04105oam 2200613zu 450 991022011350332120240425173616.00-8330-9338-X(CKB)3710000000595142(SSID)ssj0001672066(PQKBManifestationID)16470060(PQKBTitleCode)TC0001672066(PQKBWorkID)15006526(PQKB)10104959(EXLCZ)99371000000059514220160829d2015 uy engtxtrdacontentcrdamediacrrdacarrierImproving the cybersecurity of U.S. Air Force military systems throughout their life cycles[Place of publication not identified] :Rand Corporation,2015.Research reports Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles.Bibliographic Level Mode of Issuance: Monograph0-8330-8900-5 1. Cybersecurity Management: Introduction -- What Should Cybersecurity in Acquisition Achieve? -- Managing Cybersecurity Risk -- Challenges for Managing Cybersecurity -- Principles for Managing Cybersecurity -- Principles for Managing Cybersecurity -- Summary -- 2. Cybersecurity Laws and Policies -- Introduction -- Legislation and Federal Cybersecurity Policy -- Department of Defense Cybersecurity Policy -- Cybersecurity and Air Force Life-Cycle Management -- Conclusion -- 3. Findings and Recommendations: Findings -- Discussion -- Recommendations -- Closing Remarks."There is increasing concern that Air Force systems containing information technology are vulnerable to intelligence exploitation and offensive attack through cyberspace. In this report, the authors analyze how the Air Force acquisition/life-cycle management community can improve cybersecurity throughout the life cycle of its military systems. The focus is primarily on the subset of procured systems for which the Air Force has some control over design, architectures, protocols, and interfaces (e.g., weapon systems, platform information technology), as opposed to commercial, off-the-shelf information technology and business systems. The main themes in the authors' findings are that cybersecurity laws and policies were created to manage commercial, off-the-shelf information technology and business systems and do not adequately address the challenges of securing military systems. Nor do they adequately capture the impact to operational missions. Cybersecurity is mainly added on to systems, not designed in. The authors recommend 12 steps that the Air Force can take to improve the cybersecurity of its military systems throughout their life cycles"--Provided by publisher.Improving the cybersecurity of United States Air Force military systems throughout their lifecyclesComputer networksSecurity measures21st centuryUnited StatesCyberinfrastructureEvaluationSecurity measures21st centuryUnited StatesComputer securityUnited StatesRisk assessmentPreventionUnited StatesCyberterrorismUnited StatesNational securityTelecommunicationsHILCCElectrical & Computer EngineeringHILCCEngineering & Applied SciencesHILCCComputer networksSecurity measuresCyberinfrastructureEvaluationSecurity measuresComputer securityRisk assessmentPreventionCyberterrorismNational securityTelecommunicationsElectrical & Computer EngineeringEngineering & Applied SciencesSnyder Don1962-1243892Project Air Force (U.S.)Rand CorporationPQKBBOOK9910220113503321Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles4153735UNINA