Example Technical Inquiries (TIs)

Example TIs are samples of the wide range of technical inquiries submitted by CSIAC members under our 4 free hours of information research support.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Solutions for Labeling Independent Zeek Logs for Attacks and Exploits

Has anyone ever labeled individual records in Zeek logs for attacks/exploits? If so, how did they do it?

Critical Infrastructure Linkage and Dependency Modeling for Homeland Defense

What existing tools and techniques could be applied to modeling the linkages and dependencies between critical US infrastructure components?

CUI Security Controls: Physical Access Control

Relating to requirement 3.10 in NIST 800-171r1, is it sufficient to have an audit log of physical access with entry events but not exit events?

Ready to submit a technical inquiry?

Receive free information research on technical topics