CYBERSECURITY

& Information Systems Digest

21 SEPTEMBER 21

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

Mobile Application Single Sign-on for First Responders: Final Guide Published

On-demand access to public safety data is critical to ensuring that public safety and first responder (PSFR) personnel can deliver the proper care and support during an emergency. This necessitates heavy reliance on mobile platforms while in the field, which may be used to access sensitive information. However, complex authentication requirements can hinder the process…

Read More...

Featured Notable Technical Inquiry

What tools are being utilized for signal monitoring in Internet of Things systems?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking information on signal monitoring for Internet of Things (IoT) systems within the U.S. Department of Defense. CSIAC is looking to understand the current state of knowledge regarding signal monitoring techniques and tools being used in IoT networks. If you have expertise or points of contact related to this inquiry, please contact Joseph Friar (joseph.m.friar.ctr@mail.mil), the…

Learn More
digital airplane superimposed over conference meeting

Supporting International Partners in Aviation Cybersecurity

As companies worldwide switch from analog to automated digital industrial control systems, malicious cyber actors are finding new opportunities for extortion and mayhem. It’s happening in a range of industrial settings, from power stations to manufacturing plants, and it’s a growing problem in the aviation industry. In January, aircraft leasing giant AerCap Holdings confirmed it had been the victim of a ransomware attack by a…

Learn More
data center at NREL

Reducing Data Center Peak Cooling Demand and Energy Costs With Underground Thermal Energy Storage

As the demand for U.S. data centers grows with the expansion of artificial intelligence, Cloud services, and big data analytics, so do the energy loads these centers require. By some estimates, data center energy demands are projected to consume as much as 9% of U.S. annual electricity generation by the year 2030. As much as 40% of data centers’ total annual energy consumption is related…

Learn More
abstract ai head with colorful circuit lines

Training Synthetic AI Agents to Work (Well) With Humans

Synthetic entities in military simulations often fall short of expectations. They rely on rule-based or reactive computational models, which are minimally intelligent and incapable of adapting based on experience. Even at that current level, they are costly to create and take time to develop. To create more effective synthetic entities, we need adaptive models that demonstrate human-like behavior—entities that can communicate, perceive their environment, reason,…

Learn More
Spanning eight rows and occupying the space of two professional basketball courts, Aurora is one of the largest supercomputer installations to date. (Image by Argonne National Laboratory.)

Argonne Releases Aurora Exascale Supercomputer to Researchers, Enabling Accelerated Science

The U.S. Department of Energy’s (DOE’s) Argonne National Laboratory has released its Aurora exascale supercomputer to researchers across the world, heralding a new era of computing-driven discoveries. With powerful capabilities for simulation, artificial intelligence (AI), and data analysis, Aurora will drive breakthroughs in a range of fields, including airplane design, cosmology, drug discovery, and nuclear energy research.

Learn More
CISA Secure by Design logo

Secure by Design Alert: Eliminating Buffer Overflow Vulnerabilities

Buffer overflow vulnerabilities are a prevalent type of memory safety software design defect that regularly leads to system compromise. The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) recognize that memory safety vulnerabilities encompass a wide range of issues—many of which require significant time and effort to properly resolve. While all types of memory safety vulnerabilities can be prevented by using…

Learn More
An artist’s representation of a hole etched into alternating layers of silicon oxide and silicon nitride using plasma, which is used to make 3D NAND flash memory. Researchers want to refine how they make these holes so each one is deep, narrow and vertical, with smooth sides. (Image credit: Kyle Palmer / PPPL Communications Department)

Improving the Way Flash Memory Is Made

To store ever more data in electronic devices of the same size, the manufacturing processes for these devices need to be studied in greater detail. By investigating new approaches to making digital memory at the atomic scale, researchers engaged in a public-private partnership are aiming to address the endless demand for denser data storage. One such effort has focused on developing the ideal manufacturing process…

Learn More
program-red-c-logo

Watch Out for the Bus!

In an imperfect world, the prospect of having a computer, or any bus-based system, that can defend itself from cyber-attacks and recover from one is not just a pipe dream. DARPA experts say this capability can become a reality by addressing missing forensic data on the bus – a communication system that transfers data between components – and leveraging advancements in Zero Trust. Many critical…

Learn More
blue circuit lines

Joint Publications Focus on Mitigation Strategies for Edge Devices

FORT MEADE, MD – The National Security Agency (NSA) has joined the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the Canadian Centre for Cyber Security (CCCS), and others to release three cybersecurity information sheets (CSIs) that highlight critically important mitigation strategies for securing edge device systems, including firewalls, routers, and virtual private network (VPN) gateways. Collectively, these reports – “Mitigation Strategies for Edge…

Learn More

Computer-Assisted Military Wargaming Tools

This technical inquiry report provides information on the Standard War Game Integration Facilitation Tool (SWIFT) and other wargaming-related software and tools.  While researching SWIFT, Cybersecurity and Information Systems Information Analysis Center (CSIAC) personnel gathered information on wargaming and found realistic combat scenarios could be created to train military personnel on their strategic, operational, and tactical skills.  A background on wargaming is included in this report,…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Network Survivability Assessment Methodology

Hosted by: Philip Payne

September 22, 2021 12:00 pm
DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Network Survivability Assessment Methodology

This presentation describes a network survivability assessment methodology for Cyber-Electromagnetic Activities teams to identify cyber threats early in the acquisition cycle. The U.S. Department of Defense Acquisition Process begins with a Material Solution Analysis (MSA) and culminates with operations and support.  An Analysis of Alternatives (AoA) takes place after all potential solutions are examined to…

Read More...

UPCOMING EVENTS

2025 Department of the Air Force Modeling & Simulation (M&S) Summit

The goal of the M&S Summit is to gather U.S. Air Force and Space Force M&S experts to learn about new M&S initiatives and techniques, network across military services and with industry experts, and hear…

DoD Cyber Workforce Summit

The DoD CIO will host the Inaugural Cyber Workforce Summit with support from AFCEA International and the National Defense University. To succeed in today’s environment, the U.S. Department of Defense must remain aggressive in its…

Smart Cities Connect Spring Conference & Expo

Smart cities have evolved from a futuristic vision into a tangible reality, creating a fundamental impact for people and the planet. From pilot projects that showcase innovative technologies to enduring infrastructure investments, smart city solutions…

18th Annual Homeland Security Week

Join the Homeland Security community March 25-26 in the Washington, DC area for IDGA’s 18th iteration of the Homeland Security Week Summit, where leading experts and key decision-makers from DHS, DOJ, local law enforcement, and…

Voice From the Community

Jess Irwin

Technical Staff, Multimission Cyber Security, Raytheon Intelligence & Space

As a technical staff member subject matter expert, Jess provides nearly 50 years of expertise in systems, software, and whole life engineering. As a systems architect, he has supported several of the largest weapons systems platforms, including the F-35 and B-2. His back-ground in mathematics and physics provides insight into subtle issues related to communications and sensor technologies. He has developed operat-ing systems, compilers, and large-scale systems emulations and is an experi-enced 3-D game developer. He has a foundational patent in distributed trust architecture and collaborated on Trusted Computing Architecture and Intellectual Property Protection techniques. He is an expert in the tools, techniques, and practices of model-based systems engineering using SysML.

Want to be featured in our Digest?

Submit your "Voice From the Community"