Unmanned Tactical Autonomous Control and Collaboration (UTACC) Threat and Vulnerability Assessment - Impersonation or Spoofing an Unmanned Ground Vehicle (UGV) or Unmanned Aerial Vehicle (UAV)

Nonfiction, History, Military, Aviation, United States
Cover of the book Unmanned Tactical Autonomous Control and Collaboration (UTACC) Threat and Vulnerability Assessment - Impersonation or Spoofing an Unmanned Ground Vehicle (UGV) or Unmanned Aerial Vehicle (UAV) by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310883934
Publisher: Progressive Management Publication: March 10, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310883934
Publisher: Progressive Management
Publication: March 10, 2016
Imprint: Smashwords Edition
Language: English

Professionally converted for accurate flowing-text e-book format reproduction, this report assesses threats to the Unmanned Tactical Autonomous Control and Collaboration (UTACC) system, which faces many diverse threats and is vulnerable on various fronts, but by applying security mitigation strategies this autonomous technology may be useful for the Marine Corps Warfighting Lab (MCWL).

CHAPTER I * INTRODUCTION * A. RESEARCH SPONSOR, OBJECTIVE AND RESULTS * B. BENEFITS TO THE MARINE CORPS WARFIGHTING LAB * C. RESEARCH METHODOLOGY OVERVIEW * D. RELATED WORK * E. THE NEED FOR A THREAT AND VULNERABILITY ASSESSMENT * F. ROAD MAP * CHAPTER II * LITERATURE REVIEW * A. INFORMATION ASSURANCE * 1. The Five Pillars of IA * a. Availability * b. Confidentiality * c. Integrity * d. Authentication * e. Non-repudiation * 2. Risk Management * a. Risk Management Framework Background... * b. RMF Steps * 3. Security Classification of National Security Systems * a. Classification Method * b. Security Controls * 4. DOD Information Assurance Certification and Accreditation Process (DIACAP) * B. THE CYBER SECURITY MATRIX * 1. People * 2. Technology * 3. Operations * 4. Threats * 5. Vulnerabilities * 6. Security Controls and Defense in Depth * CHAPTER III * METHODOLOGY OF ANALYSIS * A. TEMPLATE CREATION * B. BREAKDOWN OF THREAT TEMPLATE * 1. Threat Area * 2. Threat Selection Process * 3. Threat Summary * 4. Impact to the CIA Triad * 5. Vulnerability Analysis * 6. Assumptions * 7. Security Controls * CHAPTER IV * ANALYSIS * A. THREAT TYPE CLASSIFICATION * B. AIRSPACE INTEGRATION * 1. Threat Area /Threat * 2. Threat Summary * 3. Impact to the CIA Triad * 4. Vulnerability Analysis * 5. Assumptions * 6. Security Controls * CHAPTER V * CONCLUSIONS * A. RESEARCH QUESTION 1: WHAT THREATS EXIST THAT HAVE THE POTENTIAL TO AFFECT THE UTACC? * B. RESEARCH QUESTION 2: WHAT VULNERABILITIES ARE INHERENT IN THE UTACC CONCEPT? * C. RESEARCH QUESTION 3: WHAT CAN BE DONE TO MITIGATE THOSE THREATS AND VULNERABILITIES WITHIN UTACC? * D. FUTURE WORK * APPENDIX A * INSIDER THREAT * APPENDIX B * PHISHING * APPENDIX C * MAINTENANCE OF THE UTACC SYSTEM * APPENDIX D * ATTITUDE TOWARDS EMERGING TECHNOLOGIES * APPENDIX E * AUTONOMY AS AN ETHICAL CONCERN * APPENDIX F * SPYWARE * APPENDIX G * JAMMING OF COMMAND AND CONTROL AND DATA LINKS * APPENDIX H * DENIAL OF SERVICE ATTACK * APPENDIX I * EAVESDROPPING * APPENDIX J * AN ATTACK ON MOBILE DEVICES ON A WIRELESS NETWORK * APPENDIX K * A COMPUTER VIRUS ATTACK ON THE UTACC SYSTEM * APPENDIX L * IMPERSONATION OR SPOOFING AN UNMANNED GROUND VEHICLE (UGV) OR UNMANNED AERIAL VEHICLE (UAV) * APPENDIX M * SPOOFING AN INTERNET PROTOCOL (IP) OR MEDIA ACCESS CONTROL (MAC) ADDRESS OF A UTACC SYSTEM COMPONENT * APPENDIX N * UNPROTECTED INFORMATION STORED ON THE UTACC SYSTEM * APPENDIX O * FREQUENCY MANAGEMENT AND DE-CONFLICTION * APPENDIX P * UTACC SYSTEM INTEGRATION WITH LEGACY AND NEWLY PROCURED SYSTEMS * APPENDIX Q * AUTONOMOUS SOFTWARE * APPENDIX R * UNENCRYPTED C2 AND DATA LINKS * APPENDIX S * CONTROLLED CRYPTOGRAPHIC ITEM EMPLOYMENT ONBOARD AN AUTONOMOUS SYSTEM * APPENDIX T * COST THREAT TO THE UTACC SYSTEM RESEARCH, DEVELOPMENT, AND TESTING * APPENDIX U * AIRSPACE INTEGRATION * APPENDIX V * SURFACE SPACE INTEGRATION OF UTACC * APPENDIX W * HUMAN MACHINE INTERACTION * APPENDIX X * RECONNAISSANCE TEAM EMPLOYMENT OF UTACC * APPENDIX Y * SURVIVABILITY OF THE SYSTEM FROM ENEMY WEAPONRY * APPENDIX Z * ENVIRONMENTAL THREATS * APPENDIX AA * TERRAIN * APPENDIX BB * SHIPBOARD OPERATIONS * APPENDIX CC * OPERATIONAL ENDURANCE * LIST OF REFERENCES * INITIAL DISTRIBUTION LIST

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Professionally converted for accurate flowing-text e-book format reproduction, this report assesses threats to the Unmanned Tactical Autonomous Control and Collaboration (UTACC) system, which faces many diverse threats and is vulnerable on various fronts, but by applying security mitigation strategies this autonomous technology may be useful for the Marine Corps Warfighting Lab (MCWL).

CHAPTER I * INTRODUCTION * A. RESEARCH SPONSOR, OBJECTIVE AND RESULTS * B. BENEFITS TO THE MARINE CORPS WARFIGHTING LAB * C. RESEARCH METHODOLOGY OVERVIEW * D. RELATED WORK * E. THE NEED FOR A THREAT AND VULNERABILITY ASSESSMENT * F. ROAD MAP * CHAPTER II * LITERATURE REVIEW * A. INFORMATION ASSURANCE * 1. The Five Pillars of IA * a. Availability * b. Confidentiality * c. Integrity * d. Authentication * e. Non-repudiation * 2. Risk Management * a. Risk Management Framework Background... * b. RMF Steps * 3. Security Classification of National Security Systems * a. Classification Method * b. Security Controls * 4. DOD Information Assurance Certification and Accreditation Process (DIACAP) * B. THE CYBER SECURITY MATRIX * 1. People * 2. Technology * 3. Operations * 4. Threats * 5. Vulnerabilities * 6. Security Controls and Defense in Depth * CHAPTER III * METHODOLOGY OF ANALYSIS * A. TEMPLATE CREATION * B. BREAKDOWN OF THREAT TEMPLATE * 1. Threat Area * 2. Threat Selection Process * 3. Threat Summary * 4. Impact to the CIA Triad * 5. Vulnerability Analysis * 6. Assumptions * 7. Security Controls * CHAPTER IV * ANALYSIS * A. THREAT TYPE CLASSIFICATION * B. AIRSPACE INTEGRATION * 1. Threat Area /Threat * 2. Threat Summary * 3. Impact to the CIA Triad * 4. Vulnerability Analysis * 5. Assumptions * 6. Security Controls * CHAPTER V * CONCLUSIONS * A. RESEARCH QUESTION 1: WHAT THREATS EXIST THAT HAVE THE POTENTIAL TO AFFECT THE UTACC? * B. RESEARCH QUESTION 2: WHAT VULNERABILITIES ARE INHERENT IN THE UTACC CONCEPT? * C. RESEARCH QUESTION 3: WHAT CAN BE DONE TO MITIGATE THOSE THREATS AND VULNERABILITIES WITHIN UTACC? * D. FUTURE WORK * APPENDIX A * INSIDER THREAT * APPENDIX B * PHISHING * APPENDIX C * MAINTENANCE OF THE UTACC SYSTEM * APPENDIX D * ATTITUDE TOWARDS EMERGING TECHNOLOGIES * APPENDIX E * AUTONOMY AS AN ETHICAL CONCERN * APPENDIX F * SPYWARE * APPENDIX G * JAMMING OF COMMAND AND CONTROL AND DATA LINKS * APPENDIX H * DENIAL OF SERVICE ATTACK * APPENDIX I * EAVESDROPPING * APPENDIX J * AN ATTACK ON MOBILE DEVICES ON A WIRELESS NETWORK * APPENDIX K * A COMPUTER VIRUS ATTACK ON THE UTACC SYSTEM * APPENDIX L * IMPERSONATION OR SPOOFING AN UNMANNED GROUND VEHICLE (UGV) OR UNMANNED AERIAL VEHICLE (UAV) * APPENDIX M * SPOOFING AN INTERNET PROTOCOL (IP) OR MEDIA ACCESS CONTROL (MAC) ADDRESS OF A UTACC SYSTEM COMPONENT * APPENDIX N * UNPROTECTED INFORMATION STORED ON THE UTACC SYSTEM * APPENDIX O * FREQUENCY MANAGEMENT AND DE-CONFLICTION * APPENDIX P * UTACC SYSTEM INTEGRATION WITH LEGACY AND NEWLY PROCURED SYSTEMS * APPENDIX Q * AUTONOMOUS SOFTWARE * APPENDIX R * UNENCRYPTED C2 AND DATA LINKS * APPENDIX S * CONTROLLED CRYPTOGRAPHIC ITEM EMPLOYMENT ONBOARD AN AUTONOMOUS SYSTEM * APPENDIX T * COST THREAT TO THE UTACC SYSTEM RESEARCH, DEVELOPMENT, AND TESTING * APPENDIX U * AIRSPACE INTEGRATION * APPENDIX V * SURFACE SPACE INTEGRATION OF UTACC * APPENDIX W * HUMAN MACHINE INTERACTION * APPENDIX X * RECONNAISSANCE TEAM EMPLOYMENT OF UTACC * APPENDIX Y * SURVIVABILITY OF THE SYSTEM FROM ENEMY WEAPONRY * APPENDIX Z * ENVIRONMENTAL THREATS * APPENDIX AA * TERRAIN * APPENDIX BB * SHIPBOARD OPERATIONS * APPENDIX CC * OPERATIONAL ENDURANCE * LIST OF REFERENCES * INITIAL DISTRIBUTION LIST

More books from Progressive Management

Cover of the book 21st Century U.S. Military Manuals: Divisional Air and Missile Defense Sentinel Platoon Operations Field Manual FM 3-01.48 (Professional Format Series) by Progressive Management
Cover of the book Suspended Disbelief: Role of Department of Defense in Interagency Foreign Humanitarian Assistance and Disaster Response – Case Studies of Haiti Earthquake, Super Typhoon Haiyan Operation Damayan by Progressive Management
Cover of the book History of Marine Observation Squadron Six: U.S. Marine Corps History, Aviation, Nicaragua, World War II, China, Korea, Helicopters, Pendleton, Vietnam Combat, Okinawa, Decommissioning by Progressive Management
Cover of the book The Collapse of Iraq and Syria: The End of the Colonial Construct in the Greater Levant - ISIS, Islamic State, ISIL, Assad, Alawite, Salafi, Nasser, Saddam Hussein, Hashemite, Kurds, Sunni, Shia by Progressive Management
Cover of the book Skylab: A Chronology (NASA SP-4011) - The Story of the Planning, Development, and Implementation of America's First Manned Space Station by Progressive Management
Cover of the book Countermobilization: Unconventional Social Warfare - Combating Violent Extremism in Iraq and Al-qaida, Mexico and Zapatistas, Israel and Hamas PLO, Counter-narrative and Framing Process by Progressive Management
Cover of the book Extending the Thin Blue Line: Constabulary Police Development in Phase Zero (Pre-Crisis Environment) Operations - U.S. Police in Germany 1945, Australian Police in East Timor and Solomon Islands by Progressive Management
Cover of the book 20th Century Spy in the Sky Satellites: Secrets of the National Reconnaissance Office (NRO) Volume 3 - SAMOS Electro-optical Readout Satellite and the Lunar Orbiter Mapping Camera by Progressive Management
Cover of the book 21st Century VA Independent Study Course: Hearing Impairment, Ototoxic and Noise-induced Hearing Loss, Audiology, Auditory Problems, Balance Disorders, Ear Pathologies, Tinnitus, Deafness by Progressive Management
Cover of the book 21st Century VA Independent Study Course: Health Effects from Chemical, Biological, and Radiological Weapons, Nuclear and Dirty Bombs, Radiation, WMD (Veterans Health Issues Series) by Progressive Management
Cover of the book 21st Century FEMA Study Course: Decision Making and Problem Solving (IS-241.a) - Ethics, Brainstorming, Surveys, Problem-Solving Models, Groupthink, Discussion Groups, Case Studies by Progressive Management
Cover of the book Skylab Extravehicular Activity Development Report: How NASA Concepts for Skylab Spacewalks Evolved During the Development of the Space Station Program by Progressive Management
Cover of the book Russia's Revival: Ambitions, Limitations, and Opportunities for the United States - Vladimir Putin's Record, Corruption Complex, Military, Near Abroad, China, Iran, Implications for United States by Progressive Management
Cover of the book 2011 U.S. Army Posture Statement: Summary of Army Roles, Missions, Accomplishments, Plans, and Programs - Basic Reference on the State of the Army by Progressive Management
Cover of the book China's Forbearance Has Limits: Chinese Threat and Retaliation Signaling and Its Implications for a Sino-American Military Confrontation - Maritime Claims, Senkaku and Spratly Islands, Taiwan by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy