CYBERSECURITY

& Information Systems Digest

11 OCTOBER 2022

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

crypto museum

NSA Announces Date of the National Cryptologic Museum Grand Opening

FORT MEADE, Md. — The National Security Agency (NSA) is pleased to announce the Grand Opening of the National Cryptologic Museum. As NSA’s principal gateway to the public, the newly renovated museum will provide a unique opportunity to engage with cryptologic history in fresh and innovative ways – transporting visitors on a journey from the…

Read More...

Featured Notable Technical Inquiry

shutterstock_1794130912-bd159be21988a970

Security-Conscious Password Behavior From the End-User’s Perspective

Even though technical solutions for security problems are widespread, there are no adequate security measures against precarious user behavior.  Even if hashing and encrypting are used correctly in masking the passwords, attackers can bypass these strong points by going for the weakest link.  Most likely, this will happen through sharing a password, using an already leaked password, or creating a feasibly guessable password (Olmstead and…

Learn More

UPCOMING WEBINAR

CSIAC Primer - CMMC

What is Cybersecurity Maturity Model Certification (CMMC)?

The CMMC framework builds upon existing regulations like National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171 but introduces a certification requirement to validate compliance. CMMC applies to any organization in the DoD supply chain and helps protect against cyberthreats by enforcing stricter cybersecurity controls. CMMC consists of different levels that define the…

Read More...
CSIAC Primer - IoT

What is the Internet of Things (IoT)?

Interconnected devices in an IoT collect, share, and process data without direct human intervention [1]. These smart systems use sensors, artificial-intelligence (AI)-driven analytics, and secure communication channels to automate decision-making and improve operational efficiency. While IoT is widely used in industries like healthcare, transportation, and smart cities, its role in military operations and national security…

Read More...
CSIAC Primer - Behavioral Biometrics

What are behavioral biometrics?

Behavioral biometrics are considered by many to be more appealing than standard security methods due to continuous authentication. Continuous authentication makes it unnecessary for users to constantly enter the same passwords or present physical means of validation, further improving efficiency and security. Data quality is a key part of ensuring accuracy and reliability in behavioral…

Read More...
graphic of several laptops surrounding a single computer server with lines connecting the laptops to the server with text "distributed denial-of-server attack" and "CSIAC Primer"

What is a distributed denial-of-service (DDoS) attack?

Types of DDoS Attacks Volumetric Attacks:  Send a high volume of traffic to a specific target to consume its bandwidth and impede the victim’s internet access [2]. Application Attacks:  Intentionally exhaust server resources by sending an overwhelming amount of hypertext transfer protocol (HTTP) requests to a server during a short amount of time, which can…

Read More...
AI cyberspace internet defense soldier

Agentic Artificial Intelligence: Strategic Adoption in the U.S. Department of Defense

Agentic artificial intelligence (AI) is emerging as a transformative capability for the U.S. Department of Defense (DoD). Agentic AI systems can execute complex tasks independently. Unlike traditional AI, these agents can proactively analyze data, make decisions, and act with minimal human intervention. Within the DoD, the concept of agentic warfare reflects a growing shift from…

Read More...

Has the Defense Modeling and Simulation (M&S) catalog been updated since 2018, and is this an effort that the Defense M&S Coordination Office is still updating/overseeing?

Read More...

How can someone access Defense Technical Information Center manuscripts in batches at a speed usable for training embedders for use with large language models?

Read More...
Long-term goals for the Communications-Electronics Command (CECOM) Software Engineering Center (SEC) include incorporating Zero Trust further into Army and DOD systems and developing workforce training programs around the organization’s methodology.

Open Standards That Support Zero Trust Implementation

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) was tasked with researching and providing information on open standards applicable to zero trust implementation. CSIAC identified various open standards being used today that support and uphold the implementation of the zero trust architecture within the U.S. Department of Defense.

Read More...
avoid risk reduce transfer

Cyber Risk Management: Program Development for Risk-Based Decision-Making

This discussion provides attendees with an understanding of how to construct a comprehensive risk management program. This includes developing a governance structure, a risk appetite statement, and related policies and procedures.  The publication “Advancing Risk Management Capability Using the OCTAVE FORTE Process” helps gain an understanding of the framework and underpinnings of this discussion.  This…

Read More...
Artist's interpretation of new optical processor for an edge device, developed by NIT researchers, that performs machine learning computations at the speed of light, classifying wireless signals in a matter of nanoseconds. (Image credit: Sampson Wilcox, Research Laboratory of Electronics)

Photonic Processor Could Streamline 6G Wireless Signal Processing

As more connected devices demand an increasing amount of bandwidth for tasks like teleworking and cloud computing, it will become extremely challenging to manage the finite amount of wireless spectrum available for all users to share. Engineers are employing artificial intelligence to dynamically manage the available wireless spectrum, with an eye toward reducing latency and…

Read More...

UPCOMING EVENTS

Emerging Technologies for Defense Conference & Exhibition

Explore the innovations that will help shape national security for the next century at NDIA’s flagship Emerging Technologies Conference! Hear directly from technology leaders in government, defense industry, the commercial sector, and academia on cutting-edge…

National Cyber Summit

National Cyber Summit is an innovative cybersecurity-technology event, offering educational, collaborative, and workforce development opportunities for industry visionaries and rising leaders. NCS provides diverse focus areas, speakers, and accessibility. Held in Huntsville, Alabama, the Summit…

ADEC 2025

ADEC enables leaders of the national security analysis community to strengthen existing partnerships, seed new ones, and share strategies and best practices across sectors. Attendees represent the U.S. military, government, intelligence community, industry stakeholders, university-affiliated…

CyberBay 2025

CyberBay 2025 is the inaugural event connecting Florida’s technology, academic, military, and government sectors in a shared mission to continue the Tampa Bay Region’s evolution as the crossroads where cybersecurity, artificial intelligence (AI), and national…

ISC2 Security Congress 2025

The 13th annual ISC2 Security Congress will be hosted live at the Gaylord Opryland Nashville, along with a hybrid virtual option. The keynote session will feature Phil Venables, the Strategic Security Advisor at Google. There…

Voice From the Community

David, Michael 3_cropped select
Michael David

Ph.D.

Dr. David has served on the faculty of the National Intelligence University’s (NIU’s) School of Science and Technology Intelligence since February 2014. He teaches courses on cyber intelligence and information operations. He has a Ph.D. from Kyushu University, an M.S. from the University of Southern California, and a B.S. in industrial engineering from Lehigh University. Dr. David’s research emphasis is on cyber-physical systems, with a focus on hardware and software supply chain security.

Want to be featured in our Digest?

Submit your "Voice From the Community"