary * 3. Impact to the CIA Triad * 4. Vulnerability Analysis * 5. Assumptions * 6. Security Controls * CHAPTER V * CONCLUSIONS * A. RESEARCH QUESTION 1: WHAT THREATS EXIST THAT HAVE THE POTENTIAL TO AFFECT THE UTACC? * B. RESEARCH QUESTION 2: WHAT VULNERABILITIES ARE INHERENT IN THE UTACC CONCEPT? * C. RESEARCH QUESTION 3: WHAT CAN BE DONE TO MITIGATE THOSE THREATS AND VULNERABILITIES WITHIN UTACC? * D. FUTURE WORK * APPENDIX A * INSIDER THREAT * APPENDIX B * PHISHING * APPENDIX C * MAINTENANCE OF THE UTACC SYSTEM * APPENDIX D * ATTITUDE TOWARDS EMERGING TECHNOLOGIES * APPENDIX E * AUTONOMY AS AN ETHICAL CONCERN * APPENDIX F * SPYWARE * APPENDIX G * JAMMING OF COMMAND AND CONTROL AND DATA LINKS * APPENDIX H * DENIAL OF SERVICE ATTACK * APPENDIX I * EAVESDROPPING * APPENDIX J * AN ATTACK ON MOBILE DEVICES ON A WIRELESS NETWORK * APPENDIX K * A COMPUTER VIRUS ATTACK ON THE UTACC SYSTEM * APPENDIX L * IMPERSONATION OR SPOOFING AN UNMANNED GROUND VEHICLE (UGV) OR UNMANNED AERIAL VEHICLE (UAV) * APPENDIX M * SPOOFING AN INTERNET PROTOCOL (IP) OR MEDIA ACCESS CONTROL (MAC) ADDRESS OF A UTACC SYSTEM COMPONENT * APPENDIX N * UNPROTECTED INFORMATION STORED ON THE UTACC SYSTEM * APPENDIX O * FREQUENCY MANAGEMENT AND DE-CONFLICTION * APPENDIX P * UTACC SYSTEM INTEGRATION WITH LEGACY AND NEWLY PROCURED SYSTEMS * APPENDIX Q * AUTONOMOUS SOFTWARE * APPENDIX R * UNENCRYPTED C2 AND DATA LINKS * APPENDIX S * CONTROLLED CRYPTOGRAPHIC ITEM EMPLOYMENT ONBOARD AN AUTONOMOUS SYSTEM * APPENDIX T * COST THREAT TO THE UTACC SYSTEM RESEARCH, DEVELOPMENT, AND TESTING * APPENDIX U * AIRSPACE INTEGRATION * APPENDIX V * SURFACE SPACE INTEGRATION OF UTACC * APPENDIX W * HUMAN MACHINE INTERACTION * APPENDIX X * RECONNAISSANCE TEAM EMPLOYMENT OF UTACC * APPENDIX Y * SURVIVABILITY OF THE SYSTEM FROM ENEMY WEAPONRY * APPENDIX Z * ENVIRONMENTAL THREATS * APPENDIX AA * TERRAIN * APPENDIX BB * SHIPBOARD OPERATIONS * APPENDIX CC * OPERATIONAL ENDURANCE * LIST OF REFERENCES * INITIAL DISTRIBUTION LIST

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Professionally converted for accurate flowing-text e-book format reproduction, this report assesses threats to the Unmanned Tactical Autonomous Control and Collaboration (UTACC) system, which faces many diverse threats and is vulnerable on various fronts, but by applying security mitigation strategies this autonomous technology may be useful for the Marine Corps Warfighting Lab (MCWL).

CHAPTER I * INTRODUCTION * A. RESEARCH SPONSOR, OBJECTIVE AND RESULTS * B. BENEFITS TO THE MARINE CORPS WARFIGHTING LAB * C. RESEARCH METHODOLOGY OVERVIEW * D. RELATED WORK * E. THE NEED FOR A THREAT AND VULNERABILITY ASSESSMENT * F. ROAD MAP * CHAPTER II * LITERATURE REVIEW * A. INFORMATION ASSURANCE * 1. The Five Pillars of IA * a. Availability * b. Confidentiality * c. Integrity * d. Authentication * e. Non-repudiation * 2. Risk Management * a. Risk Management Framework Background... * b. RMF Steps * 3. Security Classification of National Security Systems * a. Classification Method * b. Security Controls * 4. DOD Information Assurance Certification and Accreditation Process (DIACAP) * B. THE CYBER SECURITY MATRIX * 1. People * 2. Technology * 3. Operations * 4. Threats * 5. Vulnerabilities * 6. Security Controls and Defense in Depth * CHAPTER III * METHODOLOGY OF ANALYSIS * A. TEMPLATE CREATION * B. BREAKDOWN OF THREAT TEMPLATE * 1. Threat Area * 2. Threat Selection Process * 3. Threat Summary * 4. Impact to the CIA Triad * 5. Vulnerability Analysis * 6. Assumptions * 7. Security Controls * CHAPTER IV * ANALYSIS * A. THREAT TYPE CLASSIFICATION * B. AIRSPACE INTEGRATION * 1. Threat Area /Threat * 2. Threat Summary * 3. Impact to the CIA Triad * 4. Vulnerability Analysis * 5. Assumptions * 6. Security Controls * CHAPTER V * CONCLUSIONS * A. RESEARCH QUESTION 1: WHAT THREATS EXIST THAT HAVE THE POTENTIAL TO AFFECT THE UTACC? * B. RESEARCH QUESTION 2: WHAT VULNERABILITIES ARE INHERENT IN THE UTACC CONCEPT? * C. RESEARCH QUESTION 3: WHAT CAN BE DONE TO MITIGATE THOSE THREATS AND VULNERABILITIES WITHIN UTACC? * D. FUTURE WORK * APPENDIX A * INSIDER THREAT * APPENDIX B * PHISHING * APPENDIX C * MAINTENANCE OF THE UTACC SYSTEM * APPENDIX D * ATTITUDE TOWARDS EMERGING TECHNOLOGIES * APPENDIX E * AUTONOMY AS AN ETHICAL CONCERN * APPENDIX F * SPYWARE * APPENDIX G * JAMMING OF COMMAND AND CONTROL AND DATA LINKS * APPENDIX H * DENIAL OF SERVICE ATTACK * APPENDIX I * EAVESDROPPING * APPENDIX J * AN ATTACK ON MOBILE DEVICES ON A WIRELESS NETWORK * APPENDIX K * A COMPUTER VIRUS ATTACK ON THE UTACC SYSTEM * APPENDIX L * IMPERSONATION OR SPOOFING AN UNMANNED GROUND VEHICLE (UGV) OR UNMANNED AERIAL VEHICLE (UAV) * APPENDIX M * SPOOFING AN INTERNET PROTOCOL (IP) OR MEDIA ACCESS CONTROL (MAC) ADDRESS OF A UTACC SYSTEM COMPONENT * APPENDIX N * UNPROTECTED INFORMATION STORED ON THE UTACC SYSTEM * APPENDIX O * FREQUENCY MANAGEMENT AND DE-CONFLICTION * APPENDIX P * UTACC SYSTEM INTEGRATION WITH LEGACY AND NEWLY PROCURED SYSTEMS * APPENDIX Q * AUTONOMOUS SOFTWARE * APPENDIX R * UNENCRYPTED C2 AND DATA LINKS * APPENDIX S * CONTROLLED CRYPTOGRAPHIC ITEM EMPLOYMENT ONBOARD AN AUTONOMOUS SYSTEM * APPENDIX T * COST THREAT TO THE UTACC SYSTEM RESEARCH, DEVELOPMENT, AND TESTING * APPENDIX U * AIRSPACE INTEGRATION * APPENDIX V * SURFACE SPACE INTEGRATION OF UTACC * APPENDIX W * HUMAN MACHINE INTERACTION * APPENDIX X * RECONNAISSANCE TEAM EMPLOYMENT OF UTACC * APPENDIX Y * SURVIVABILITY OF THE SYSTEM FROM ENEMY WEAPONRY * APPENDIX Z * ENVIRONMENTAL THREATS * APPENDIX AA * TERRAIN * APPENDIX BB * SHIPBOARD OPERATIONS * APPENDIX CC * OPERATIONAL ENDURANCE * LIST OF REFERENCES * INITIAL DISTRIBUTION LIST

More books from Progressive Management

Cover of the book NASA's Space Shuttle Program: Astronaut Oral Histories (Set 2) - Duffy, Dunbar, Engle, Fabian, Fisher, Fullerton, Gregory, Hartsfield, Hart, Hauck, Hawley, Hoffman - Columbia, Challenger Accidents by Progressive Management
Cover of the book 2011 Essential Guide to Electromagnetic Pulse (EMP) Attack - Reports of the EMP Commission on the Threat and Critical National Infrastructure - The Danger from High-Altitude Nuclear Explosions by Progressive Management
Cover of the book U.S. Army Medical Correspondence Course: Prescription Interpretation - Script Form, Common Latin Terms and Abbreviations by Progressive Management
Cover of the book 21st Century Central Intelligence Agency (CIA) Intelligence Papers: Curing Analytic Pathologies - Pathways to Improved Intelligence Analysis by Progressive Management
Cover of the book Bread, Freedom, Social Justice: The Origins of Regime Fragility in Egypt and Syria and the Arab Spring's Implications for Future Operating Environment – Role of Radical Islamism, Social Mobilization by Progressive Management
Cover of the book Operation Urgent Fury: The Planning and Execution of Joint Operations in Grenada, 1983 - The Crisis, Planning and Preparation, Combat Operations, Press Controversy, Assessment by Progressive Management
Cover of the book 2015 Osama bin Laden's Bookshelf: Complete Declassified Documents and Letters by the Terrorist Leader on Wide Range of Topics, plus Letters from Abbottabad (Usama bin Ladin and al Qaeda) by Progressive Management
Cover of the book Winning Without Fighting: Military / NGO Interaction Development - Humanitarian Operations, Civil-Military Coordination, Case Studies Indonesia, Haiti, and West Africa, State Department Interaction by Progressive Management
Cover of the book Strategic Air Command (SAC) and the Alert Program: A Brief History - Nuclear Weapons Bombers and Tankers, Mid-air Refueling, B-52, Response to Soviet Cold War Threat, Command Post by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Organizational Development of the Joint Chiefs Of Staff, 1942-2013, Office of Chairman of the Joint Chiefs of Staff - JCS Origin to 2013 Reorganization by Progressive Management
Cover of the book Gender Integration of Women into U.S. Army Special Forces Operational Detachments Alpha (As 18-Series Military Occupational Specialty) - Results of Research Surveys and Historical Account Analysis by Progressive Management
Cover of the book Culture, Identity and Information Technology in the 21st Century: Implications for U.S. National Security, the Future of English in Language Usage, Demographic Shifts by Progressive Management
Cover of the book Comparative Study of KC-135 Operations in Vietnam, Desert Storm, and Allied Force: Historical Perspective on the Development of Air Refueling, Tanker Issues by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: First Aid Field Manual - FM 4-25.11, FM 21-11 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Additive Manufacturing: Preparing for the Reality of Science Fiction, Emerging Technologies and Homeland Security Public Policy, 3D Printers and Autonomous Vehicles, Unmanned Aerial Systems, Drones by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy