LEADER 04105oam 2200613zu 450 001 9910220113503321 005 20240425173616.0 010 $a0-8330-9338-X 035 $a(CKB)3710000000595142 035 $a(SSID)ssj0001672066 035 $a(PQKBManifestationID)16470060 035 $a(PQKBTitleCode)TC0001672066 035 $a(PQKBWorkID)15006526 035 $a(PQKB)10104959 035 $a(EXLCZ)993710000000595142 100 $a20160829d2015 uy 101 0 $aeng 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aImproving the cybersecurity of U.S. Air Force military systems throughout their life cycles 210 31$a[Place of publication not identified] :$cRand Corporation,$d2015. 225 0 $aResearch reports Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles. 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a0-8330-8900-5 327 $a1. Cybersecurity Management: Introduction -- What Should Cybersecurity in Acquisition Achieve? -- Managing Cybersecurity Risk -- Challenges for Managing Cybersecurity -- Principles for Managing Cybersecurity -- Principles for Managing Cybersecurity -- Summary -- 2. Cybersecurity Laws and Policies -- Introduction -- Legislation and Federal Cybersecurity Policy -- Department of Defense Cybersecurity Policy -- Cybersecurity and Air Force Life-Cycle Management -- Conclusion -- 3. Findings and Recommendations: Findings -- Discussion -- Recommendations -- Closing Remarks. 330 $a"There is increasing concern that Air Force systems containing information technology are vulnerable to intelligence exploitation and offensive attack through cyberspace. In this report, the authors analyze how the Air Force acquisition/life-cycle management community can improve cybersecurity throughout the life cycle of its military systems. The focus is primarily on the subset of procured systems for which the Air Force has some control over design, architectures, protocols, and interfaces (e.g., weapon systems, platform information technology), as opposed to commercial, off-the-shelf information technology and business systems. The main themes in the authors' findings are that cybersecurity laws and policies were created to manage commercial, off-the-shelf information technology and business systems and do not adequately address the challenges of securing military systems. Nor do they adequately capture the impact to operational missions. Cybersecurity is mainly added on to systems, not designed in. The authors recommend 12 steps that the Air Force can take to improve the cybersecurity of its military systems throughout their life cycles"--Provided by publisher. 517 1 $aImproving the cybersecurity of United States Air Force military systems throughout their lifecycles 606 $aComputer networks$xSecurity measures$y21st century$zUnited States 606 $aCyberinfrastructure$xEvaluation$xSecurity measures$y21st century$zUnited States 606 $aComputer security$zUnited States 606 $aRisk assessment$xPrevention$zUnited States 606 $aCyberterrorism$zUnited States 606 $aNational security 606 $aTelecommunications$2HILCC 606 $aElectrical & Computer Engineering$2HILCC 606 $aEngineering & Applied Sciences$2HILCC 615 0$aComputer networks$xSecurity measures 615 0$aCyberinfrastructure$xEvaluation$xSecurity measures 615 0$aComputer security 615 0$aRisk assessment$xPrevention 615 0$aCyberterrorism 615 0$aNational security 615 7$aTelecommunications 615 7$aElectrical & Computer Engineering 615 7$aEngineering & Applied Sciences 700 $aSnyder$b Don$f1962-$01243892 712 02$aProject Air Force (U.S.) 712 02$aRand Corporation 801 0$bPQKB 906 $aBOOK 912 $a9910220113503321 996 $aImproving the cybersecurity of U.S. Air Force military systems throughout their life cycles$94153735 997 $aUNINA