Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles

"There is increasing concern that Air Force systems containing information technology are vulnerable to intelligence exploitation and offensive attack through cyberspace. In this report, the authors analyze how the Air Force acquisition/life-cycle management community can improve cybersecurity...

Full description

Bibliographic Details
Main Author: Snyder, Don
Format: eBook
Language:English
Published: Santa Monica, Calif. RAND [2015]©2015, 2015
Series:Research reports
Subjects:
Online Access:
Collection: JSTOR Open Access Books - Collection details see MPG.ReNa
LEADER 02488nam a2200349 u 4500
001 EB001843414
003 EBX01000000000000001007403
005 00000000000000.0
007 tu|||||||||||||||||||||
008 180730 r ||| eng
020 |z 9780833089007 
020 |a 9780833089007 
020 |z 0833089005 
020 |a 0833089005 
050 4 |a TK5105.59 
100 1 |a Snyder, Don 
245 0 0 |a Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles  |h Elektronische Ressource  |c by Don Snyder, James D. Powers, Elizabeth Bodine-Baron, Bernard Fox, Lauren Kendrick, Michael Powell 
260 |a Santa Monica, Calif.  |b RAND  |c [2015]©2015, 2015 
300 |a xi, 62 pages  |b black and white illustrations, black and white and color charts 
505 0 |a Includes bibliographical references (pages 57-62) 
651 4 |a United States / fast 
653 |a HISTORY / Military / Aviation 
653 |a Risk assessment 
041 0 7 |a eng  |2 ISO 639-2 
989 |b ZDB-39-JOA  |a JSTOR Open Access Books 
490 0 |a Research reports 
500 |a "October 27, 2015"--Table of contents page 
776 |z 9780833093387 
776 |z 083309338X 
856 4 0 |u https://www.jstor.org/stable/10.7249/j.ctt19rmd15  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a "There is increasing concern that Air Force systems containing information technology are vulnerable to intelligence exploitation and offensive attack through cyberspace. In this report, the authors analyze how the Air Force acquisition/life-cycle management community can improve cybersecurity throughout the life cycle of its military systems. The focus is primarily on the subset of procured systems for which the Air Force has some control over design, architectures, protocols, and interfaces (e.g., weapon systems, platform information technology), as opposed to commercial, off-the-shelf information technology and business systems. The main themes in the authors' findings are that cybersecurity laws and policies were created to manage commercial, off-the-shelf information technology and business systems and do not adequately address the challenges of securing military systems. Nor do they adequately capture the impact to operational missions. Cybersecurity is mainly added on to systems, not designed in. The authors recommend 12 steps that the Air Force can take to improve the cybersecurity of its military systems throughout their life cycles"--Publisher's description