Unmanned Tactical Autonomous Control and Collaboration (UTACC) Threat and Vulnerability Assessment - Impersonation or Spoofing an Unmanned Ground Vehicle (UGV) or Unmanned Aerial Vehicle (UAV)

Nonfiction, History, Military, Aviation, United States
Cover of the book Unmanned Tactical Autonomous Control and Collaboration (UTACC) Threat and Vulnerability Assessment - Impersonation or Spoofing an Unmanned Ground Vehicle (UGV) or Unmanned Aerial Vehicle (UAV) by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310883934
Publisher: Progressive Management Publication: March 10, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310883934
Publisher: Progressive Management
Publication: March 10, 2016
Imprint: Smashwords Edition
Language: English

Professionally converted for accurate flowing-text e-book format reproduction, this report assesses threats to the Unmanned Tactical Autonomous Control and Collaboration (UTACC) system, which faces many diverse threats and is vulnerable on various fronts, but by applying security mitigation strategies this autonomous technology may be useful for the Marine Corps Warfighting Lab (MCWL).

CHAPTER I * INTRODUCTION * A. RESEARCH SPONSOR, OBJECTIVE AND RESULTS * B. BENEFITS TO THE MARINE CORPS WARFIGHTING LAB * C. RESEARCH METHODOLOGY OVERVIEW * D. RELATED WORK * E. THE NEED FOR A THREAT AND VULNERABILITY ASSESSMENT * F. ROAD MAP * CHAPTER II * LITERATURE REVIEW * A. INFORMATION ASSURANCE * 1. The Five Pillars of IA * a. Availability * b. Confidentiality * c. Integrity * d. Authentication * e. Non-repudiation * 2. Risk Management * a. Risk Management Framework Background... * b. RMF Steps * 3. Security Classification of National Security Systems * a. Classification Method * b. Security Controls * 4. DOD Information Assurance Certification and Accreditation Process (DIACAP) * B. THE CYBER SECURITY MATRIX * 1. People * 2. Technology * 3. Operations * 4. Threats * 5. Vulnerabilities * 6. Security Controls and Defense in Depth * CHAPTER III * METHODOLOGY OF ANALYSIS * A. TEMPLATE CREATION * B. BREAKDOWN OF THREAT TEMPLATE * 1. Threat Area * 2. Threat Selection Process * 3. Threat Summary * 4. Impact to the CIA Triad * 5. Vulnerability Analysis * 6. Assumptions * 7. Security Controls * CHAPTER IV * ANALYSIS * A. THREAT TYPE CLASSIFICATION * B. AIRSPACE INTEGRATION * 1. Threat Area /Threat * 2. Threat Summary * 3. Impact to the CIA Triad * 4. Vulnerability Analysis * 5. Assumptions * 6. Security Controls * CHAPTER V * CONCLUSIONS * A. RESEARCH QUESTION 1: WHAT THREATS EXIST THAT HAVE THE POTENTIAL TO AFFECT THE UTACC? * B. RESEARCH QUESTION 2: WHAT VULNERABILITIES ARE INHERENT IN THE UTACC CONCEPT? * C. RESEARCH QUESTION 3: WHAT CAN BE DONE TO MITIGATE THOSE THREATS AND VULNERABILITIES WITHIN UTACC? * D. FUTURE WORK * APPENDIX A * INSIDER THREAT * APPENDIX B * PHISHING * APPENDIX C * MAINTENANCE OF THE UTACC SYSTEM * APPENDIX D * ATTITUDE TOWARDS EMERGING TECHNOLOGIES * APPENDIX E * AUTONOMY AS AN ETHICAL CONCERN * APPENDIX F * SPYWARE * APPENDIX G * JAMMING OF COMMAND AND CONTROL AND DATA LINKS * APPENDIX H * DENIAL OF SERVICE ATTACK * APPENDIX I * EAVESDROPPING * APPENDIX J * AN ATTACK ON MOBILE DEVICES ON A WIRELESS NETWORK * APPENDIX K * A COMPUTER VIRUS ATTACK ON THE UTACC SYSTEM * APPENDIX L * IMPERSONATION OR SPOOFING AN UNMANNED GROUND VEHICLE (UGV) OR UNMANNED AERIAL VEHICLE (UAV) * APPENDIX M * SPOOFING AN INTERNET PROTOCOL (IP) OR MEDIA ACCESS CONTROL (MAC) ADDRESS OF A UTACC SYSTEM COMPONENT * APPENDIX N * UNPROTECTED INFORMATION STORED ON THE UTACC SYSTEM * APPENDIX O * FREQUENCY MANAGEMENT AND DE-CONFLICTION * APPENDIX P * UTACC SYSTEM INTEGRATION WITH LEGACY AND NEWLY PROCURED SYSTEMS * APPENDIX Q * AUTONOMOUS SOFTWARE * APPENDIX R * UNENCRYPTED C2 AND DATA LINKS * APPENDIX S * CONTROLLED CRYPTOGRAPHIC ITEM EMPLOYMENT ONBOARD AN AUTONOMOUS SYSTEM * APPENDIX T * COST THREAT TO THE UTACC SYSTEM RESEARCH, DEVELOPMENT, AND TESTING * APPENDIX U * AIRSPACE INTEGRATION * APPENDIX V * SURFACE SPACE INTEGRATION OF UTACC * APPENDIX W * HUMAN MACHINE INTERACTION * APPENDIX X * RECONNAISSANCE TEAM EMPLOYMENT OF UTACC * APPENDIX Y * SURVIVABILITY OF THE SYSTEM FROM ENEMY WEAPONRY * APPENDIX Z * ENVIRONMENTAL THREATS * APPENDIX AA * TERRAIN * APPENDIX BB * SHIPBOARD OPERATIONS * APPENDIX CC * OPERATIONAL ENDURANCE * LIST OF REFERENCES * INITIAL DISTRIBUTION LIST

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Professionally converted for accurate flowing-text e-book format reproduction, this report assesses threats to the Unmanned Tactical Autonomous Control and Collaboration (UTACC) system, which faces many diverse threats and is vulnerable on various fronts, but by applying security mitigation strategies this autonomous technology may be useful for the Marine Corps Warfighting Lab (MCWL).

CHAPTER I * INTRODUCTION * A. RESEARCH SPONSOR, OBJECTIVE AND RESULTS * B. BENEFITS TO THE MARINE CORPS WARFIGHTING LAB * C. RESEARCH METHODOLOGY OVERVIEW * D. RELATED WORK * E. THE NEED FOR A THREAT AND VULNERABILITY ASSESSMENT * F. ROAD MAP * CHAPTER II * LITERATURE REVIEW * A. INFORMATION ASSURANCE * 1. The Five Pillars of IA * a. Availability * b. Confidentiality * c. Integrity * d. Authentication * e. Non-repudiation * 2. Risk Management * a. Risk Management Framework Background... * b. RMF Steps * 3. Security Classification of National Security Systems * a. Classification Method * b. Security Controls * 4. DOD Information Assurance Certification and Accreditation Process (DIACAP) * B. THE CYBER SECURITY MATRIX * 1. People * 2. Technology * 3. Operations * 4. Threats * 5. Vulnerabilities * 6. Security Controls and Defense in Depth * CHAPTER III * METHODOLOGY OF ANALYSIS * A. TEMPLATE CREATION * B. BREAKDOWN OF THREAT TEMPLATE * 1. Threat Area * 2. Threat Selection Process * 3. Threat Summary * 4. Impact to the CIA Triad * 5. Vulnerability Analysis * 6. Assumptions * 7. Security Controls * CHAPTER IV * ANALYSIS * A. THREAT TYPE CLASSIFICATION * B. AIRSPACE INTEGRATION * 1. Threat Area /Threat * 2. Threat Summary * 3. Impact to the CIA Triad * 4. Vulnerability Analysis * 5. Assumptions * 6. Security Controls * CHAPTER V * CONCLUSIONS * A. RESEARCH QUESTION 1: WHAT THREATS EXIST THAT HAVE THE POTENTIAL TO AFFECT THE UTACC? * B. RESEARCH QUESTION 2: WHAT VULNERABILITIES ARE INHERENT IN THE UTACC CONCEPT? * C. RESEARCH QUESTION 3: WHAT CAN BE DONE TO MITIGATE THOSE THREATS AND VULNERABILITIES WITHIN UTACC? * D. FUTURE WORK * APPENDIX A * INSIDER THREAT * APPENDIX B * PHISHING * APPENDIX C * MAINTENANCE OF THE UTACC SYSTEM * APPENDIX D * ATTITUDE TOWARDS EMERGING TECHNOLOGIES * APPENDIX E * AUTONOMY AS AN ETHICAL CONCERN * APPENDIX F * SPYWARE * APPENDIX G * JAMMING OF COMMAND AND CONTROL AND DATA LINKS * APPENDIX H * DENIAL OF SERVICE ATTACK * APPENDIX I * EAVESDROPPING * APPENDIX J * AN ATTACK ON MOBILE DEVICES ON A WIRELESS NETWORK * APPENDIX K * A COMPUTER VIRUS ATTACK ON THE UTACC SYSTEM * APPENDIX L * IMPERSONATION OR SPOOFING AN UNMANNED GROUND VEHICLE (UGV) OR UNMANNED AERIAL VEHICLE (UAV) * APPENDIX M * SPOOFING AN INTERNET PROTOCOL (IP) OR MEDIA ACCESS CONTROL (MAC) ADDRESS OF A UTACC SYSTEM COMPONENT * APPENDIX N * UNPROTECTED INFORMATION STORED ON THE UTACC SYSTEM * APPENDIX O * FREQUENCY MANAGEMENT AND DE-CONFLICTION * APPENDIX P * UTACC SYSTEM INTEGRATION WITH LEGACY AND NEWLY PROCURED SYSTEMS * APPENDIX Q * AUTONOMOUS SOFTWARE * APPENDIX R * UNENCRYPTED C2 AND DATA LINKS * APPENDIX S * CONTROLLED CRYPTOGRAPHIC ITEM EMPLOYMENT ONBOARD AN AUTONOMOUS SYSTEM * APPENDIX T * COST THREAT TO THE UTACC SYSTEM RESEARCH, DEVELOPMENT, AND TESTING * APPENDIX U * AIRSPACE INTEGRATION * APPENDIX V * SURFACE SPACE INTEGRATION OF UTACC * APPENDIX W * HUMAN MACHINE INTERACTION * APPENDIX X * RECONNAISSANCE TEAM EMPLOYMENT OF UTACC * APPENDIX Y * SURVIVABILITY OF THE SYSTEM FROM ENEMY WEAPONRY * APPENDIX Z * ENVIRONMENTAL THREATS * APPENDIX AA * TERRAIN * APPENDIX BB * SHIPBOARD OPERATIONS * APPENDIX CC * OPERATIONAL ENDURANCE * LIST OF REFERENCES * INITIAL DISTRIBUTION LIST

More books from Progressive Management

Cover of the book The Shared Burden: United States-French Coalition Operations in the European Theater of World War II - Southern France to the Defeat of Germany, NORDWIND Offensive, Churchill, Eisenhower, de Gaulle by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Combat Net Radio Operations (FM 11-32) SINCGARS, Battlefield Radio (Value-Added Professional Format Series) by Progressive Management
Cover of the book NASA's Commercial Orbital Transportation Services: A New Era in Spaceflight - History of International Space Station (ISS) Cargo and Crew, SpaceX, Orbital Sciences, Bigelow by Progressive Management
Cover of the book Air Force Targeting Roadmap: Reinvigorating Targeting, Reachback and Distributed Operations, Systems, Tools, Architectures, Training, Force Management, Precision Munition Bombing Air Campaign by Progressive Management
Cover of the book Indonesia: Federal Research Study and Country Profile with Comprehensive Information, History, and Analysis - Algiers, History, Politics, Economy, Jakarta by Progressive Management
Cover of the book To See the Unseen: A History of Planetary Radar Astronomy - A Comprehensive History of Radar Observations of Venus, Mars, Comets, Asteroids, the Magellan Mission, Arecibo Observatory (NASA SP-4218) by Progressive Management
Cover of the book Harnessing the Genie: Science and Technology Forecasting for the Air Force - 1944-1986 - von Karman, Woods Hole, Doolittle, Hap Arnold, Stever, Schriever, Forecast Project by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Army Deployment and Redeployment Field Manual - FM 100-17, FMI 3-35 (Value-Added Professional Format Series) by Progressive Management
Cover of the book U.S. Army OPFOR Worldwide Equipment Guide, World Weapons Guide, Encyclopedia of Arms and Weapons: Vehicles, Recon, Infantry, Rifles, Rocket Launchers, Aircraft, Antitank Guns, Tanks, Assault Vehicles by Progressive Management
Cover of the book The Role of Federal Military Forces in Domestic Disorders 1789-1878: History of Controversial Events, Posse Comitatus, Mormon Conflict, Whiskey Rebellion, Racial Strife, KKK, Slave Law by Progressive Management
Cover of the book Space Shuttle NASA Mission Reports: 1994 Missions, STS-60, STS-62, STS-59, STS-65, STS-64, STS-68, STS-66 by Progressive Management
Cover of the book FEMA Document Series: Federal Guidelines for Dam Safety: Emergency Action Planning for Dam Owners by Progressive Management
Cover of the book FEMA National Disaster Recovery Framework (NDRF) - Strengthening Disaster Recovery for the Nation - Core Recovery Principles, Guidance for Planning, Community Focus by Progressive Management
Cover of the book 21st Century Complete Guide to Natural Gas Vehicles - Alternative Fuel Vehicles (AFV), Compressed Natural Gas (CNG), Liquefied Natural Gas (LNG), Technology, Safety, Refueling Issues by Progressive Management
Cover of the book Ukraine Reports: Conflicting Identities in Crimea, Fragmented Ukraine, NATO Membership Candidacy, Russian Energy Policies, Ukraine at a Crossroads - Implications for America and Europe by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy