Example Technical Inquiries (TIs)

Example TIs are samples of the wide range of technical inquiries submitted by CSIAC members under our 4 free hours of information research support.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Risk Management Framework Requirements

Can you provide a checklist of requirements that DoD agencies use to set up an Authority to Connect (ATC), Authority to Test (ATT), or Authority to Proceed (ATP)?

The State of Today’s Cyber Ranges

What is the state of cyber technical ranges, and what current software tools are used at each range?

IPv6 Overview for Senior Leaders

Can you provide an overview on what IPv6 really is, its implications, and where tactical/strategic issues might arise?

Chiplet-Based Architectures

What are the latest advances and applications of microelectronics architectures and applications that focus on chiplet-based architectures?

Solutions for Labeling Independent Zeek Logs for Attacks and Exploits

Has anyone ever labeled individual records in Zeek logs for attacks/exploits? If so, how did they do it?

Critical Infrastructure Linkage and Dependency Modeling for Homeland Defense

What existing tools and techniques could be applied to modeling the linkages and dependencies between critical US infrastructure components?

Ready to submit a technical inquiry?

Receive free information research on technical topics