Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
internet-of-things-4129218_1280

The Internet of Things and the “Next War”

The Internet of Things The Internet of Things (IOT) is based upon the integration of commercial TCP-IP networks with ubiquitous,…

Cybersecurity Equation Image CSIAC_Journal_V7N2_WEB

Addressing Both Sides of the Cybersecurity Equation

Today’s cyber defenders find themselves at a disadvantage despite technological advances in cyber defense. Among the chief causes of this…

Resilient ICS Image CSIAC_Journal_V7N2_WEB

Resilient Industrial Control Systems (ICS) & Cyber Physical Systems (CPS)

Cyber-physical system attacks have crept from the theory to reality; 2017-2018 demonstrated the severity of the threat to Critical Infrastructure,…

ICS Converged Image CSIAC_Journal_V7N2_WEB

Practical Industrial Control System (ICS) Cybersecurity: IT and OT Have Converged – Discover and Defend Your Assets

More than half of respondents to a recent Industrial (Internet of Things) IoT security survey use connected devices in Industrial…

Industrial Control Systems Image CSIAC_Journal_V7N2_WEB

Applying Cyber Threat Intelligence to Industrial Control Systems

THE PURPOSE OF CYBER THREAT INTELLIGENCE (CTI) IS TO HELP PROTECT NETWORK INFRASTRUCTURES. Threat intelligence platforms (TIPs) have been created…

Endpoint Log Visibility Image CSIAC_Journal_V7N2_WEB

Gaining Endpoint Log Visibility in ICS Environments

Security event logging is a base IT security practice and is referenced in Industrial Control Security (ICS) standards and best…

hacker-2300772_1280

Data Manipulation: Attacks and Mitigation

Confidentiality, Integrity, and Availability In terms of cybersecurity, the Confidentiality, Integrity, and Availability, also known as the CIA Triad, is…

AI Space Race Image CSIAC_Journal_V7N1_WEB

Artificial Intelligence: The Next “Nuclear Arms Race” – “Space Race to the Edge”

Figuring out where and how Artificial Intelligence (AI) and its various sub-types (Machine Learning, Deep Learning, etc.) fit into our…

Quantum Computing Image CSIAC_Journal_V7N1_WEB

Staying Ahead of the Race – Quantum Computing and Cybersecurity

Cryptography is an integral part of a cybersecurity professional’s toolkit. It is used for Confidentiality, Integrity, Non-repudiation and more. Cryptosystems…

Army Inconnected battlefield

Features and Operation of an Autonomous Agent for Cyber Defense

An ever-increasing number of battlefield devices that are capable of collecting, processing, storing, and communicating information are rapidly becoming interconnected….

Cloud Computing Image CSIAC_Journal_V7N1_WEB

Cloud Security Monitoring With AI-ML Infused Technologies

This article discusses how to apply security log monitoring capabilities for Amazon Web Services (AWS) Infrastructure as a Service (IaaS)…

footprint as a chip

Reducing Your Digital Footprint

Every activity a person carries out on the Internet leaves behind a trail of data commonly known as a digital…