Sample records for cyber friendly fire

  1. Cyber Friendly Fire: Research Challenges for Security Informatics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

    This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly fire (FF). We define cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintention-ally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, maintaining situation awareness (SA) is paramount to avoiding cyber FF incidents. Cyber SA concerns knowledge of a system’s topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components thatmore » comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and offensive countermeasures that may be applied to thwart network attacks. Mitigation strategies to combat cyber FF— including both training concepts and suggestions for decision aids and visualization approaches—are discussed.« less

  2. Towards a Research Agenda for Cyber Friendly Fire

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Clements, Samuel L.; Carroll, Thomas E.

    Historical assessments of combat fratricide reveal principal contributing factors in the effects of stress, degradation of skills due to continuous operations or sleep deprivation, poor situation awareness, and lack of training and discipline in offensive/defense response selection. While these problems are typically addressed in R&D focusing on traditional ground-based combat, there is also an emerging need for improving situation awareness and decision making on defensive/offensive response options in the cyber defense arena, where a mistaken response to an actual or perceived cyber attack could lead to destruction or compromise of friendly cyber assets. The purpose of this report is tomore » examine cognitive factors that may affect cyber situation awareness and describe possible research needs to reduce the likelihood and effects of "friendly cyber fire" on cyber defenses, information infrastructures, and data. The approach is to examine concepts and methods that have been described in research applied to the more traditional problem of mitigating the occurrence of combat identification and fratricide. Application domains of interest include cyber security defense against external or internal (insider) threats.« less

  3. Security Informatics Research Challenges for Mitigating Cyber Friendly Fire

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carroll, Thomas E.; Greitzer, Frank L.; Roberts, Adam D.

    This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly re (FF). We dene cyber FF as intentional o*ensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission e*ectiveness of friendly or neutral forces. We describe examples of cyber FF and discuss how it ts within a general conceptual framework for cyber security failures. Because it involves human failure, cyber FF may be considered to belong to a sub-class of cyber security failures characterized as unintentional insider threats. Cyber FF is closelymore » related to combat friendly re in that maintaining situation awareness (SA) is paramount to avoiding unintended consequences. Cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and o*ensive countermeasures that may be applied to thwart network attacks. We describe a test bed designed to support empirical research on factors a*ecting cyber FF. Finally, we discuss mitigation strategies to combat cyber FF, including both training concepts and suggestions for decision aids and visualization approaches.« less

  4. Cyber Friendly Fire

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

    Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamentalmore » need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general public. The network is essentially divided into a production component that hosts the web and network services, and a user component that hosts thirty employee workstations and other end devices. The organization's network is separated from the Internet by a Cisco ASA network security device that both firewalls and detects intrusions. Business sensitive information is stored in various servers. This includes data comprising thousands of internal documents, such as finance and technical designs, email messages for the organization's employees including the CEO, CFO, and CIO, the organization's source code, and Personally Identifiable client data. Release of any of this information to unauthorized parties would have a significant, detrimental impact on the organization's reputation, which would harm earnings. The valuable information stored in these servers pose obvious points of interest for an adversary. We constructed several scenarios around this environment to support studies in cyber SA and cyber FF that may be run in the test range. We describe mitigation strategies to combat cyber FF including both training concepts and suggestions for decision aids and visualization approaches. Finally, we discuss possible future research directions.« less

  5. Cyber Warfare as an Operational Fire

    DTIC Science & Technology

    2010-04-03

    This paper explores cyber warfare as an option for creating operational fires effects. Initially, cyberspace is defined and explained from the...fires are defined and the advantages of their use are explained. From there, discussion focuses on how cyber warfare fulfills the purposes of...operational fires. Finally, the paper draws conclusions about the viability of cyber warfare as an operational fire and makes recommendations about how to prioritize the activities of the newly approved U.S. Cyber Command.

  6. Chinese National Strategy of Total War

    DTIC Science & Technology

    2008-06-01

    Cyber Warfare Michael J. Good, BA Major, USA June 2008 APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS...who allowed me into the Cyber Warfare , my fellow students in the Cyber Warfare IDE program who have been great friends and mentors, and my fellow...Hackers and Other Cyber Criminals .............................................................................41 PLA Cyber Warfare

  7. School bullying among adolescents in the United States: physical, verbal, relational, and cyber.

    PubMed

    Wang, Jing; Iannotti, Ronald J; Nansel, Tonja R

    2009-10-01

    Four forms of school bullying behaviors among US adolescents and their association with sociodemographic characteristics, parental support, and friends were examined. Data were obtained from the Health Behavior in School-Aged Children (HBSC) 2005 Survey, a nationally representative sample of grades 6-10 (N = 7,182). The revised Olweus Bully/Victim Questionnaire was used to measure physical, verbal, and relational forms of bullying. Two items were added using the same format to measure cyber bullying. For each form, four categories were created: bully, victim, bully-victim, and not involved. Multinomial logistic regressions were applied, with sociodemographic variables, parental support, and number of friends as predictors. Prevalence rates of having bullied others or having been bullied at school for at least once in the last 2 months were 20.8% physically, 53.6% verbally, 51.4% socially, or 13.6% electronically. Boys were more involved in physical or verbal bullying, whereas girls were more involved in relational bullying. Boys were more likely to be cyber bullies, whereas girls were more likely to be cyber victims. African-American adolescents were involved in more bullying (physical, verbal, or cyber) but less victimization (verbal or relational). Higher parental support was associated with less involvement across all forms and classifications of bullying. Having more friends was associated with more bullying and less victimization for physical, verbal, and relational forms but was not associated with cyber bullying. Parental support may protect adolescents from all four forms of bullying. Friends associate differentially with traditional and cyber bullying. Results indicate that cyber bullying is a distinct nature from that of traditional bullying.

  8. School Bullying Among US Adolescents: Physical, Verbal, Relational and Cyber

    PubMed Central

    Wang, Jing; Iannotti, Ronald J.; Nansel, Tonja R.

    2009-01-01

    Purpose Four forms of school bullying behaviors among US adolescents and their association with socio-demographic characteristics, parental support and friends were examined. Methods Data were obtained from the Health Behavior in School-Aged Children (HBSC) 2005 Survey, a nationally-representative sample of grades 6 to 10 (N = 7182). The Olweus Bully/Victim Questionnaire was used to measure physical, verbal and relational forms of bullying. Two items were added using the same format to measure cyber bullying. For each form, four categories were created: bully, victim, bully-victim, and not involved. Multinomial logistic regressions were applied, with socio-demographic variables, parental support and number of friends as predictors. Results Prevalence rates of having bullied others or having been bullied at school for at least once in the last 2 months were 20.8% physically, 53.6% verbally, 51.4% socially or 13.6% electronically. Boys were more involved in physical or verbal bullying, while girls were more involved in relational bullying. Boys were more likely to be cyber bullies, while girls were more likely to be cyber victims. African-American adolescents were involved in more bullying (physical, verbal or cyber) but less victimization (verbal or relational). Higher parental support was associated with less involvement across all forms and classifications of bullying. Having more friends was associated with more bullying and less victimization for physical, verbal and relational forms, but was not associated with cyber bullying. Conclusions Parental support may protect adolescents from all four forms of bullying. Friends associate differentially with traditional and cyber bullying. Results indicate that cyber bullying has a distinct nature from traditional bullying. PMID:19766941

  9. International note: awareness and context of cyber-harassment among secondary school students in Oyo state, Nigeria.

    PubMed

    Olumide, Adesola O; Adams, Patricia; Amodu, Olukemi K

    2015-02-01

    We determined the awareness and context of cyber-harassment among secondary school students (653 survey respondents and 18 in-depth interviewees) in Oyo state, Nigeria. Respondents' mean age was 14.2 ± 2.2 years and 53.9% were aware of cyber-harassment occurring in their school or among their friends. Cyber-harassment was often perpetrated via phone calls (62.5%), text messaging (36.9%), chat rooms (28.7%), through pictures or video clips sent via mobile phones (11.9%), emails (6.8%) or websites (5.9%). Cyber-harassment behaviours mentioned were the use of abusive words (25.4%), saying mean things or making fun of the victim (13.9%), solicitations for relationships (7.9%) or sex (6.8%) and spreading rumours about the victim (6.8%). In-depth interviewees recounted experiences of cyber-harassment suffered by their friends. Many were relationship-related, sexual solicitations and threats and corroborated quantitative findings. Respondents are aware of cyber-harassment occurring among students in the study area. Comprehensive interventions to address the problem need to be instituted. Copyright © 2014 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  10. Securing Cyber Acquisitions

    DTIC Science & Technology

    2015-02-01

    networking provides 24-hour access to data and information between friends and strangers alike. Technology also has played a significant role in the world’s...economic environment, many or- ganizations look at cyber budgets as areas to cut back. And many top-level managers and members of the acquisition

  11. Life satisfaction and school performance of children exposed to classic and cyber peer bullying.

    PubMed

    Bilić, Vesna; Flander, Gordana Buljan; Rafajac, Branko

    2014-03-01

    This paper analyses the relationship between the exposure of school children to various forms of peer bullying (classic/cyber) and their life satisfaction in the domain of school, family, friends and school performance. The sample included 562 children from rural and urban areas of Croatia who were attending the seventh and the eighth grade of primary school. Results show that children were more often exposed to classic forms of peer bullying, especially verbal, and then physical bullying. On the other hand, cyber bullying most often comprises harassment in forums, blogs, chats or social networks, then on the web, by e-mail and mobile phone. Almost half of the examinees knew the identity of the bully, while a minority believes that bullies are the same ones who also physically abuse them at school. We found that children exposed to all forms of both classic and cyber bullying, unlike their peers who do not have such experience, show less satisfaction with friends, while those exposed to physical and cyber bullying show dissatisfaction with their family, too. However no statistically significant difference was found in their satisfaction with school. Children exposed to physical bullying showed poorer school performance, poorer achievement in Croatian and math, while children exposed to verbal and cyber bullying and children who were not exposed to such forms of bullying showed no differences in their school achievement.

  12. Cyber Victimization and Depression among Adolescents with Intellectual Disabilities and Developmental Disorders: The Moderation of Perceived Social Support

    ERIC Educational Resources Information Center

    Wright, Michelle F.

    2017-01-01

    The aim of this study was to examine the mitigating effect of perceived social support from parents, teachers, and friends on the association between cyber victimization and depression, accessed one year later. Adolescents (n = 131; 13-15 years old; 73% male) with intellectual and developmental disabilities completed questionnaires on their…

  13. If It's about Me, Why Do It without Me? Genuine Student Engagement in School Cyberbullying Education

    ERIC Educational Resources Information Center

    Cross, Donna; Lester, Leanne; Barnes, Amy; Cardoso, Patricia; Hadwen, Kate

    2015-01-01

    This study reports on a three-year group randomized controlled trial, the Cyber Friendly Schools Project (CFSP), aimed to reduce cyberbullying among grade 8 students during 2010-2012. In each year, 14-15 year old student "cyber" leaders acted as catalysts to develop and implement whole-school activities to reduce cyberbullying-related…

  14. Subjective health complaints in adolescent victims of cyber harassment: moderation through support from parents/friends - a Swedish population-based study.

    PubMed

    Fridh, Maria; Lindström, Martin; Rosvall, Maria

    2015-09-23

    Victimization in cyberspace has emerged as a new public health issue among the young. The main purpose of this study was to analyze associations between cyber victimization defined as cyber harassment (CH) (a somewhat broader concept than cyberbullying) and subjective health complaints (SHC), to study whether these associations were modified by parental/friend support (measured as communication), and to explore the influence of traditional bullying victimization (TBV) on the association between CH and SHC. The study population consisted of 8544 students in 9th grade (around 15 years old) who participated in the 2012 Scania public health survey of children and adolescents. The survey was a cross-sectional total-population study conducted in school, with a response rate of 83 %. Main and interaction (stress-buffering) effects of social support on the relationship between CH and SCH were investigated by hierarchical multiple linear regression analyses, adjusted for potential confounders, including TBV. The past-year prevalence of CH (once or several times) was 14 % among boys and 20 % among girls. Having been cyber harassed once or several times during the past year was associated with higher levels of SHC, controlling for age, parental occupation, parental origin, daily smoking, intense alcohol consumption, and disability. Among both boys and girls, the associations were stronger for CH occurring several times than for CH occurring only once. Main effects of parental/friend support were seen for both boys and girls, while stress-buffering effects were indicated for boys only. Additional analysis further adjusting for TBV did not change the associations substantially, indicating that CH has an effect of its own on SHC. Intervention programs aimed at improving the quality of peer and family relationships among children and adolescents might reduce the incidence of both cyber harassment and traditional bullying and lower the prevalence of psychosomatic complaints.

  15. Function and activity classification in network traffic data: existing methods, their weaknesses, and a path forward

    NASA Astrophysics Data System (ADS)

    Levchuk, Georgiy

    2016-05-01

    The cyber spaces are increasingly becoming the battlefields between friendly and adversary forces, with normal users caught in the middle. Accordingly, planners of enterprise defensive policies and offensive cyber missions alike have an essential goal to minimize the impact of their own actions and adversaries' attacks on normal operations of the commercial and government networks. To do this, the cyber analysis need accurate "cyber battle maps", where the functions, roles, and activities of individual and groups of devices and users are accurately identified. Most of the research in cyber exploitation has focused on the identification of attacks, attackers, and their devices. Many tools exist for device profiling, malware identification, user attribution, and attack analysis. However, most of the tools are intrusive, sensitive to data obfuscation, or provide anomaly flagging and not able to correctly classify the semantics and causes of network activities. In this paper, we review existing solutions that can identify functional and social roles of entities in cyberspace, discuss their weaknesses, and propose an approach for developing functional and social layers of cyber battle maps.

  16. Cyber bullying behaviors among middle and high school students.

    PubMed

    Mishna, Faye; Cook, Charlene; Gadalla, Tahany; Daciuk, Joanne; Solomon, Steven

    2010-07-01

    Little research has been conducted that comprehensively examines cyber bullying with a large and diverse sample. The present study examines the prevalence, impact, and differential experience of cyber bullying among a large and diverse sample of middle and high school students (N = 2,186) from a large urban center. The survey examined technology use, cyber bullying behaviors, and the psychosocial impact of bullying and being bullied. About half (49.5%) of students indicated they had been bullied online and 33.7% indicated they had bullied others online. Most bullying was perpetrated by and to friends and participants generally did not tell anyone about the bullying. Participants reported feeling angry, sad, and depressed after being bullied online. Participants bullied others online because it made them feel as though they were funny, popular, and powerful, although many indicated feeling guilty afterward. Greater attention is required to understand and reduce cyber bullying within children's social worlds and with the support of educators and parents.

  17. Amicicide: The Problem of Friendly Fire in Modern War

    DTIC Science & Technology

    1982-12-01

    episodes of the Korean War was the stubborn, defense of the British 29th Brigade along the Imjin River north of Seoul in April 1951.67 Faced by a...antiaircraft fire over Paestum beach in Italy. Amicicide: The Problem of Friendly Fire in Modern War by Lieutenant Colonel Charles R. Shrader, U.S...Data Shrader, Charles R. Amicieide: the problem of friendly fire in modern war . (Research survey/Combat Studies Institute, U.S. Army Command and

  18. Longitudinal impact of the Cyber Friendly Schools program on adolescents' cyberbullying behavior.

    PubMed

    Cross, Donna; Shaw, Thérèse; Hadwen, Kate; Cardoso, Patricia; Slee, Phillip; Roberts, Clare; Thomas, Laura; Barnes, Amy

    2016-01-01

    Cyberbullying is a major public health problem associated with serious mental, social, and academic consequences for young people. To date, few programs addressing cyberbullying have been developed and empirically tested. The Cyber Friendly Schools (CFS) group-randomized controlled trial measured the longitudinal impact of a whole-school online cyberbullying prevention and intervention program, developed in partnership with young people. Non-government secondary schools in Perth, Western Australia, (N = 35; 3,000+ students) were randomized to an intervention (n = 19) or usual practice control group (n = 16 schools). Students completed online questionnaires in 2010, 2011, and at 1-year follow-up in 2012, measuring their cyberbullying experiences during the previous school term. The intervention group received the program in Grades 8 and 9 (aged 13-14 years). Program effects were tested using two-part growth models. The program was associated with significantly greater declines in the odds of involvement in cyber-victimization and perpetration from pre- to the first post-test, but no other differences were evident between the study conditions. However, teachers implemented only one third of the program content. More work is needed to build teacher capacity and self-efficacy to effectively implement cyberbullying programs. Whole-school cyberbullying interventions implemented in conjunction with other bullying prevention programs may reduce cyber-victimization more than traditional school-based bullying prevention programs alone. Aggr. Behav. 42:166-180, 2016. © 2015 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  19. Predictors of Traditional and Cyber-Bullying Victimization: A Longitudinal Study of Australian Secondary School Students.

    PubMed

    Hemphill, Sheryl A; Tollit, Michelle; Kotevski, Aneta; Heerde, Jessica A

    2015-09-01

    The purpose of the present article is to compare the individual, peer, family, and school risk and protective factors for both traditional and cyber-bullying victimization. This article draws on data from 673 students from Victoria, Australia, to examine Grade 7 (aged 12-13 years) predictors of traditional and cyber-bullying victimization in Grade 9 (aged 14-15 years). Participants completed a modified version of the Communities That Care youth survey. There were few similarities and important differences in the predictors of traditional and cyber-bullying victimization. For Grade 9 cyber-bullying victimization, in the fully adjusted model, having been a victim of traditional bullying in Grade 7 and emotional control in Grade 7 were predictors. For Grade 9 traditional bullying victimization, predictors were Grade 7 traditional bullying victimization, association with antisocial peers, and family conflict, with family attachment and emotional control marginally statistically significant. The use of evidence-based bullying prevention programs is supported to reduce experiences of both traditional and cyber-bullying victimization, as is the implementation of programs to assist students to regulate their emotions effectively. In addition, traditional bullying victimization may be reduced by addressing association with antisocial friends, family conflict, and bonding to families. © The Author(s) 2014.

  20. Modeling Cyber Conflicts Using an Extended Petri Net Formalism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zakrzewska, Anita N; Ferragut, Erik M

    2011-01-01

    When threatened by automated attacks, critical systems that require human-controlled responses have difficulty making optimal responses and adapting protections in real- time and may therefore be overwhelmed. Consequently, experts have called for the development of automatic real-time reaction capabilities. However, a technical gap exists in the modeling and analysis of cyber conflicts to automatically understand the repercussions of responses. There is a need for modeling cyber assets that accounts for concurrent behavior, incomplete information, and payoff functions. Furthermore, we address this need by extending the Petri net formalism to allow real-time cyber conflicts to be modeled in a way thatmore » is expressive and concise. This formalism includes transitions controlled by players as well as firing rates attached to transitions. This allows us to model both player actions and factors that are beyond the control of players in real-time. We show that our formalism is able to represent situational aware- ness, concurrent actions, incomplete information and objective functions. These factors make it well-suited to modeling cyber conflicts in a way that allows for useful analysis. MITRE has compiled the Common Attack Pattern Enumera- tion and Classification (CAPEC), an extensive list of cyber attacks at various levels of abstraction. CAPEC includes factors such as attack prerequisites, possible countermeasures, and attack goals. These elements are vital to understanding cyber attacks and to generating the corresponding real-time responses. We demonstrate that the formalism can be used to extract precise models of cyber attacks from CAPEC. Several case studies show that our Petri net formalism is more expressive than other models, such as attack graphs, for modeling cyber conflicts and that it is amenable to exploring cyber strategies.« less

  1. CyberHunt 6: Think Green.

    ERIC Educational Resources Information Center

    Kloza, Brad

    2000-01-01

    Presents an Earth Day reproducible that involves online activities. Students are taken on a tour of earth-friendly Web sites, answering questions relating to such vital issues as recycling, land conservation, and the long-term survival of all living things. The sites offer children many opportunities for independent learning in the forms of…

  2. Can biological motion research provide insight on how to reduce friendly fire incidents?

    PubMed

    Steel, Kylie A; Baxter, David; Dogramaci, Sera; Cobley, Stephen; Ellem, Eathan

    2016-10-01

    The ability to accurately detect, perceive, and recognize biological motion can be associated with a fundamental drive for survival, and it is a significant interest for perception researchers. This field examines various perceptual features of motion and has been assessed and applied in several real-world contexts (e.g., biometric, sport). Unexplored applications still exist however, including the military issue of friendly fire. There are many causes and processes leading to friendly fire and specific challenges that are associated with visual information extraction during engagement, such as brief glimpses, low acuity, camouflage, and uniform deception. Furthermore, visual information must often be processed under highly stressful (potentially threatening), time-constrained conditions that present a significant problem for soldiers. Biological motion research and anecdotal evidence from experienced combatants suggests that intentions, emotions, identities of human motion can be identified and discriminated, even when visual display is degraded or limited. Furthermore, research suggests that perceptual discriminatory capability of movement under visually constrained conditions is trainable. Therefore, given the limited military research linked to biological motion and friendly fire, an opportunity for cross-disciplinary investigations exists. The focus of this paper is twofold: first, to provide evidence for the possible link between biological motion factors and friendly fire, and second, to propose conceptual and methodological considerations and recommendations for perceptual-cognitive training within current military programs.

  3. TopoLens: Building a cyberGIS community data service for enhancing the usability of high-resolution National Topographic datasets

    USGS Publications Warehouse

    Hu, Hao; Hong, Xingchen; Terstriep, Jeff; Liu, Yan; Finn, Michael P.; Rush, Johnathan; Wendel, Jeffrey; Wang, Shaowen

    2016-01-01

    Geospatial data, often embedded with geographic references, are important to many application and science domains, and represent a major type of big data. The increased volume and diversity of geospatial data have caused serious usability issues for researchers in various scientific domains, which call for innovative cyberGIS solutions. To address these issues, this paper describes a cyberGIS community data service framework to facilitate geospatial big data access, processing, and sharing based on a hybrid supercomputer architecture. Through the collaboration between the CyberGIS Center at the University of Illinois at Urbana-Champaign (UIUC) and the U.S. Geological Survey (USGS), a community data service for accessing, customizing, and sharing digital elevation model (DEM) and its derived datasets from the 10-meter national elevation dataset, namely TopoLens, is created to demonstrate the workflow integration of geospatial big data sources, computation, analysis needed for customizing the original dataset for end user needs, and a friendly online user environment. TopoLens provides online access to precomputed and on-demand computed high-resolution elevation data by exploiting the ROGER supercomputer. The usability of this prototype service has been acknowledged in community evaluation.

  4. Social media, cyber-aggression and student mental health on a university campus.

    PubMed

    Mishna, Faye; Regehr, Cheryl; Lacombe-Duncan, Ashley; Daciuk, Joanne; Fearing, Gwendolyn; Van Wert, Melissa

    2018-06-01

    Information and communication technologies (ICTs) offer immense benefits for university students including enhancing engagement and connections with others and promoting self-directed and interactive learning. Perceived anonymity and the absence of social cues, however, may contribute to risk of interpersonal aggression. While extensive research examines bullying in child and adolescent educational settings, this study addresses a gap regarding post-secondary environments. An internet-based survey was provided to 5004 university students to examine the nature, extent and consequences of cyber-aggression. The survey received a response from 1350 students, a response rate of 28.5%. To enable further exploration, nine focus groups and eight individual interviews were conducted. This exploratory study found one quarter of respondents had a private video or photo shared without their permission and 28% were sent angry, vulgar, threatening or intimating messages. Perpetrators were most likely to be a friend (50%), another student (20%) or an intimate partner (18%). Focus group data revealed risks of ICTs and the need for resources and support to address students' wellbeing in the context of cyber-aggression. Cyber-aggression is experienced by a significant minority of university students, impacting their sense of wellbeing and mental health.

  5. Friendly Fire: The Price of War

    DTIC Science & Technology

    1993-04-08

    USMC; Captain M. J. Perro , USA; Q V 4v Captain S. J. Wood, USMC 14 Command and Control Systems Course Communication Officer’s School 2085 Morrell Avenue...USMC Captain M. J. Perro , USA Captain S. J. Wood, USMC April 8, 1993 _ 4-1 • •• 93 11 1 t6• S... .. ..... . . . Il II0- . . . V, FRIENDLY FIRE: THE

  6. Cyber-Attack Methods, Why They Work on Us, and What to Do

    NASA Technical Reports Server (NTRS)

    Byrne, DJ

    2015-01-01

    Basic cyber-attack methods are well documented, and even automated with user-friendly GUIs (Graphical User Interfaces). Entire suites of attack tools are legal, conveniently packaged, and freely downloadable to anyone; more polished versions are sold with vendor support. Our team ran some of these against a selected set of projects within our organization to understand what the attacks do so that we can design and validate defenses against them. Some existing defenses were effective against the attacks, some less so. On average, every machine had twelve easily identifiable vulnerabilities, two of them "critical". Roughly 5% of passwords in use were easily crack-able. We identified a clear set of recommendations for each project, and some common patterns that emerged among them all.

  7. Social Media - DoD’s Greatest Information Sharing Tool or Weakest Security Link?

    DTIC Science & Technology

    2010-04-15

    porn . ―This makes us our own worst threat‖, writes one DoD network security specialist. ―There are a variety of reasons for this and most are tied to...great „toy‟ to talk to your friends and play video games. DHS Secretary Napolitano discussed the need to hire 1,000 cyber security experts over the

  8. Research Papers from The Command and Control Systems Course, 1993

    DTIC Science & Technology

    1993-04-08

    Muhlenberg USMC Friendly Fire: The Price of Capt C. H. Gats USMC 4-1 War Capt D. K. Lawley USMC CPT M. J. Perro USA Capt S. J. Wood USMC A Success in Joint...Quantico, Virginia 0 Captain C. H. Gats, USMC Captain D. K. Lawley, USMC Captain M. J. Perro , USA Captain S. J. Wood, USMC April 8, 1993 0 4-1 FRIENDLY FIRE

  9. When Sharing Is a Bad Idea: The Effects of Online Social Network Engagement and Sharing Passwords with Friends on Cyberbullying Involvement.

    PubMed

    Meter, Diana J; Bauman, Sheri

    2015-08-01

    Every day, children and adolescents communicate online via social networking sites (SNSs). They also report sharing passwords with peers and friends, a potentially risky behavior in regard to cyber safety. This longitudinal study tested the hypotheses that social network engagement in multiple settings would predict more cyberbullying involvement over time, and that youth who reported sharing passwords would also experience an increase in cyberbullying involvement. Data were collected at two time points one year apart from 1,272 third through eighth grade students. In line with the first study hypothesis, participating in more online SNSs was associated with increased cyberbullying involvement over time, as well as sharing passwords over time. Cyberbullying involvement at T1 predicted decreases in sharing passwords over time, suggesting that youth become aware of the dangers of sharing passwords as a result of their experience. Sharing passwords at T1 was unrelated to cyberbullying involvement at T2. Although it seems that youth may be learning from their previous mistakes, due to the widespread use of social media and normality of sharing passwords among young people, it is important to continue to educate youth about cyber safety and risky online behavior.

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Li, Y; Liu, B; Liang, B

    Purpose: Current CyberKnife treatment planning system (TPS) provided two dose calculation algorithms: Ray-tracing and Monte Carlo. Ray-tracing algorithm is fast, but less accurate, and also can’t handle irregular fields since a multi-leaf collimator system was recently introduced to CyberKnife M6 system. Monte Carlo method has well-known accuracy, but the current version still takes a long time to finish dose calculations. The purpose of this paper is to develop a GPU-based fast C/S dose engine for CyberKnife system to achieve both accuracy and efficiency. Methods: The TERMA distribution from a poly-energetic source was calculated based on beam’s eye view coordinate system,more » which is GPU friendly and has linear complexity. The dose distribution was then computed by inversely collecting the energy depositions from all TERMA points along 192 collapsed-cone directions. EGSnrc user code was used to pre-calculate energy deposition kernels (EDKs) for a series of mono-energy photons The energy spectrum was reconstructed based on measured tissue maximum ratio (TMR) curve, the TERMA averaged cumulative kernels was then calculated. Beam hardening parameters and intensity profiles were optimized based on measurement data from CyberKnife system. Results: The difference between measured and calculated TMR are less than 1% for all collimators except in the build-up regions. The calculated profiles also showed good agreements with the measured doses within 1% except in the penumbra regions. The developed C/S dose engine was also used to evaluate four clinical CyberKnife treatment plans, the results showed a better dose calculation accuracy than Ray-tracing algorithm compared with Monte Carlo method for heterogeneous cases. For the dose calculation time, it takes about several seconds for one beam depends on collimator size and dose calculation grids. Conclusion: A GPU-based C/S dose engine has been developed for CyberKnife system, which was proven to be efficient and accurate for clinical purpose, and can be easily implemented in TPS.« less

  11. Comparison of the learnability and retention between Blissymbols and CyberGlyphs.

    PubMed

    Alant, Erna; Life, Henriette; Harty, Michal

    2005-01-01

    There are a variety of graphic symbol sets/systems (GSSs) currently used in the field of augmentative and alternative communication (AAC). Various characteristics of these graphic symbol systems affect learnability and should be considered in order to make a meaningful match between the user of AAC and the system. Although a variety of studies on learnability of graphic systems have been conducted in the past, all studies conducted included participants from Western countries. To compare two symbol systems, namely Blissymbolics and CyberGlyphs in terms of learnability. To identify the overall performance between Blissymbolics and CyberGlyphs in terms of the percentage of symbols correctly identified at the various stages. A quasi-experimental crossover design between groups was carried out on two homogeneous groups of typically developing, Northern Sotho-speaking children. Data were obtained by teaching 80 different referents (40 from each symbol system) to 50 Northern Sotho speaking regular students from South Africa, ranging from grade 4 to 6. The participants were tested on symbol recognition at four different stages: after initial training, after a revision period, after a 7-day withdrawal period and after 30 days of withdrawal. The overall results indicated that the ease of learning and memory retention of the CyberGlyphs were higher than that of Blissymbols, irrespective of the group or the sequence of exposure. Possible reasons for the differences are discussed. CyberGlyphs seem to be more accessible as the symbols in general seem to be more detailed and also are meant to be hand drawn rather than computer or stencil produced. Within this context, CyberGlyphs could be easier to access visually than Blissymbolics, especially for children who do not have extensive experience in dealing with geometric shapes, particularly for the children who do not come from rich literacy backgrounds or who do not have rich visual perceptual experiences to draw from. Even though initial learning might be faster for CyberGlyphs than for Blissymbolics in certain populations, there may be other factors to consider when making a choice between the two graphic symbol systems. Within the clinical setting CyberGlyphs can provide the individual who uses AAC with a more user-friendly system as an entrance to the use of other graphic symbol systems. This may be especially important in contexts where issues surrounding poverty and lack of early exposure to literacy exist.

  12. Joint Force Quarterly. Issue 72, 1st Quarter 2014

    DTIC Science & Technology

    2014-01-01

    assumptions. Planners may assume a sensor is adequate for finding IEDs but must develop a feedback loop that focuses on the interplay of enemy and friendly...AD challenge: how to maintain sensor and weapons density at distance, over time, without forward bases or aircraft carriers. Overcoming this...capabilities such as cyber warfare.3 It also requires unconventional thinking about how the U.S. military Services combine sensors , weapons, and platforms to

  13. IMPLICATIONS OF CROSS DOMAIN FIRES IN MULTI-DOMAIN BATTLE

    DTIC Science & Technology

    2017-04-06

    States Air Force 6 April 2017 DISTRIBUTION A. Approved for public release: distribution unlimited. 1 DISCLAIMER The views expressed in this...their cyber capability that will ultimately reinforce their influence and power across the Middle East. In viewing North Korea threat capabilities...land-based assets operating in cross domain denial type operations. In viewing the historical warfare capabilities captured in 13 the case study

  14. Commanders and Cyber Chat: Should More Guidance be Provided for Social Networking Sites

    DTIC Science & Technology

    2011-04-01

    his favorite book is Mein Kampf, his favorite movie is the Nazi propaganda film, Triumph of the Will, his interests are “white women, and his...service member wearing a Navy uniform and holding a Confederate insignia is on a commander’s friends list? Is that commander responsible for...Cybervetting and Posting. January 10, 2011. www.inamecheck.com. 18 Ibid. 19 Ibid. 20 Baron, Kevin. "Watchdog group: Dozens of active-duty found on neo- Nazi

  15. In Canada: Friendly Fire

    ERIC Educational Resources Information Center

    Robertson, Heather-jane

    2004-01-01

    One of Canada's more frequently quoted political malapropisms is attributed to Robert Thompson, who sternly reminded his fellow parliamentarians in 1973 that "the Americans are our best friends, whether we like it or not." This cross-border friendship is partly expedient, partly geographic, partly genuine, sometimes one-sided, and almost…

  16. Addressing Modeling Challenges in Cyber-Physical Systems

    DTIC Science & Technology

    2011-03-04

    A. Lee and Eleftherios Matsikoudis. The semantics of dataflow with firing. In Grard Huet, Gordon Plotkin, Jean - Jacques Lévy, and Yves Bertot...Computer-Aided Design of Integrated Circuits and Systems, 20(3), 2001. [12] Luca P. Carloni, Roberto Passerone, Alessandro Pinto , and Alberto Sangiovanni...gst/fullpage.html?res= 9504EFDA1738F933A2575AC0A9679C8B63. 20 [15] Abhijit Davare, Douglas Densmore, Trevor Meyerowitz, Alessandro Pinto , Alberto

  17. Breaking Bad: Reforming Cyber Acquisition via Innovative Strategies

    DTIC Science & Technology

    2015-04-01

    effects. Just as a special operations tactician can work with any weapon he finds on the ground , the FIRE-based team will thrive by being able to... operation could be challenged on legal grounds , so this acquisition strategy would need to develop an adjoining legal strategy to permit its employment...for the Degree of MASTER OF OPERATIONAL ARTS AND SCIENCES Advisor: Wg Cdr Graem M. Corfield, RAF Maxwell Air Force Base, Alabama April 2015

  18. [Adolescents in Web 2.0: risks and chances ].

    PubMed

    Salisch, Maria von

    2014-01-01

    That almost all adolescents possess an individual access to the internet and that they use it every day, lays the foundation for the improved means of self presentation and participation that are known by the notion of Web 2.0. Social networks and other interactive internet formats give rise to new risks like cyber mobbing which is the topic of three contributions. At the same time, Web 2.0 offers chances in the form of online counseling and online therapy that cater to the preferences of media-friendly target group of adolescents.

  19. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.

    PubMed

    Wang, Maocai; Dai, Guangming; Choo, Kim-Kwang Raymond; Jayaraman, Prem Prakash; Ranjan, Rajiv

    2016-01-01

    Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user's public key based on the user's identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al.

  20. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures

    PubMed Central

    Dai, Guangming

    2016-01-01

    Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user’s public key based on the user’s identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al. PMID:27564373

  1. GeoBrain Computational Cyber-laboratory for Earth Science Studies

    NASA Astrophysics Data System (ADS)

    Deng, M.; di, L.

    2009-12-01

    Computational approaches (e.g., computer-based data visualization, analysis and modeling) are critical for conducting increasingly data-intensive Earth science (ES) studies to understand functions and changes of the Earth system. However, currently Earth scientists, educators, and students have met two major barriers that prevent them from being effectively using computational approaches in their learning, research and application activities. The two barriers are: 1) difficulties in finding, obtaining, and using multi-source ES data; and 2) lack of analytic functions and computing resources (e.g., analysis software, computing models, and high performance computing systems) to analyze the data. Taking advantages of recent advances in cyberinfrastructure, Web service, and geospatial interoperability technologies, GeoBrain, a project funded by NASA, has developed a prototype computational cyber-laboratory to effectively remove the two barriers. The cyber-laboratory makes ES data and computational resources at large organizations in distributed locations available to and easily usable by the Earth science community through 1) enabling seamless discovery, access and retrieval of distributed data, 2) federating and enhancing data discovery with a catalogue federation service and a semantically-augmented catalogue service, 3) customizing data access and retrieval at user request with interoperable, personalized, and on-demand data access and services, 4) automating or semi-automating multi-source geospatial data integration, 5) developing a large number of analytic functions as value-added, interoperable, and dynamically chainable geospatial Web services and deploying them in high-performance computing facilities, 6) enabling the online geospatial process modeling and execution, and 7) building a user-friendly extensible web portal for users to access the cyber-laboratory resources. Users can interactively discover the needed data and perform on-demand data analysis and modeling through the web portal. The GeoBrain cyber-laboratory provides solutions to meet common needs of ES research and education, such as, distributed data access and analysis services, easy access to and use of ES data, and enhanced geoprocessing and geospatial modeling capability. It greatly facilitates ES research, education, and applications. The development of the cyber-laboratory provides insights, lessons-learned, and technology readiness to build more capable computing infrastructure for ES studies, which can meet wide-range needs of current and future generations of scientists, researchers, educators, and students for their formal or informal educational training, research projects, career development, and lifelong learning.

  2. The Future Role of the Department of Defense in Protecting and Defending America’s Economy in Cyberspace

    DTIC Science & Technology

    2014-12-12

    hold. The retail giant installed a FireEye computer security system that completed a month long testing phase in May 2013. The system was designed ...agencies. Through the Untied States Cyber Command, the Department of Defense has capability that can be used to defend America. This reseach paper looks... reseach paper looks at the roles and responsibilities of the Department of Defense as it relates to Homeland Defense and the protection of credit

  3. OS friendly microprocessor architecture: Hardware level computer security

    NASA Astrophysics Data System (ADS)

    Jungwirth, Patrick; La Fratta, Patrick

    2016-05-01

    We present an introduction to the patented OS Friendly Microprocessor Architecture (OSFA) and hardware level computer security. Conventional microprocessors have not tried to balance hardware performance and OS performance at the same time. Conventional microprocessors have depended on the Operating System for computer security and information assurance. The goal of the OS Friendly Architecture is to provide a high performance and secure microprocessor and OS system. We are interested in cyber security, information technology (IT), and SCADA control professionals reviewing the hardware level security features. The OS Friendly Architecture is a switched set of cache memory banks in a pipeline configuration. For light-weight threads, the memory pipeline configuration provides near instantaneous context switching times. The pipelining and parallelism provided by the cache memory pipeline provides for background cache read and write operations while the microprocessor's execution pipeline is running instructions. The cache bank selection controllers provide arbitration to prevent the memory pipeline and microprocessor's execution pipeline from accessing the same cache bank at the same time. This separation allows the cache memory pages to transfer to and from level 1 (L1) caching while the microprocessor pipeline is executing instructions. Computer security operations are implemented in hardware. By extending Unix file permissions bits to each cache memory bank and memory address, the OSFA provides hardware level computer security.

  4. A Feasibility Assessment of 6LoWPAN for Secure Communications in the U.S. Army

    DTIC Science & Technology

    2016-06-01

    22 1. Obstacles .......................................................................................22 2. Resistance against...35 Table 6. An Example of a Pre-formatted Call for Fire (CFF) Exchange and Expected Byte...friendly forces in a dismounted operation often occurs through line of sight (LOS) or verbal passing of information within a small fire -team or squad sub

  5. FIRE's Guide to Due Process and Fair Procedure on Campus. FIRE's Guides to Student Rights on Campus

    ERIC Educational Resources Information Center

    Silverglate, Harvey A.; Gewolb, Josh

    2003-01-01

    Students should know their rights and liberties, and they need to be better informed and better equipped about how to assert and defend these precious things. The protectors of students' rights and liberties--those faculty, administrators, parents, alumni, friends, citizens, advisors, and attorneys who care about such vital matters--should…

  6. Defense AT And L Magazine. Vol. 47, No. 1, January February 2018

    DTIC Science & Technology

    2018-01-01

    available for em - ployees at all levels to engage with DoD personnel in a non- competitive, structured educational environment. Miscom- munication can...medical, fire, bomb , cyber attack, bio/ chem/rad) • Kidnap/ransom • Infrastructure • Power redundancy • Facilities hardening • Perimeter security...aly sis Th rea ts/ Ha za rd s Ris k i de nt ic ati on Mi tig ati on Em erg en cy op era tio ns Fu nc tio na l re sp on sib ilit ies Cr itic al fun

  7. Sankofa pediatric HIV disclosure intervention cyber data management: building capacity in a resource-limited setting and ensuring data quality

    PubMed Central

    Catlin, Ann Christine; Fernando, Sumudinie; Gamage, Ruwan; Renner, Lorna; Antwi, Sampson; Tettey, Jonas Kusah; Amisah, Kofi Aikins; Kyriakides, Tassos; Cong, Xiangyu; Reynolds, Nancy R.; Paintsil, Elijah

    2015-01-01

    Prevalence of pediatric HIV disclosure is low in resource-limited settings. Innovative, culturally sensitive, and patient-centered disclosure approaches are needed. Conducting such studies in resource-limited settings is not trivial considering the challenges of capturing, cleaning, and storing clinical research data. To overcome some of these challenges, the Sankofa pediatric disclosure intervention adopted an interactive cyber infrastructure for data capture and analysis. The Sankofa Project database system is built on the HUBzero cyber infrastructure (https://hubzero.org), an open source software platform. The hub database components support: (1) data management – the “databases” component creates, configures, and manages database access, backup, repositories, applications, and access control; (2) data collection – the “forms” component is used to build customized web case report forms that incorporate common data elements and include tailored form submit processing to handle error checking, data validation, and data linkage as the data are stored to the database; and (3) data exploration – the “dataviewer” component provides powerful methods for users to view, search, sort, navigate, explore, map, graph, visualize, aggregate, drill-down, compute, and export data from the database. The Sankofa cyber data management tool supports a user-friendly, secure, and systematic collection of all data. We have screened more than 400 child–caregiver dyads and enrolled nearly 300 dyads, with tens of thousands of data elements. The dataviews have successfully supported all data exploration and analysis needs of the Sankofa Project. Moreover, the ability of the sites to query and view data summaries has proven to be an incentive for collecting complete and accurate data. The data system has all the desirable attributes of an electronic data capture tool. It also provides an added advantage of building data management capacity in resource-limited settings due to its innovative data query and summary views and availability of real-time support by the data management team. PMID:26616131

  8. Sankofa pediatric HIV disclosure intervention cyber data management: building capacity in a resource-limited setting and ensuring data quality.

    PubMed

    Catlin, Ann Christine; Fernando, Sumudinie; Gamage, Ruwan; Renner, Lorna; Antwi, Sampson; Tettey, Jonas Kusah; Amisah, Kofi Aikins; Kyriakides, Tassos; Cong, Xiangyu; Reynolds, Nancy R; Paintsil, Elijah

    2015-01-01

    Prevalence of pediatric HIV disclosure is low in resource-limited settings. Innovative, culturally sensitive, and patient-centered disclosure approaches are needed. Conducting such studies in resource-limited settings is not trivial considering the challenges of capturing, cleaning, and storing clinical research data. To overcome some of these challenges, the Sankofa pediatric disclosure intervention adopted an interactive cyber infrastructure for data capture and analysis. The Sankofa Project database system is built on the HUBzero cyber infrastructure ( https://hubzero.org ), an open source software platform. The hub database components support: (1) data management - the "databases" component creates, configures, and manages database access, backup, repositories, applications, and access control; (2) data collection - the "forms" component is used to build customized web case report forms that incorporate common data elements and include tailored form submit processing to handle error checking, data validation, and data linkage as the data are stored to the database; and (3) data exploration - the "dataviewer" component provides powerful methods for users to view, search, sort, navigate, explore, map, graph, visualize, aggregate, drill-down, compute, and export data from the database. The Sankofa cyber data management tool supports a user-friendly, secure, and systematic collection of all data. We have screened more than 400 child-caregiver dyads and enrolled nearly 300 dyads, with tens of thousands of data elements. The dataviews have successfully supported all data exploration and analysis needs of the Sankofa Project. Moreover, the ability of the sites to query and view data summaries has proven to be an incentive for collecting complete and accurate data. The data system has all the desirable attributes of an electronic data capture tool. It also provides an added advantage of building data management capacity in resource-limited settings due to its innovative data query and summary views and availability of real-time support by the data management team.

  9. Friendly fire: Longitudinal effects of exposure to violent video games on aggressive behavior in adolescent friendship dyads

    PubMed Central

    Burk, William J.; Stoltz, Sabine E. M. J.; van den Berg, Yvonne H. M.; Cillessen, Antonius H. N.

    2018-01-01

    Research on gaming effects has focused on adolescence, a developmental period in which peer relationships become increasingly salient. However, the impact of peers on the effects of violent gaming on adolescents has been understudied. This study examined whether adolescents’ exposure to violent video games predicted their own and their friend's aggression one year later. Among 705 gaming adolescents, 141 dyads were identified based on reciprocated best friend nominations (73.8% male, Mage = 13.98). Actor‐Partner Interdependence Models indicated that adolescent males’ (but not females’) exposure to violent games positively predicted the aggression of their best friend 1 year later. This effect appeared regardless of whether the friends played video games together or not. The study illustrates the importance of peers in the association between violent gaming and aggression. PMID:29363767

  10. On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks.

    PubMed

    Li, Xuran; Dai, Hong-Ning; Wang, Hao; Xiao, Hong

    2016-11-24

    Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) systems. An eavesdropping attack is one of the most serious threats to WSNs since it is a prerequisite for other malicious attacks. In this paper, we propose a novel anti-eavesdropping mechanism by introducing friendly jammers to wireless sensor networks (WSNs). In particular, we establish a theoretical framework to evaluate the eavesdropping risk of WSNs with friendly jammers and that of WSNs without jammers. Our theoretical model takes into account various channel conditions such as the path loss and Rayleigh fading, the placement schemes of jammers and the power controlling schemes of jammers. Extensive results show that using jammers in WSNs can effectively reduce the eavesdropping risk. Besides, our results also show that the appropriate placement of jammers and the proper assignment of emitting power of jammers can not only mitigate the eavesdropping risk but also may have no significant impairment to the legitimate communications.

  11. On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks

    PubMed Central

    Li, Xuran; Dai, Hong-Ning; Wang, Hao; Xiao, Hong

    2016-01-01

    Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) systems. An eavesdropping attack is one of the most serious threats to WSNs since it is a prerequisite for other malicious attacks. In this paper, we propose a novel anti-eavesdropping mechanism by introducing friendly jammers to wireless sensor networks (WSNs). In particular, we establish a theoretical framework to evaluate the eavesdropping risk of WSNs with friendly jammers and that of WSNs without jammers. Our theoretical model takes into account various channel conditions such as the path loss and Rayleigh fading, the placement schemes of jammers and the power controlling schemes of jammers. Extensive results show that using jammers in WSNs can effectively reduce the eavesdropping risk. Besides, our results also show that the appropriate placement of jammers and the proper assignment of emitting power of jammers can not only mitigate the eavesdropping risk but also may have no significant impairment to the legitimate communications. PMID:27886154

  12. Cyber Forensics Ontology for Cyber Criminal Investigation

    NASA Astrophysics Data System (ADS)

    Park, Heum; Cho, Sunho; Kwon, Hyuk-Chul

    We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber space. Accordingly, it is difficult to determine relational crime types and collect evidence. Therefore, we considered the classifications of cyber crime, the collection of evidence in cyber space and the application of laws to cyber crime. In order to efficiently investigate cyber crime, it is necessary to integrate those concepts for each cyber crime-case. Thus, we constructed a cyber forensics domain ontology for criminal investigation in cyber space, according to the categories of cyber crime, laws, evidence and information of criminals. This ontology can be used in the process of investigating of cyber crime-cases, and for data mining of cyber crime; classification, clustering, association and detection of crime types, crime cases, evidences and criminals.

  13. Potential production of palm oil-based foaming agent as fire extinguisher of peatlands in Indonesia: Literature review

    NASA Astrophysics Data System (ADS)

    Subekti, P.; Hambali, E.; Suryani, A.; Suryadarma, P.

    2017-05-01

    This study aims to analyze the potential aplication of of palm oil-based foaming agent as peat fires fighter in Indonesia. From literature review, it has been known that the foaming agent able to form foam to extinguish fire, wrap and refrigerate the burning peat. It is necessary to develop the production and application of foaming agent in Indonesia because peat fires occur almost every year that caused smoke haze. Potential raw material for the production of environmental friendly foaming agent as foam extinguishing for peat fires in Indonesia aong other is palm oil due to abundant availability, sustainable, and foam product easily degraded in the environment of the burnt areas. Production of foaming agent as fire-fighting in Indonesia is one alternative to reduce the time to control the fire and smog disaster impact. Application of palm oil as a raw material for fire-fighting is contribute to increase the value added and the development of palm oil downstream industry.

  14. Friendly fire: Longitudinal effects of exposure to violent video games on aggressive behavior in adolescent friendship dyads.

    PubMed

    Verheijen, Geert P; Burk, William J; Stoltz, Sabine E M J; van den Berg, Yvonne H M; Cillessen, Antonius H N

    2018-05-01

    Research on gaming effects has focused on adolescence, a developmental period in which peer relationships become increasingly salient. However, the impact of peers on the effects of violent gaming on adolescents has been understudied. This study examined whether adolescents' exposure to violent video games predicted their own and their friend's aggression one year later. Among 705 gaming adolescents, 141 dyads were identified based on reciprocated best friend nominations (73.8% male, M age  = 13.98). Actor-Partner Interdependence Models indicated that adolescent males' (but not females') exposure to violent games positively predicted the aggression of their best friend 1 year later. This effect appeared regardless of whether the friends played video games together or not. The study illustrates the importance of peers in the association between violent gaming and aggression. © 2018 The Authors. Aggressive Behavior Published by Wiley Periodicals, Inc.

  15. No smoke without fire: The impact of future friends on adolescent smoking behaviour.

    PubMed

    Mercken, L; Candel, M; van Osch, L; de Vries, H

    2011-02-01

    This study examined the impact of future friends and the contribution of different social influence and selection processes in predicting adolescents' smoking behaviour by extending the theory of planned behaviour (TPB). We investigated the impact of previous smoking, direct pressure from friends, descriptive norms of present and future friends, smoking-based selection of future friends, and distinguished between reciprocal and desired friends. A longitudinal design with three measurements was used. METHODSL: The sample consisted of 1,475 Dutch high school students (mean age = 12.7 years) that participated as a control group in the European Smoking prevention Framework Approach study at three measurements. Structural equation modelling revealed that adolescent smoking was influenced by intention, previous smoking, descriptive norms of parents and siblings, and that desired as well as reciprocal friends were selected based on similar smoking behaviour. Future friends indirectly influenced adolescent smoking through intention, as did attitude, subjective norms of parents and siblings, previous smoking, and descriptive norms of reciprocal friends and siblings. The present results suggest that descriptive norms and selection of friends need to be considered as major factors explaining smoking behaviour among adolescents besides the TPB components. These insights contribute to the further refinement of smoking prevention strategies. ©2010 The British Psychological Society.

  16. 77 FR 33766 - Notice of Public Meeting; Wyoming Resource Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-07

    ... the BLM's wild horse partnership with Friends of a Legacy and Marathon Oil, water projects, porcine zona pellucida and the overall wild horse program; a RAC business session; and a presentation on fire...

  17. Is Tube Artillery a Viable Fire Support Platform for the United States Military on the Battlefields of the Future

    DTIC Science & Technology

    2017-04-06

    including the Korean, Vietnam, and Persian Gulf Wars. However, as the nature of warfare and weaponry technology has transformed with the advent of precision...close support of friendly troops which demanded improved accuracy to reduce the chances of friendly casualties.3 By the advent of the Persian ...armored infantry vehicles, and air assets to locate, fix, and destroy Iraqi artillery and infantry in quick night-time strikes.5 The Persian Gulf

  18. SeqFIRE: a web application for automated extraction of indel regions and conserved blocks from protein multiple sequence alignments.

    PubMed

    Ajawatanawong, Pravech; Atkinson, Gemma C; Watson-Haigh, Nathan S; Mackenzie, Bryony; Baldauf, Sandra L

    2012-07-01

    Analyses of multiple sequence alignments generally focus on well-defined conserved sequence blocks, while the rest of the alignment is largely ignored or discarded. This is especially true in phylogenomics, where large multigene datasets are produced through automated pipelines. However, some of the most powerful phylogenetic markers have been found in the variable length regions of multiple alignments, particularly insertions/deletions (indels) in protein sequences. We have developed Sequence Feature and Indel Region Extractor (SeqFIRE) to enable the automated identification and extraction of indels from protein sequence alignments. The program can also extract conserved blocks and identify fast evolving sites using a combination of conservation and entropy. All major variables can be adjusted by the user, allowing them to identify the sets of variables most suited to a particular analysis or dataset. Thus, all major tasks in preparing an alignment for further analysis are combined in a single flexible and user-friendly program. The output includes a numbered list of indels, alignments in NEXUS format with indels annotated or removed and indel-only matrices. SeqFIRE is a user-friendly web application, freely available online at www.seqfire.org/.

  19. Normative beliefs about aggression and cyber aggression among young adults: a longitudinal investigation.

    PubMed

    Wright, Michelle F; Li, Yan

    2013-01-01

    This longitudinal study examined normative beliefs about aggression (e.g., face-to-face, cyber) in relation to the engagement in cyber aggression 6 months later among 126 (69 women) young adults. Participants completed electronically administered measures assessing their normative beliefs, face-to-face and cyber aggression at Time 1, and cyber aggression 6 months later (Time 2). We found that men reported more cyber relational and verbal aggression when compared to women. After controlling for each other, Time 1 face-to-face relational aggression was positively related to Time 2 cyber relational aggression, whereas Time 1 face-to-face verbal aggression was positively related to Time 2 cyber verbal aggression. Normative beliefs regarding cyber aggression was positively related to both forms of cyber aggression 6 months later, after controlling for normative beliefs about face-to-face aggression. Furthermore, a significant two-way interaction between Time 1 cyber relational aggression and normative beliefs about cyber relational aggression was found. Follow-up analysis showed that Time 1 cyber relational aggression was more strongly related to Time 2 cyber relational aggression when young adults held higher normative beliefs about cyber relational aggression. A similar two-way interaction was found for cyber verbal aggression such that the association between Time 1 and Time 2 cyber verbal aggression was stronger at higher levels of normative beliefs about cyber verbal aggression. Results are discussed in terms of the social cognitive and behavioral mechanisms associated with the engagement of cyber aggression. © 2013 Wiley Periodicals, Inc.

  20. Utilization of geoinformation tools for the development of forest fire hazard mapping system: example of Pekan fire, Malaysia

    NASA Astrophysics Data System (ADS)

    Mahmud, Ahmad Rodzi; Setiawan, Iwan; Mansor, Shattri; Shariff, Abdul Rashid Mohamed; Pradhan, Biswajeet; Nuruddin, Ahmed

    2009-12-01

    A study in modeling fire hazard assessment will be essential in establishing an effective forest fire management system especially in controlling and preventing peat fire. In this paper, we have used geographic information system (GIS), in combination with other geoinformation technologies such as remote sensing and computer modeling, for all aspects of wild land fire management. Identifying areas that have a high probability of burning is an important component of fire management planning. The development of spatially explicit GIS models has greatly facilitated this process by allowing managers to map and analyze variables contributing to fire occurrence across large, unique geographic units. Using the model and its associated software engine, the fire hazard map was produced. Extensive avenue programming scripts were written to provide additional capabilities in the development of these interfaces to meet the full complement of operational software considering various users requirements. The system developed not only possesses user friendly step by step operations to deliver the fire vulnerability mapping but also allows authorized users to edit, add or modify parameters whenever necessary. Results from the model can support fire hazard mapping in the forest and enhance alert system function by simulating and visualizing forest fire and helps for contingency planning.

  1. Emergency Management Computer-Aided Trainer (EMCAT)

    NASA Technical Reports Server (NTRS)

    Rodriguez, R. C.; Johnson, R. P.

    1986-01-01

    The Emergency Management Computer-Aided Trainer (EMCAT) developed by Essex Corporation or NASA and the Federal Emergency Management Administration's (FEMA) National Fire Academy (NFA) is described. It is a computer based training system for fire fighting personnel. A prototype EMCAT system was developed by NASA first using video tape images and then video disk images when the technology became available. The EMCAT system is meant to fill the training needs of the fire fighting community with affordable state-of-the-art technologies. An automated real time simulation of the fire situation was needed to replace the outdated manual training methods currently being used. In order to be successful, this simulator had to provide realism, be user friendly, be affordable, and support multiple scenarios. The EMCAT system meets these requirements and therefore represents an innovative training tool, not only for the fire fighting community, but also for the needs of other disciplines.

  2. The families and friends of heavy drinkers: Caught in the cross-fire of policy change?

    PubMed

    O'May, Fiona; Whittaker, Anne; Black, Heather; Gill, Jan

    2017-03-01

    Research highlights the need to better understand the impact of alcohol-related harm on families and communities. Scottish policy initiatives to reduce alcohol consumption and alcohol-related harm include the planned introduction of a minimum unit price for alcohol. We aimed to explore existing and proposed changes in alcohol policy, from the standpoint of heavy drinkers, through accounts of their involvement and repercussions for family and friends. Interviews were conducted with 20 heavy drinkers, recruited from hospital alcohol treatment centres in Scotland's two largest cities. Participants were part of a larger longitudinal mixed methods study. Interviews explored experiences of alcohol-related harm and the impact, or potential impact, of alcohol policy changes on drinking patterns, risk-taking, consumption and wellbeing. Data coded for 'family and friends' were thematically analysed using a constant comparison method. Family and friends were portrayed as important for aiding moderation and abstinence, but more often for sustaining continued heavy drinking. Heavy drinkers with complex needs and those living in deprived communities suggested that increased alcohol prices could exacerbate the detrimental effect on their health and social circumstances, and that of their family, should their consumption remain excessive. Population level policy initiatives to reduce alcohol consumption, such as minimum unit pricing, will impact on the families and social networks of heavy drinkers in addition to the drinker. The most vulnerable may be affected disproportionately. Alcohol policy changes and evaluations need to consider consequences for drinkers, families and communities. [O'May F, Whittaker A, Black H, Gill J. The families and friends of heavy drinkers: Caught in the cross-fire of policy change? Drug Alcohol Rev 2017;36:192-199]. © 2016 Australasian Professional Society on Alcohol and other Drugs.

  3. Kicking the digital dog: a longitudinal investigation of young adults' victimization and cyber-displaced aggression.

    PubMed

    Wright, Michelle F; Li, Yan

    2012-09-01

    Using the general strain theory as a theoretical framework, the present longitudinal study investigated both face-to-face and cyber victimization in relation to cyber-displaced aggression. Longitudinal data were collected from 130 (70 women) young adults who completed measures assessing their victimization (face-to-face and cyber), cyber aggression, and both face-to-face and cyber-displaced aggression. Findings indicated that victimization in both social contexts (face-to-face and cyber) contributed to cyber-displaced aggression 6 months later (Time 2), after controlling for gender, cyber aggression, face-to-face displaced aggression, and cyber-displaced aggression at Time 1. A significant two-way interaction revealed that Time 1 cyber victimization was more strongly related to Time 2 cyber-displaced aggression when young adults had higher levels of face-to-face victimization at Time 1. Implications of these findings are discussed as well as a call for more research investigating displaced aggression in the cyber context.

  4. [Cyber-bullying in adolescents: associated psychosocial problems and comparison with school bullying].

    PubMed

    Kubiszewski, V; Fontaine, R; Huré, K; Rusch, E

    2013-04-01

    The aim of this study was to determine the prevalence of adolescents engaged in cyber-bullying and then to identify whether students involved in cyber- and school bullying present the same characteristics of internalizing problems (insomnia, perceived social disintegration, psychological distress) and externalizing problems (general aggressiveness, antisocial behavior). Semi-structured interviews were conducted with 738 adolescents from a high-school and a middle-school (mean age=14.8 ± 2.7). The Electronic Bullying Questionnaire and the Olweus Bully/Victim Questionnaire were used to identify profiles of cyber-bullying (cyber-victim, cyber-bully, cyber-bully/victim and cyber-neutral) and school bullying (victim, bully, bully/victim and neutral). Internalizing problems were investigated using the Athens Insomnia Scale, a Perceived Social Disintegration Scale and a Psychological Distress Scale. Externalizing problems were assessed using a General Aggressiveness Scale and an Antisocial Behavior Scale. Almost one student in four was involved in cyber-bullying (16.4% as cyber-victim, 4.9% as cyber-bully and 5.6% as cyber-bully/victim); 14% of our sample was engaged in school bullying as a victim, 7.2% as a bully and 2.8% as a bully/victim. The majority of adolescents involved in cyber-bullying were not involved in school bullying. With regard to the problems associated with school bullying, internalizing problems were more prevalent in victims and bully/victims, whereas externalizing problems were more common in bullies and bully/victims. A similar pattern was found in cyber-bullying where internalizing problems were characteristic of cyber-victims and cyber-bully/victims. Insomnia was elevated in the cyber-bully group which is specific to cyberbullying. General aggressiveness and antisocial behavior were more prevalent in cyber-bullies and cyber-bully/victims. Looking at the differences between types of bullying, victims of "school only" and "school and cyber" bullying had higher scores for insomnia and perceived social disintegration than victims of "cyber only" bullying or students "non-involved". Higher general aggressiveness scores were observed for "school only" bullies and "school and cyber" bullies than for bullies in "cyber only" bullying or students "non-involved". Regarding antisocial behavior, "school only" bullies, "cyber only" bullies, "school and cyber" bullies had higher scores than students "non-involved". This study highlights the importance of investigating both school and cyber-bullying as many psychosocial problems are linked to these two specific and highly prevalent forms of bullying. Copyright © 2012 L’Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.

  5. Predictors of willingness to use cyber counseling for college students with disabilities.

    PubMed

    Lan, Chu-Mei

    2016-04-01

    Cyber counseling is a new method for assisting people in coping with distress. People in Taiwan are more familiar with face-to-face counseling than with cyber counseling. Using computers is the most popular activity among college students with disabilities. Cyber counseling is effective for lessening client disturbance. Therefore, cyber counseling is an alternative to face-to-face counseling. This study measured the willingness of college students with disabilities to use cyber counseling to meet their mental health needs. In addition, the predictors of the willingness to use cyber counseling were explored. The subjects were college students with disabilities who were recruited from universities in Southern Taiwan through the Internet and in college counseling centers. A total of 214 structured questionnaires were collected and subsequently analyzed using SPSS Version 18.0 through stepwise regression for discovering the crucial predictors of the willingness of college students to use cyber counseling. The crucial predictors of the willingness of college students to use cyber counseling were cyber-counseling needs, the need for cyber-counseling methods (the need to use various cyber-counseling methods), a help-seeking attitude in cyber counseling, a hearing disorder, cyber counseling need for academic achievement, and grade level. The explained proportion of variance was 65.4%. The willingness of college students with disabilities to use cyber counseling was explained according to cyber-counseling needs, cyber-counseling attitudes, disease type, and grades. Based on the results, this study offers specific suggestions and future directions for research on cyber counseling for college students with disabilities. Copyright © 2016 Elsevier Inc. All rights reserved.

  6. For the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations

    DTIC Science & Technology

    2015-06-12

    the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations 5a. CONTRACT NUMBER 5b. GRANT ...20130423/ NEWS/304230016/Navy-wants-1-000-more-cyber-warriors. 33 Edward Cardon , “Army Cyber Capabilities” (Lecture, Advanced Operations Course...Finally, once a cyber security professional is trained, many argue, to include the head of Army’s Cyber Command, Lieutenant General Edward Cardon

  7. Lessons Learned in Over a Decade of Technical Support for U.S. Nuclear Cyber Security Programmes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Landine, Guy P.; Craig, Philip A.

    Pacific Northwest National Laboratory’s (PNNL) nuclear cyber security team has been providing technical support to the U.S. Nuclear Regulatory Commission (NRC) since 2002. This team has provided cyber security technical experties in conducting cyber security inspections, developing of regulatory rules and guidance, reviewing facility cyber security plans, developing inspection guidance, and developing and teaching NRC inspectors how to conduct cyber security assessments. The extensive experience the PNNL team has gathered has allowed them to compile a lenghty list of recommendations on how to improve cyber security programs and conduct assessments. A selected set of recommendations are presented, including the needmore » to: integrate an array of defenisve strategies into a facility’s cyber security program, coordinate physical and cyber security activities, train phycial security forces to resist a cyber-enabled physical attack, improve estimates of the consequences of a cyber attack, properly resource cyber security assessments, appropropriately account for insider threats, routinely monitor security devices for potential attacks, supplement compliance-based requirements with risk-based decision making, and introduce the concept of resilience into cyber security programs.« less

  8. DEVELOPMENT OF USER-FRIENDLY SIMULATION SYSTEM OF EARTHQUAKE INDUCED URBAN SPREADING FIRE

    NASA Astrophysics Data System (ADS)

    Tsujihara, Osamu; Gawa, Hidemi; Hayashi, Hirofumi

    In the simulation of earthquake induced urban spreading fire, the produce of the analytical model of the target area is required as well as the analysis of spreading fire and the presentati on of the results. In order to promote the use of the simulation, it is important that the simulation system is non-intrusive and the analysis results can be demonstrated by the realistic presentation. In this study, the simulation system is developed based on the Petri-net algorithm, in which the easy operation can be realized in the modeling of the target area of the simulation through the presentation of analytical results by realistic 3-D animation.

  9. Cyber Warfare: China’s Strategy to Dominate in Cyber Space

    DTIC Science & Technology

    2011-06-10

    CYBER WARFARE : CHINA‘S STRATEGY TO DOMINATE IN CYBER SPACE A thesis presented to the Faculty of the U.S. Army Command and...warfare supports the use of cyber warfare in future conflict. The IW militia unit organization provides each Chinese military region commander with...China, Strategy, Cyber Warfare , Cyber Space, Information Warfare, Electronic Warfare 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18

  10. U.S. Command Relationships in the Conduct of Cyber Warfare: Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority

    DTIC Science & Technology

    2010-05-03

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE U.S. Command Relationships in the Conduct of Cyber Warfare : Establishment...U.S. Command Relationships in the Conduct of Cyber Warfare : Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority...Relationships in the Conduct of Cyber Warfare : Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority The character of

  11. Cyber-Terrorism and Cyber-Crime: There Is a Difference

    DTIC Science & Technology

    The terms cyber -terrorism and cyber -crime have many varying definitions depending on who is defining them. For example, individuals with expertise in...considerations and, when investigating a cyber -attack, procedural considerations. By examining the strengths and weaknesses of several definitions offered by...national security, law enforcement, industry, law, and scholars, this research constructs a list of parameters to consider when formulating definitions for cyber -terrorism and cyber -crime.

  12. Self-Development for Cyber Warriors

    DTIC Science & Technology

    2011-11-10

    Aggressive self-development is a critical task for the cyber warfare professional. No matter the quality, formal training and education programs age...Books and Science Fiction); Technology and Cyber-Related Magazines and Blogs; Specific Cyber Warfare Journal and Magazine Articles; Key Documents on...the strengths and weaknesses of the major donor career fields to the cyber workforce, and a Self-Assessment of Cyber Domain Expertise for readers who wish to assess their own cyber warfare expertise.

  13. Impact of Alleged Russian Cyber Attacks

    DTIC Science & Technology

    2009-05-01

    security. 15. SUBJECT TERMS Cyber Security, Cyber Warfare , Estonia, Georgia, Russian Federation Cyber Strategy, Convention on Cybercrime, NATO Center...Federation ......................................................................................... 33  X.  The Future of Russian Cyber Warfare ................................................................... 39...Issue 15.09); Binoy Kampmark, Cyber Warfare Between Estonia And Russia, (Contemporary Review: Autumn, 2003), p 288-293; Jaak Aaviksoo, Address by the

  14. Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wheeler, Timothy A.; Denman, Matthew R.; Williams, R. A.

    Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities.more » iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber exploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by coupling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated impact and the associated degree of difficulty to achieve the attack vector) on accident management establishes a technical risk informed framework for developing effective cyber security controls for nuclear power.« less

  15. 78 FR 9951 - Excepted Service

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-12

    ...) Not to exceed 3000 positions that require unique cyber security skills and knowledge to perform cyber..., distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture...

  16. Cyber Power in the 21st Century

    DTIC Science & Technology

    2008-12-01

    Cyber Warfare .................................................................86 V. Conclusions and Recommendations...40 2 – Asymmetric Effects of Cyber Warfare ........................................................................41 1 CYBER POWER... cyber warfare capabilities with other elements of national power, as evidenced by the concept of “informationization” (xinxihua) put forward in

  17. Psychological Needs as a Predictor of Cyber Bullying: A Preliminary Report on College Students

    ERIC Educational Resources Information Center

    Dilmac, Bulent

    2009-01-01

    Recent surveys show that cyber bullying is a pervasive problem in North America. Many news stories have reported cyber bullying incidents around the world. Reports on the prevalence of cyber bullying and victimization as a result of cyber bullying increase yearly. Although we know what cyber bullying is it is important that we learn more about the…

  18. Problematic alcohol use as a risk factor for cyber aggression within romantic relationships.

    PubMed

    Crane, Cory A; Umehira, Nicole; Berbary, Cassandra; Easton, Caroline J

    2018-06-06

    Cyber aggression has emerged as a modern form of intimate partner violence which has yet to undergo sufficient research necessary to identify risk factors that may increase the likelihood or severity of cyber aggressive behavior toward a relationship partner. Prior research offers contradictory findings pertaining to the relationship between problematic alcohol use and cyber aggression. We recruited 100 (40 female) adult participants through online crowdsourcing to complete a series of questionnaires assessing traditional partner violence, cyber aggression, and problematic alcohol use. Forty-two percent of the sample reported perpetrating cyber relational aggression and 35% reported perpetrating cyber privacy invasion during the year prior to study participation. Traditional partner violence was associated with both forms of cyber aggression. Problematic alcohol use was only associated with privacy invasion after accounting for demographic factors and traditional partner violence. Cyber aggression was prevalent among the current adult sample. Results suggest that problematic alcohol use is a risk factor for cyber privacy invasion but not cyber relational aggression. Findings add to and clarify the nascent, conflicting results that have emerged from prior research on alcohol-related cyber aggression. (Am J Addict 2018;XX:1-7). © 2018 American Academy of Addiction Psychiatry.

  19. The cyber threat, trophy information and the fortress mentality.

    PubMed

    Scully, Tim

    2011-10-01

    'It won't happen to me' is a prevalent mindset among senior executives in the private and public sectors when considering targeted cyber intrusions. This is exacerbated by the long-term adoption of a 'fortress mentality' towards cyber security, and by the attitude of many of our cyber-security professionals, who speak a different language when it comes to communicating cyber-security events to senior executives. The prevailing approaches to cyber security have clearly failed. Almost every week another serious, targeted cyber intrusion is reported, but reported intrusions are only the tip of the iceberg. Why have we got it so wrong? It must be acknowledged that cyber security is no longer the domain of cyber-security experts alone. Many more of us at various levels of leadership must understand, and be more deeply engaged in, the cyber-security challenge if we are to deal with the threat holistically and effectively. Governments cannot combat the cyber threat alone, particularly the so-called advanced persistent threat; they must work closely with industry as trusted partners. Industry will be the 'boots on the ground' in cyber security, but there are challenges to building this relationship, which must be based on sound principles.

  20. The association between cyber victimization and subsequent cyber aggression: the moderating effect of peer rejection.

    PubMed

    Wright, Michelle F; Li, Yan

    2013-05-01

    Adolescents experience various forms of strain in their lives that may contribute jointly to their engagement in cyber aggression. However, little attention has been given to this idea. To address this gap in the literature, the present longitudinal study examined the moderating influence of peer rejection on the relationship between cyber victimization at Time 1 (T1) and subsequent cyber aggression at Time 2 (T2; 6 months later) among 261 (150 girls) 6th, 7th, and 8th graders. Our findings indicated that both peer rejection and cyber victimization were related to T2 peer-nominated and self-reported cyber aggression, both relational and verbal, after controlling for gender and T1 cyber aggression. Furthermore, T1 cyber victimization was related more strongly to T2 peer-nominated and self-reported cyber aggression at higher levels of T1 peer rejection. These results extend previous findings regarding the relationship between peer rejection and face-to-face aggressive behaviors to the cyber context. In addition, our findings underscore the importance of utilizing multiple methods, such as peer-nomination and self-report, to assess cyber aggression in a school setting.

  1. The Temporal Association Between Traditional and Cyber Dating Abuse Among Adolescents.

    PubMed

    Temple, Jeff R; Choi, Hye Jeong; Brem, Meagan; Wolford-Clevenger, Caitlin; Stuart, Gregory L; Peskin, Melissa Fleschler; Elmquist, JoAnna

    2016-02-01

    While research has explored adolescents' use of technology to perpetrate dating violence, little is known about how traditional in-person and cyber abuse are linked, and no studies have examined their relationship over time. Using our sample of 780 diverse adolescents (58 % female), we found that traditional and cyber abuse were positively associated, and cyber abuse perpetration and victimization were correlated at each time point. Cyber abuse perpetration in the previous year (spring 2013) predicted cyber abuse perpetration 1 year later (spring 2014), while controlling for traditional abuse and demographic variables. In addition, physical violence victimization and cyber abuse perpetration and victimization predicted cyber abuse victimization the following year. These findings highlight the reciprocal nature of cyber abuse and suggest that victims may experience abuse in multiple contexts.

  2. The Temporal Association between Traditional and Cyber Dating Abuse among Adolescents

    PubMed Central

    Temple, Jeff R.; Choi, Hye Jeong; Brem, Meagan; Wolford-Clevenger, Caitlin; Stuart, Gregory L.; Peskin, Melissa Fleschler; Elmquist, JoAnna

    2015-01-01

    While research has explored adolescents’ use of technology to perpetrate dating violence, little is known about how traditional in-person and cyber abuse are linked, and no studies have examined their relationship over time. Using our sample of 780 diverse adolescents (58% female), we found that traditional and cyber abuse were positively associated, and cyber abuse perpetration and victimization were correlated at each time point. Cyber abuse perpetration in the previous year (spring 2013) predicted cyber abuse perpetration one year later (spring 2014), while controlling for traditional abuse and demographic variables. In addition, physical violence victimization and cyber abuse perpetration and victimization predicted cyber abuse victimization the following year. These findings highlight the reciprocal nature of cyber abuse and suggest that victims may experience abuse in multiple contexts. PMID:26525389

  3. Human Capital Development - Resilient Cyber Physical Systems

    DTIC Science & Technology

    2017-09-29

    Human Capital Development – Resilient Cyber Physical Systems Technical Report SERC-2017-TR-113 September 29, 2017 Principal Investigator...4.2.2 Cyber Attack Taxonomy for Cyber Physical Systems .............................................................................. 43 4.2.3...Cyber- physical System Attack Taxonomy ................................................................................................ 44 4.2.4

  4. Offensive Cyber Capability: Can it Reduce Cyberterrorism

    DTIC Science & Technology

    2010-12-02

    33 Lech J. Janczewski, and Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism (New York: Information Science Reference, 2008...Science and Business Media, 2008. Janczewski, Lech , J. and Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism. New York: Information Science

  5. Traditional and cyber aggressors and victims: a comparison of psychosocial characteristics.

    PubMed

    Sontag, Lisa M; Clemans, Katherine H; Graber, Julia A; Lyndon, Sarah T

    2011-04-01

    To date, relatively little is known about differences between perpetrators and victims of cyber and traditional forms of aggression. Hence, this study investigated differences among traditional and cyber aggressors and victims on psychosocial characteristics typically examined in research on traditional aggression and victimization, specifically effortful control, manipulativeness, remorselessness, proactive and reactive aggression, and anxious/depressive symptoms. Participants (N = 300; 63.2% female; M age = 12.89, SD = .95; 52% Caucasian, 27% African American, 11% Latino, and 10% other) were categorized based on aggressor type (non/low aggressor, traditional-only, cyber-only, and combined traditional and cyber) and victim type (non-victim, traditional-only, cyber-only, and combined traditional and cyber). Cyber aggressors reported lower levels of reactive aggression compared to traditional-only and combined aggressors. Combined aggressors demonstrated the poorest psychosocial profile compared to all other aggressor groups. For victimization, cyber-only and combined victims reported higher levels of reactive aggression and were more likely to be cyber aggressors themselves compared to traditional-only victims and non-victims. Findings suggest that there may be unique aspects about cyber aggression and victimization that warrant further investigation.

  6. Cyber Warfare: An Evolution in Warfare not Just War Theory

    DTIC Science & Technology

    2013-04-05

    cyber warfare is greatly debated. While some argue that Just War Theory is irrelevant to cyber warfare , a careful analysis demonstrates that it is a...useful tool for considering the morality of cyber warfare . This paper examines the application of Just War Theory to cyber warfare and contends that...Just War Theory is a useful tool for considering the morality of cyber warfare .

  7. Moving Target Techniques: Cyber Resilience throught Randomization, Diversity, and Dynamism

    DTIC Science & Technology

    2017-03-03

    Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism Hamed Okhravi and Howard Shrobe Overview: The static...nature of computer systems makes them vulnerable to cyber attacks. Consider a situation where an attacker wants to compromise a remote system running... cyber resilience that attempts to rebalance the cyber landscape is known as cyber moving target (MT) (or just moving target) techniques. Moving target

  8. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    NASA Astrophysics Data System (ADS)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the computational cost. The proposed algorithm is validated through a linearized longitudinal motion of a UAV example. Finally, we propose an attack attenuation strategy via the controller design for CPSs that are robust to various types of cyber attacks. While the previous studies have investigated a secure control by assuming a specific attack strategy, in this research we propose a hybrid robust control scheme that contains multiple sub-controllers, each matched to a specific type of cyber attacks. Then the system can be adapted to various cyber attacks (including those that are not assumed for sub-controller design) by switching its sub-controllers to achieve the best performance. Then, a method for designing a secure switching logic to counter all possible cyber attacks is proposed and it verifies mathematically the system's performance and stability as well. The performance of the proposed control scheme is demonstrated by an example with the hybrid H2 - H-infinity controller applied to a UAV example.

  9. Simulating cyber warfare and cyber defenses: information value considerations

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber resources to information protection tasks. The first section of the paper introduces the cyber warfare simulation challenge and the reasons for its importance. The second section contains background information related to our research. The third section contains a discussion of the information ring technique and its use for simulating cyber attacks. The fourth section contains a summary and suggestions for research.

  10. Cyber Warfare/Cyber Terrorism

    DTIC Science & Technology

    2004-03-19

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the...alternative form of conflict, reviews the traditional principles of warfare and why they may or may not apply to cyber warfare , and proposes new principles of...warfare that may be needed to conduct cyber warfare . Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2

  11. Refocusing Cyber Warfare Thought

    DTIC Science & Technology

    2013-02-01

    January–February 2013 Air & Space Power Journal | 44 FeatureCyber Focus Refocusing Cyber Warfare Thought Maj Sean C. Butler, USAF In September 2007...1. REPORT DATE FEB 2013 2. REPORT TYPE 3. DATES COVERED 00-00-2013 to 00-00-2013 4. TITLE AND SUBTITLE Refocusing Cyber Warfare Thought 5a...2013 Air & Space Power Journal | 45 Butler Refocusing Cyber Warfare Thought FeatureCyber Focus characterized by the use of electronics and the

  12. Nodes and Codes: The Reality of Cyber Warfare

    DTIC Science & Technology

    2012-05-17

    Nodes and Codes explores the reality of cyber warfare through the story of Stuxnet, a string of weaponized code that reached through a domain...nodes. Stuxnet served as a proof-of-concept for cyber weapons and provided a comparative laboratory to study the reality of cyber warfare from the...military powers most often associated with advanced, offensive cyber attack capabilities. The reality of cyber warfare holds significant operational

  13. 76 FR 22409 - Nationwide Cyber Security Review (NCSR) Assessment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-21

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR...), National Cyber Security Division (NCSD), Cyber Security Evaluation Program (CSEP), will submit the... for all levels of government to complete a cyber network security assessment so that a full measure of...

  14. Friendly Fire: War-Normalizing Metaphors in the Israeli Political Discourse

    ERIC Educational Resources Information Center

    Gavriely-Nuri, Dalia

    2009-01-01

    Combining principles of peace education and political discourse analysis, this study dwells on one powerful metaphorical mechanism engaged in by Israeli political leaders: war-normalizing metaphors, a mechanism for framing war as part of human nature and normal life. Six core semantic fields were identified as particularly useful "raw…

  15. Cyber Victimization and Depressive Symptoms in Sexual Minority College Students

    ERIC Educational Resources Information Center

    Ramsey, Jaimi L.; DiLalla, Lisabeth F.; McCrary, Megan K.

    2016-01-01

    This study investigated the relations between sexual orientation, cyber victimization, and depressive symptoms in college students. Study aims were to determine whether sexual minority college students are at greater risk for cyber victimization and to examine whether recent cyber victimization (self-reported cyber victimization over the last…

  16. Quantifying and measuring cyber resiliency

    NASA Astrophysics Data System (ADS)

    Cybenko, George

    2016-05-01

    Cyber resliency has become an increasingly attractive research and operational concept in cyber security. While several metrics have been proposed for quantifying cyber resiliency, a considerable gap remains between those metrics and operationally measurable and meaningful concepts that can be empirically determined in a scientific manner. This paper describes a concrete notion of cyber resiliency that can be tailored to meet specific needs of organizations that seek to introduce resiliency into their assessment of their cyber security posture.

  17. The Cyber Defense Review. Volume 1, Number 1, Spring 2016

    DTIC Science & Technology

    2016-04-20

    in the Land and Cyber Domains Lieutenant General Edward C. Cardon The U.S. Navy’s Evolving Cyber/ Cybersecurity Story Rear Admiral Nancy Norton...Olav Lysne Cyber Situational Awareness Maj. Gen. Earl D. Matthews, USAF, Ret Dr. Harold J. Arata III Mr. Brian L. Hale Is There a Cybersecurity ...Kallberg The Decision to Attack: Military and Intelligence Cyber Decision-Making by Dr. Aaron F. Brantly The Cyber Defense Review

  18. Strategic Impact of Cyber Warfare Rules for the United States

    DTIC Science & Technology

    2010-03-01

    Despite the growing complexities of cyberspace and the significant strategic challenge cyber warfare poses on the United States’ vital interests few...specific rules for cyber warfare exist. The United States should seek to develop and maintain cyber warfare rules in order to establish...exemplify the need for multilaterally prepared cyber warfare rules that will reduce the negative influence cyber warfare presently has on the United States’ national interests.

  19. On Cyber Warfare Command and Control Systems

    DTIC Science & Technology

    2004-06-01

    longer adequate to rely solely on the now traditional defense-in-depth strategy. We must recognize that we are engaged in a form of warfare, cyber warfare , and... warfare . This causes security devices to be used ineffectively and responses to be untimely. Cyber warfare then becomes a one-sided battle where the... cyber warfare strategy and tactics requires a cyber warfare command and control system. Responses to cyber attacks do not require offensive measures

  20. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    PubMed

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.

  1. Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.

    PubMed

    Ferdinand, Jason

    The concept of cyber resilience has emerged in recent years in response to the recognition that cyber security is more than just risk management. Cyber resilience is the goal of organisations, institutions and governments across the world and yet the emerging literature is somewhat fragmented due to the lack of a common approach to the subject. This limits the possibility of effective collaboration across public, private and governmental actors in their efforts to build and maintain cyber resilience. In response to this limitation, and to calls for a more strategically focused approach, this paper offers a knowledge-based view of cyber security management that explains how an organisation can build, assess, and maintain cyber resilience.

  2. CyberArc: a non-coplanar-arc optimization algorithm for CyberKnife

    NASA Astrophysics Data System (ADS)

    Kearney, Vasant; Cheung, Joey P.; McGuinness, Christopher; Solberg, Timothy D.

    2017-07-01

    The goal of this study is to demonstrate the feasibility of a novel non-coplanar-arc optimization algorithm (CyberArc). This method aims to reduce the delivery time of conventional CyberKnife treatments by allowing for continuous beam delivery. CyberArc uses a 4 step optimization strategy, in which nodes, beams, and collimator sizes are determined, source trajectories are calculated, intermediate radiation models are generated, and final monitor units are calculated, for the continuous radiation source model. The dosimetric results as well as the time reduction factors for CyberArc are presented for 7 prostate and 2 brain cases. The dosimetric quality of the CyberArc plans are evaluated using conformity index, heterogeneity index, local confined normalized-mutual-information, and various clinically relevant dosimetric parameters. The results indicate that the CyberArc algorithm dramatically reduces the treatment time of CyberKnife plans while simultaneously preserving the dosimetric quality of the original plans.

  3. CyberArc: a non-coplanar-arc optimization algorithm for CyberKnife.

    PubMed

    Kearney, Vasant; Cheung, Joey P; McGuinness, Christopher; Solberg, Timothy D

    2017-06-26

    The goal of this study is to demonstrate the feasibility of a novel non-coplanar-arc optimization algorithm (CyberArc). This method aims to reduce the delivery time of conventional CyberKnife treatments by allowing for continuous beam delivery. CyberArc uses a 4 step optimization strategy, in which nodes, beams, and collimator sizes are determined, source trajectories are calculated, intermediate radiation models are generated, and final monitor units are calculated, for the continuous radiation source model. The dosimetric results as well as the time reduction factors for CyberArc are presented for 7 prostate and 2 brain cases. The dosimetric quality of the CyberArc plans are evaluated using conformity index, heterogeneity index, local confined normalized-mutual-information, and various clinically relevant dosimetric parameters. The results indicate that the CyberArc algorithm dramatically reduces the treatment time of CyberKnife plans while simultaneously preserving the dosimetric quality of the original plans.

  4. Convergent spray process for environmentally friendly coatings

    NASA Technical Reports Server (NTRS)

    Scarpa, Jack

    1995-01-01

    Conventional spray application processes have poor transfer efficiencies, resulting in an exorbitant loss in materials, solvents, and time. Also, with ever tightening Environmental Protection Agency (EPA) regulations and Occupational Safety and Health Administration requirements, the low transfer efficiencies have a significant impact on the quantities of materials and solvents that are released into the environment. High solids spray processes are also limited by material viscosities, thus requiring many passes over the surface to achieve a thickness in the 0.125 -inch range. This results in high application costs and a negative impact on the environment. Until recently, requirements for a 100 percent solid sprayable, environmentally friendly, lightweight thermal protection system that can be applied in a thick (greater than 0.125 inch) single-pass operation exceeded the capability of existing systems. Such coatings must be applied by hand lay-up techniques, especially for thermal and/or fire protection systems. The current formulation of these coatings has presented many problems such as worker safety, environmental hazards, waste, high cost, and application constraints. A system which can apply coatings without using hazardous materials would alleviate many of these problems. Potential applications include the aerospace thermal protective specialty coatings, chemical and petroleum industries that require fire-protection coatings that resist impact, chemicals, and weather. These markets can be penetrated by offering customized coatings applied by automated processes that are environmentally friendly.

  5. The Cyber War: Maintaining and Controlling the Key Cyber Terrain of the Cyberspace Domain

    DTIC Science & Technology

    2016-06-26

    solution strategy to assess options that will enable the commander to realize the Air Force’s cyber mission. Recommendations will be made that will...will present a solution to assist the JFC in achieving cyberspace dominance. Background In the modern world of advanced technology, control of...the solutions are: 1) timely identification of key cyber terrain, 2) accurate mapping of the cyber terrain, 3) defense of key cyber terrain, and 4

  6. Sources of Occupational Stress and Prevalence of Burnout and Clinical Distress Among U.S. Air Force Cyber Warfare Operators

    DTIC Science & Technology

    2013-01-01

    distress within the cyber warfare community. This study involved cyber warfare operators including active duty (n = 376) and civilian contractor and...revealed that when compared to civilian cyber warfare operators, active duty cyber warfare operators are more likely to suffer from the facets of...8217 write-in responses revealed cyber warfare operators attributed shift work, shift changes, and hours worked as the primary sources of high occupational

  7. International Cyber Incident Repository System: Information Sharing on a Global Scale

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Joyce, Amanda L.; Evans, PhD, Nathaniel; Tanzman, Edward A.

    According to the 2016 Internet Security Threat Report, the largest number of cyber attacks were recorded last year (2015), reaching a total of 430 million incidents throughout the world. As the number of cyber incidents increases, the need for information and intelligence sharing increases, as well. This fairly large increase in cyber incidents is driving the need for an international cyber incident data reporting system. The goal of the cyber incident reporting system is to make available shared and collected information about cyber events among participating international parties. In its 2014 report, Insurance Industry Working Session Readout Report-Insurance for CyberRelatedmore » Critical Infrastructure Loss: Key Issues, on the outcomes of a working session on cyber insurance, the U.S. Department of Homeland Security observed that “many participants cited the need for a secure method through which organizations could pool and share cyber incident information” and noted that one underwriter emphasized the importance of internationally harmonized data taxonomies. This cyber incident data reporting system could benefit all nations that take part in reporting incidents to provide a more common operating picture. In addition, this reporting system could allow for trending and anticipated attacks and could potentially benefit participating members by enabling them to get in front of potential attacks. The purpose of this paper is to identify options for consideration for such a system in fostering cooperative cyber defense.« less

  8. Situational Awareness as a Measure of Performance in Cyber Security Collaborative Work

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Malviya, Ashish; Fink, Glenn A.; Sego, Landon H.

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge in turn could lead to better preparation of cyber defenders in both military and civilian settings. We conducted proof of concept experimentation to collect data during the Pacific-rim Regional Collegiate Cyber Defense Competition (PRCCDC) and analyzed it to study the behavior of cyber defenders. We propose that situational awareness predicts performance of cyber security professionals, and in this paper we focus onmore » our collection and analysis of competition data to determine whether it supports our hypothesis. In addition to normal cyber data, we collected situational awareness and workload data and compared it against the performance of cyber defenders as indicated by their competition score. We conclude that there is a weak correlation between our measure of situational awareness and performance that we hope to exploit in further studies.« less

  9. USAF Cyber Capability Development: A Vision for Future Cyber Warfare & a Concept for Education of Cyberspace Leaders

    DTIC Science & Technology

    2009-04-01

    Significant and interrelated problems are hindering the Air Force’s development of cyber warfare capabilities. The first is a lack of awareness about...why the AF has chosen to take cyber warfare on as a core capability on par with air and space. The second stems from the lack of a commonly...the cyber capabilities needed in the future? The contributions of this research include a strategic vision for future cyber warfare capabilities that

  10. The Spectrum of Cyber Conflict from Hacking to Information Warfare: What is Law Enforcement’s Role?

    DTIC Science & Technology

    2001-04-01

    defined as cyber crime or —hacker“. Although this category of hacker includes many kinds of cyber criminals , from a DOD perspective, the motivation of a...perpetrator. 6 In his book, —Fighting Computer Crime“, Wiley identifies several types of cyber criminals . They range from pranksters who perpetrate...usually financial11 This first group of cyber criminals or —hackers“ can be categorized as Unintentional Cyber actors. Although they have a variety of

  11. Firing Room Remote Application Software Development

    NASA Technical Reports Server (NTRS)

    Liu, Kan

    2014-01-01

    The Engineering and Technology Directorate (NE) at National Aeronautics and Space Administration (NASA) Kennedy Space Center (KSC) is designing a new command and control system for the checkout and launch of Space Launch System (SLS) and future rockets. The purposes of the semester long internship as a remote application software developer include the design, development, integration, and verification of the software and hardware in the firing rooms, in particular with the Mobile Launcher (ML) Launch Accessories subsystem. In addition, a Conversion Fusion project was created to show specific approved checkout and launch engineering data for public-friendly display purposes.

  12. Feasibility Study on Applying Radiophotoluminescent Glass Dosimeters for CyberKnife SRS Dose Verification

    PubMed Central

    Hsu, Shih-Ming; Hung, Chao-Hsiung; Liao, Yi-Jen; Fu, Hsiao-Mei; Tsai, Jo-Ting

    2017-01-01

    CyberKnife is one of multiple modalities for stereotactic radiosurgery (SRS). Due to the nature of CyberKnife and the characteristics of SRS, dose evaluation of the CyberKnife procedure is critical. A radiophotoluminescent glass dosimeter was used to verify the dose accuracy for the CyberKnife procedure and validate a viable dose verification system for CyberKnife treatment. A radiophotoluminescent glass dosimeter, thermoluminescent dosimeter, and Kodak EDR2 film were used to measure the lateral dose profile and percent depth dose of CyberKnife. A Monte Carlo simulation for dose verification was performed using BEAMnrc to verify the measured results. This study also used a radiophotoluminescent glass dosimeter coupled with an anthropomorphic phantom to evaluate the accuracy of the dose given by CyberKnife. Measurements from the radiophotoluminescent glass dosimeter were compared with the results of a thermoluminescent dosimeter and EDR2 film, and the differences found were less than 5%. The radiophotoluminescent glass dosimeter has some advantages in terms of dose measurements over CyberKnife, such as repeatability, stability, and small effective size. These advantages make radiophotoluminescent glass dosimeters a potential candidate dosimeter for the CyberKnife procedure. This study concludes that radiophotoluminescent glass dosimeters are a promising and reliable dosimeter for CyberKnife dose verification with clinically acceptable accuracy within 5%. PMID:28046056

  13. Protecting Networks Via Automated Defense of Cyber Systems

    DTIC Science & Technology

    2016-09-01

    autonomics, and artificial intelligence . Our conclusion is that automation is the future of cyber defense, and that advances are being made in each of...SUBJECT TERMS Internet of Things, autonomics, sensors, artificial intelligence , cyber defense, active cyber defense, automated indicator sharing...called Automated Defense of Cyber Systems, built upon three core technological components: sensors, autonomics, and artificial intelligence . Our

  14. "Making Kind Cool": Parents' Suggestions for Preventing Cyber Bullying and Fostering Cyber Kindness

    ERIC Educational Resources Information Center

    Cassidy, Wanda; Brown, Karen; Jackson, Margaret

    2012-01-01

    Cyber bullying among youth is rapidly becoming a global phenomenon, as educators, parents and policymakers grapple with trying to curtail this negative and sometimes devastating behavior. Since most cyber bullying emanates from the home computer, parents can play an important role in preventing cyber bullying and in fostering a kinder online…

  15. Cyberbully and Victim Experiences of Pre-Service Teachers

    ERIC Educational Resources Information Center

    Tosun, Nilgün

    2016-01-01

    The aim of this study was to determine the prevalence of different types of cyber bullying, the ways in which cyber bullying occurred, whether the identity of cyber bullies were known, and reaction to being cyber bullied among pre-service teachers. Relationships between gender and likelihood of being a cyber bully/victim were also investigated.…

  16. A meta-analysis of sex differences in cyber-bullying behavior: the moderating role of age.

    PubMed

    Barlett, Christopher; Coyne, Sarah M

    2014-01-01

    The current research used meta-analysis to determine whether (a) sex differences emerged in cyber-bullying frequency, (b) if age moderated any sex effect, and (c) if any additional moderators (e.g., publication year and status, country and continent of data collection) influenced the sex effect. Theoretically, if cyber-bullying is considered a form of traditional bullying and aggression, males are likely to cyber-bully more than females. Conversely, if cyber-bullying is considered relational/indirect aggression, females will be slightly more likely to cyber-bully than males. Results from 122 effect size estimates showed that males were slightly more likely to cyber-bully than females; however, age moderated the overall effect. Specifically, females were more likely to report cyber-bullying during early to mid-adolescence than males, while males showed higher levels of cyber-bullying during later adolescence than females. Publication status and year and continent and country of data collection also moderated the overall effect. © 2014 Wiley Periodicals, Inc.

  17. Securing Cyberspace: Approaches to Developing an Effective Cyber-Security Strategy

    DTIC Science & Technology

    2011-05-15

    attackers, cyber - criminals or even teenage hackers. Protecting cyberspace is a national security priority. President Obama’s National Security...prefers to engage international law enforcement to investigate and catch cyber criminals .40 International cooperation could resolve jurisdictional...sheltered them. Similarly, a state that fails to prosecute cyber - criminals , or who gives safe haven to individuals or groups that conduct cyber-attacks

  18. Cyber Bullying: Overview and Strategies for School Counsellors, Guidance Officers, and All School Personnel

    ERIC Educational Resources Information Center

    Bhat, Christine Suniti

    2008-01-01

    Cyber bullying or bullying via information and communications technology tools such as the internet and mobile phones is a problem of growing concern with school-aged students. Cyber bullying actions may not take place on school premises, but detrimental effects are experienced by victims of cyber bullying in schools. Tools used by cyber bullies…

  19. Rumination mediates the association between cyber-victimization and depressive symptoms.

    PubMed

    Feinstein, Brian A; Bhatia, Vickie; Davila, Joanne

    2014-06-01

    The current study examined the 3-week prospective associations between cyber-victimization and both depressive symptoms and rumination. In addition, a mediation model was tested, wherein rumination mediated the association between cyber-victimization and depressive symptoms. Participants (N = 565 college-age young adults) completed online surveys at two time points 3 weeks apart. Results indicated that cyber-victimization was associated with increases in both depressive symptoms and rumination over time. Furthermore, results of the path analysis indicated that cyber-victimization was associated with increases in rumination over time, which were then associated with greater depressive symptoms, providing support for the proposed mediation effect for women, but not men. Findings extend previous correlational findings by demonstrating that cyber-victimization is associated with increases in symptomatology over time. Findings also suggest that the negative consequences of cyber-victimization extend beyond mental health problems to maladaptive emotion regulation. In fact, rumination may be a mechanism through which cyber-victimization influences mental health problems, at least for women. Mental health professionals are encouraged to assess cyber-victimization as part of standard victimization assessments and to consider targeting maladaptive emotion regulation in addition to mental health problems in clients who have experienced cyber-victimization.

  20. The Role of Technologies, Behaviors, Gender, and Gender Stereotype Traits in Adolescents' Cyber Aggression.

    PubMed

    Wright, Michelle F

    2017-03-01

    The present study focused on the impact of gender and gender stereotype traits (i.e., masculinity, femininity) on cyber aggression perpetration utilizing different technologies (i.e., social-networking sites, gaming consoles, mobile phones) and behaviors (i.e., cyber relational aggression, cyber verbal aggression, hacking). Participants included 233 eighth graders (108 female; M age = 13.26, SD = 0.36) from two middle schools in the Midwestern United States. Adolescents completed questionnaires on their endorsement of masculinity and femininity traits as well as how often they engaged in cyber aggression perpetration (i.e., cyber relational aggression, cyber verbal aggression, hacking) through mobile phones, social-networking sites, and gaming consoles. Findings indicated that boys and girls with more feminine traits engaged in more cyber relational aggression through social-networking sites and mobile phones, while boys and girls who endorsed more masculine traits perpetrated this behavior and cyber verbal aggression more often through online gaming. In addition, these boys and girls engaged in more hacking through all technologies when compared with girls and boys who reported more feminine traits. Results of this study indicate the importance of delineating gender stereotype traits, behaviors, and technologies when examining cyber aggression perpetration.

  1. Longitudinal associations between cyber-bullying perpetration and victimization and problem behavior and mental health problems in young Australians.

    PubMed

    Hemphill, Sheryl A; Kotevski, Aneta; Heerde, Jessica A

    2015-02-01

    To investigate associations between Grade 9 and 10 cyber-bullying perpetration and victimization and Grade 11 problem behavior and mental health problems after controlling for risk factors for these outcomes in the analyses. The sample comprised 927 students from Victoria, Australia who completed a modified version of the self-report Communities That Care Youth Survey in Grades 9-11 to report on risk factors, traditional and cyber-bullying perpetration and victimization, problem behavior, and mental health. Complete data on over 650 participants were analyzed. Five per cent of Grade 9 and 10 students reported cyber-bullying perpetration only, 6-8% reported victimization only, and 8-9% both cyber-bullied others and were cyber-bullied. Results showed that cyber-bullying others in Grade 10 was associated with theft in Grade 11, cyber-victimization in Grade 10 was linked with Grade 11 depressive symptoms, and Grade 10 cyber-bullying perpetration and victimization combined predicted Grade 11 school suspension and binge drinking. Prevention approaches that target traditional and cyber-bullying, and established risk factors are necessary. Such multi-faceted programs may also reduce problem behavior and mental health problems.

  2. Forage kochia: Friend or foe

    Treesearch

    Blair L. Waldron; R. Deane Harrison; N. Jerry Chatterton; Burke W. Davenport

    2001-01-01

    Perennial forage kochia (Kochia prostrata) is a halfshrub valuable for reclamation, fire breaks, and livestock and wildlife forage on semiarid and saline rangelands. Interest is mounting about this species, but some are concerned that it will become an invader of perennial communities. Only one cultivar (Immigrant) has been released in the United States. Eighty-one...

  3. Development of JSDF Cyber Warfare Defense Critical Capability

    DTIC Science & Technology

    2010-03-01

    attack identification capability is essential for a nation to defend her vital infrastructures against offensive cyber warfare . Although the necessity of...cyber-attack identification capability is quite clear, the Japans preparation against cyber warfare is quite limited.

  4. Some of Indonesian Cyber Law Problems

    NASA Astrophysics Data System (ADS)

    Machmuddin, D. D.; Pratama, B.

    2017-01-01

    Cyber regulation is very important to control human interaction within the Internet network in cyber space. On the surface, innovation development in science and technology facilitates human activity. But on the inside, innovation was controlled by new business model. In cyber business activities mingle with individual protection. By this condition, the law should keep the balance of the activities. Cyber law problems, were not particular country concern, but its global concern. This is a good opportunity for developing country to catch up with developed country. Beside this opportunity for talented people in law and technology is become necessity. This paper tries to describe cyber law in Indonesia. As a product of a developing country there are some of weakness that can be explained. Terminology and territory of cyber space is become interesting to discuss, because this two problems can give a broad view on cyber law in Indonesia.

  5. Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.

    PubMed

    Albahar, Marwan

    2017-01-05

    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as high as it is today, and this has created a lot of insecurity and fear. This study has focused on different aspects of cyber attacks and explored the reasons behind their increasing popularity among the terrorist organizations and state players. This study proposes an empirical model that can be used to estimate the risk levels associated with different types of cyber attacks and thereby provide a road map to conceptualize and formulate highly effective counter measures and cyber security policies.

  6. Department of Defenses Enhanced Requirement for Offensive Cyber Warfare Operations

    DTIC Science & Technology

    2010-04-01

    The Department of Defense (DoD) needs to further develop its offensive cyber warfare capabilities at all levels. In an asymmetric environment...battlefields. If the DoD does not prosecute offensive cyber warfare tactics then the DoD has effectively allowed a significant advantage to be given...offensive cyber warfare operations, These states utilize their cyber warfare capabilities to support their national, operational and strategic

  7. Cyber Defense Management

    DTIC Science & Technology

    2016-09-01

    manage cyber security is often a verymanual and labor intensive process. When a crisis hits, DoD responses range from highly automatedand instrumented...DSB Task Force Report on Cyber Defense Management September 2016 (U) This page intentionally blank REPORT OF THE DEFENSE SCIENCE BOARD STUDY ON Cyber ...DEFENSE FOR ACQUISITION, TECHNOLOGY & LOGISTICS SUBJECT: Final Report of the Defense Science Board (DSB) Task Force on Cyber Defense Management I am

  8. Reconstruction of Cyber and Physical Software Using Novel Spread Method

    NASA Astrophysics Data System (ADS)

    Ma, Wubin; Deng, Su; Huang, Hongbin

    2018-03-01

    Cyber and Physical software has been concerned for many years since 2010. Actually, many researchers would disagree with the deployment of traditional Spread Method for reconstruction of Cyber and physical software, which embodies the key principles reconstruction of cyber physical system. NSM(novel spread method), our new methodology for reconstruction of cyber and physical software, is the solution to all of these challenges.

  9. A Responsive Cyber Risk Ecosystem

    DTIC Science & Technology

    2017-01-19

    UNCLASSIFIED - Distribution A: Approved for public release; distribution unlimited AIR FORCE CYBERWORX REPORT 16-003: A RESPONSIVE CYBER RISK...right problem to solve and find meaningful solutions by exploring a wide range of possible answers to the design problem. For the Responsive Cyber ...Risk Dashboard Design Project, CyberWorx brought together a design team of 25 participants from UASFA and Industry to explore how cyber risk to AF

  10. Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glenn, Colleen; Sterbentz, Dane; Wright, Aaron

    With utilities in the U.S. and around the world increasingly moving toward smart grid technology and other upgrades with inherent cyber vulnerabilities, correlative threats from malicious cyber attacks on the North American electric grid continue to grow in frequency and sophistication. The potential for malicious actors to access and adversely affect physical electricity assets of U.S. electricity generation, transmission, or distribution systems via cyber means is a primary concern for utilities contributing to the bulk electric system. This paper seeks to illustrate the current cyber-physical landscape of the U.S. electric sector in the context of its vulnerabilities to cyber attacks,more » the likelihood of cyber attacks, and the impacts cyber events and threat actors can achieve on the power grid. In addition, this paper highlights utility perspectives, perceived challenges, and requests for assistance in addressing cyber threats to the electric sector. There have been no reported targeted cyber attacks carried out against utilities in the U.S. that have resulted in permanent or long term damage to power system operations thus far, yet electric utilities throughout the U.S. have seen a steady rise in cyber and physical security related events that continue to raise concern. Asset owners and operators understand that the effects of a coordinated cyber and physical attack on a utility’s operations would threaten electric system reliability–and potentially result in large scale power outages. Utilities are routinely faced with new challenges for dealing with these cyber threats to the grid and consequently maintain a set of best practices to keep systems secure and up to date. Among the greatest challenges is a lack of knowledge or strategy to mitigate new risks that emerge as a result of an exponential rise in complexity of modern control systems. This paper compiles an open-source analysis of cyber threats and risks to the electric grid, utility best practices for prevention and response to cyber threats, and utility suggestions about how the federal government can aid utilities in combating and mitigating risks.« less

  11. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyers, C A; Powers, S S; Faissol, D M

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform futuremore » studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.« less

  12. Using agility to combat cyber attacks.

    PubMed

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  13. Large-scale, thick, self-assembled, nacre-mimetic brick-walls as fire barrier coatings on textiles

    NASA Astrophysics Data System (ADS)

    Das, Paramita; Thomas, Helga; Moeller, Martin; Walther, Andreas

    2017-01-01

    Highly loaded polymer/clay nanocomposites with layered structures are emerging as robust fire retardant surface coatings. However, time-intensive sequential deposition processes, e.g. layer-by-layer strategies, hinders obtaining large coating thicknesses and complicates an implementation into existing technologies. Here, we demonstrate a single-step, water-borne approach to prepare thick, self-assembling, hybrid fire barrier coatings of sodium carboxymethyl cellulose (CMC)/montmorillonite (MTM) with well-defined, bioinspired brick-wall nanostructure, and showcase their application on textile. The coating thickness on the textile is tailored using different concentrations of CMC/MTM (1-5 wt%) in the coating bath. While lower concentrations impart conformal coatings of fibers, thicker continuous coatings are obtained on the textile surface from highest concentration. Comprehensive fire barrier and fire retardancy tests elucidate the increasing fire barrier and retardancy properties with increasing coating thickness. The materials are free of halogen and heavy metal atoms, and are sourced from sustainable and partly even renewable building blocks. We further introduce an amphiphobic surface modification on the coating to impart oil and water repellency, as well as self-cleaning features. Hence, our study presents a generic, environmentally friendly, scalable, and one-pot coating approach that can be introduced into existing technologies to prepare bioinspired, thick, fire barrier nanocomposite coatings on diverse surfaces.

  14. CYBER-205 Devectorizer

    NASA Technical Reports Server (NTRS)

    Lakeotes, Christopher D.

    1990-01-01

    DEVECT (CYBER-205 Devectorizer) is CYBER-205 FORTRAN source-language-preprocessor computer program reducing vector statements to standard FORTRAN. In addition, DEVECT has many other standard and optional features simplifying conversion of vector-processor programs for CYBER 200 to other computers. Written in FORTRAN IV.

  15. Cyber warfare: Armageddon in a Teacup?

    DTIC Science & Technology

    2009-12-11

    Security concerns over the growing capability of Cyber Warfare are in the forefront of national policy and security discussions. In order to enable a...realistic discussion of the topic this thesis seeks to analyze demonstrated Cyber Warfare capability and its ability to achieve strategic political...objectives. This study examines Cyber Warfare conducted against Estonia in 2007, Georgia in 2008, and Israel in 2008. In all three cases Cyber Warfare did

  16. The Characterization and Measurement of Cyber Warfare, Spring 2008 - Project 08-01

    DTIC Science & Technology

    2008-05-01

    Global Innovation and Strategy Center The Characterization and Measurement of Cyber Warfare Spring 2008 – Project 08-01 May 2008...and Measurement of Cyber Warfare N/A N/A N/A 08-01Dobitz, Kyle Haas, Brad Holtje, Michael Jokerst, Amanda Ochsner, Geoff Silva, Stephanie...research team as critical for purposes of cyber act characterization: Motivation, Intent, Target, Effects, and Actors. cyberspace, cyber warfare , targets

  17. At the Crossroads of Cyber Warfare: Signposts for the Royal Australian Air Force

    DTIC Science & Technology

    2011-06-01

    At the Crossroads of Cyber Warfare : Signposts for the Royal Australian Air Force by Craig Stallard, Squadron leader, Royal...in the conduct of cyber warfare . The 2009 Defence White Paper provided some clarity by indentifying cyber warfare as critical to the maintenance...of national security, but left open the most important issue: should cyber warfare be a joint engagement or a service oriented fight? The RAAF

  18. Cyber Warfare: New Character with Strategic Results

    DTIC Science & Technology

    2013-03-01

    The advent of cyber warfare has sparked a debate amongst theorists as to whether timeless Clausewitzian principles remain true in the 21st century...Violence, uncertainty, and rationality still accurately depict the nature of cyber warfare , however, its many defining attributes and means by which...this style of warfare is conducted has definitively changed the character of war. Although cyber warfare is contested in the cyber domain, it often

  19. Medical Differential Diagnosis (MDD) as the Architectural Framework for a Knowledge Model: A Vulnerability Detection and Threat Identification Methodology for Cyber-Crime and Cyber-Terrorism

    ERIC Educational Resources Information Center

    Conley-Ware, Lakita D.

    2010-01-01

    This research addresses a real world cyberspace problem, where currently no cross industry standard methodology exists. The goal is to develop a model for identification and detection of vulnerabilities and threats of cyber-crime or cyber-terrorism where cyber-technology is the vehicle to commit the criminal or terrorist act (CVCT). This goal was…

  20. Defense Science Board Task Force Report on Cyber Defense Management

    DTIC Science & Technology

    2016-09-01

    manage cyber security is often a verymanual and labor intensive process. When a crisis hits, DoD responses range from highly automatedand instrumented...DSB Task Force Report on Cyber Defense Management September 2016 (U) This page intentionally blank REPORT OF THE DEFENSE SCIENCE BOARD STUDY ON Cyber ...DEFENSE FOR ACQUISITION, TECHNOLOGY & LOGISTICS SUBJECT: Final Report of the Defense Science Board (DSB) Task Force on Cyber Defense Management I am

  1. Literature Review on Modeling Cyber Networks and Evaluating Cyber Risks.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kelic, Andjelka; Campbell, Philip L

    The National Infrastructure Simulations and Analysis Center (NISAC) conducted a literature review on modeling cyber networks and evaluating cyber risks. The literature review explores where modeling is used in the cyber regime and ways that consequence and risk are evaluated. The relevant literature clusters in three different spaces: network security, cyber-physical, and mission assurance. In all approaches, some form of modeling is utilized at varying levels of detail, while the ability to understand consequence varies, as do interpretations of risk. This document summarizes the different literature viewpoints and explores their applicability to securing enterprise networks.

  2. Bullying prevalence across contexts: a meta-analysis measuring cyber and traditional bullying.

    PubMed

    Modecki, Kathryn L; Minchin, Jeannie; Harbaugh, Allen G; Guerra, Nancy G; Runions, Kevin C

    2014-11-01

    Bullying involvement in any form can have lasting physical and emotional consequences for adolescents. For programs and policies to best safeguard youth, it is important to understand prevalence of bullying across cyber and traditional contexts. We conducted a thorough review of the literature and identified 80 studies that reported corresponding prevalence rates for cyber and traditional bullying and/or aggression in adolescents. Weighted mean effect sizes were calculated, and measurement features were entered as moderators to explain variation in prevalence rates and in traditional-cyber correlations within the sample of studies. Prevalence rates for cyber bullying were lower than for traditional bullying, and cyber and traditional bullying were highly correlated. A number of measurement features moderated variability in bullying prevalence; whereas a focus on traditional relational aggression increased correlations between cyber and traditional aggressions. In our meta-analytic review, traditional bullying was twice as common as cyber bullying. Cyber and traditional bullying were also highly correlated, suggesting that polyaggression involvement should be a primary target for interventions and policy. Results of moderation analyses highlight the need for greater consensus in measurement approaches for both cyber and traditional bullying. Copyright © 2014 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  3. 78 FR 46997 - Agency Information Collection Activities: Submission for Review; Information Collection Request...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-02

    ... (DHS), Science and Technology, CyberForensics Electronic Technology Clearinghouse (CyberFETCH) Program... public to comment on data collection forms for the CyberForensics Electronic Technology Clearinghouse... for providing a collaborative environment for cyber forensics practitioners from law enforcement...

  4. Space and Cyber: Shared Challenges, Shared Opportunities

    DTIC Science & Technology

    2011-11-15

    adversaries to have effective capabilities against networks and computer systems, unlike those anywhere else—here, cyber criminals , proxies for hire, and...or unintentional, conditions can impact our ability to use space and cyber capabilities. As the tools and techniques developed by cyber criminals continue

  5. 76 FR 43696 - Nationwide Cyber Security Review (NCSR) Assessment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-21

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR... Protection and Programs Directorate (NPPD), Office of Cybersecurity and Communications (CS&C), National Cyber Security Division (NCSD), Cyber Security Evaluation Program (CSEP), will submit the following Information...

  6. Examining Cyber Command Structures

    DTIC Science & Technology

    2015-03-01

    domains, cyber, command and control, USCYBERCOM, combatant command, cyber force PAGES 65 16. PRICE CODE 17. SECURITY 18. SECURITY 19. SECURITY 20...USCYBERCOM, argue for the creation of a stand-alone cyber force.11 They claim that the military’s tradition-oriented and inelastic nature make the

  7. Will electrical cyber-physical interdependent networks undergo first-order transition under random attacks?

    NASA Astrophysics Data System (ADS)

    Ji, Xingpei; Wang, Bo; Liu, Dichen; Dong, Zhaoyang; Chen, Guo; Zhu, Zhenshan; Zhu, Xuedong; Wang, Xunting

    2016-10-01

    Whether the realistic electrical cyber-physical interdependent networks will undergo first-order transition under random failures still remains a question. To reflect the reality of Chinese electrical cyber-physical system, the "partial one-to-one correspondence" interdependent networks model is proposed and the connectivity vulnerabilities of three realistic electrical cyber-physical interdependent networks are analyzed. The simulation results show that due to the service demands of power system the topologies of power grid and its cyber network are highly inter-similar which can effectively avoid the first-order transition. By comparing the vulnerability curves between electrical cyber-physical interdependent networks and its single-layer network, we find that complex network theory is still useful in the vulnerability analysis of electrical cyber-physical interdependent networks.

  8. A cognitive and economic decision theory for examining cyber defense strategies.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bier, Asmeret Brooke

    Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participantsmore » interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.« less

  9. Display Developer for Firing Room Applications

    NASA Technical Reports Server (NTRS)

    Bowman, Elizabeth A.

    2013-01-01

    The firing room at Kennedy Space Center (KSC) is responsible for all NASA human spaceflight launch operations, therefore it is vital that all displays within the firing room be properly tested, up-to-date, and user-friendly during a launch. The Ground Main Propulsion System (GMPS) requires a number of remote displays for Vehicle Integration and Launch (VIL) Operations at KSC. My project is to develop remote displays for the GMPS using the Display Services and Framework (DSF) editor. These remote displays will be based on model images provided by GMPS through PowerPoint. Using the DSF editor, the PowerPoint images can be recreated with active buttons associated with the correct Compact Unique Identifiers (CUIs). These displays will be documented in the Software Requirements and Design Specifications (SRDS) at the 90% GMPS Design Review. In the future, these remote displays will be available for other developers to improve, edit, or add on to so that the display may be incorporated into the firing room to be used for launches.

  10. Adolescent predictors of young adult cyber-bullying perpetration and victimization among Australian youth

    PubMed Central

    Hemphill, Sheryl A.; Heerde, Jessica A.

    2014-01-01

    Purpose The purpose of the current paper was to examine the adolescent risk and protective factors (at the individual, peer group, and family level) for young adult cyber-bullying perpetration and victimization. Methods Data from 2006 (Grade 9) to 2010 (young adulthood) were analyzed from a community sample of 927 Victorian students originally recruited as a state-wide representative sample in Grade 5 (age 10–11 years) in 2002 and followed up to age 18–19 years in 2010 (N = 809). Participants completed a self-report survey on adolescent risk and protective factors and traditional and cyber-bullying perpetration and victimization, and young adult cyber-bullying perpetration and victimization. Results As young adults, 5.1% self-reported cyber-bullying perpetration only, 5.0% cyber-bullying victimization only, and 9.5% reported both cyber-bullying perpetration and victimization. In fully adjusted logistic regression analyses, the adolescent predictors of cyber-bullying perpetration only were traditional bullying perpetration, traditional bullying perpetration and victimization, and poor family management. For young adulthood cyber-bullying victimization only, the adolescent predictor was emotion control. The adolescent predictors for young adult cyber-bullying perpetration and victimization were traditional bullying perpetration and cyber-bullying perpetration and victimization. Conclusions Based on the results of this study, possible targets for prevention and early intervention are reducing adolescent involvement in (traditional or cyber-) bullying through the development of social skills and conflict resolution skills. In addition, another important prevention target is to support families with adolescents to ensure they set clear rules and monitor adolescent’s behavior. Universal programs that assist adolescents to develop skills in emotion control are warranted. PMID:24939014

  11. A continuous arc delivery optimization algorithm for CyberKnife m6.

    PubMed

    Kearney, Vasant; Descovich, Martina; Sudhyadhom, Atchar; Cheung, Joey P; McGuinness, Christopher; Solberg, Timothy D

    2018-06-01

    This study aims to reduce the delivery time of CyberKnife m6 treatments by allowing for noncoplanar continuous arc delivery. To achieve this, a novel noncoplanar continuous arc delivery optimization algorithm was developed for the CyberKnife m6 treatment system (CyberArc-m6). CyberArc-m6 uses a five-step overarching strategy, in which an initial set of beam geometries is determined, the robotic delivery path is calculated, direct aperture optimization is conducted, intermediate MLC configurations are extracted, and the final beam weights are computed for the continuous arc radiation source model. This algorithm was implemented on five prostate and three brain patients, previously planned using a conventional step-and-shoot CyberKnife m6 delivery technique. The dosimetric quality of the CyberArc-m6 plans was assessed using locally confined mutual information (LCMI), conformity index (CI), heterogeneity index (HI), and a variety of common clinical dosimetric objectives. Using conservative optimization tuning parameters, CyberArc-m6 plans were able to achieve an average CI difference of 0.036 ± 0.025, an average HI difference of 0.046 ± 0.038, and an average LCMI of 0.920 ± 0.030 compared with the original CyberKnife m6 plans. Including a 5 s per minute image alignment time and a 5-min setup time, conservative CyberArc-m6 plans achieved an average treatment delivery speed up of 1.545x ± 0.305x compared with step-and-shoot plans. The CyberArc-m6 algorithm was able to achieve dosimetrically similar plans compared to their step-and-shoot CyberKnife m6 counterparts, while simultaneously reducing treatment delivery times. © 2018 American Association of Physicists in Medicine.

  12. Recommendations for Model Driven Paradigms for Integrated Approaches to Cyber Defense

    DTIC Science & Technology

    2017-03-06

    analogy (e.g., Susceptible, Infected, Recovered [SIR]) • Abstract wargaming: game -theoretic model of cyber conflict without modeling the underlying...malware. 3.7 Abstract Wargaming Here, a game -theoretic process is modeled with moves and effects inspired by cyber conflict but without modeling the...underlying processes of cyber attack and defense. Examples in literature include the following: • Cho J-H, Gao J. Cyber war game in temporal networks

  13. CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE OFFENSIVE USE OF CYBER

    DTIC Science & Technology

    2015-10-01

    AIR COMMAND AND STAFF COLLEGE DISTANCE LEARNING AIR UNIVERSITY CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE...order to prevent catastrophic second and third order effects. Rule 43 “prohibits means or methods of cyber warfare that indiscriminate by nature...Means and methods of cyber warfare are indiscriminate by nature if they cannot be: directed at a specific military objective, or limited in their

  14. Initial Report of the Deans Cyber Warfare Ad Hoc Committee

    DTIC Science & Technology

    2011-12-22

    in a cyber warfare environment. Among the more notable recent developments have been the establishment of a new Cyber Warfare Command (USCYBERCOM) at...information-warfare-centric organization. Clearly, future Naval Academy graduates will be expected to know more about cyber warfare than those we have...graduated in the past. The Academic Dean and Provost tasked an ad hoc committeethe Cyber Warfare ad hoc Committeeto examine how USNA can best ensure that

  15. Anonymous As a Cyber Tribe: A New Model for Complex, Non-State Cyber Actors

    DTIC Science & Technology

    2015-05-01

    personas. Only then can cyber strategists exercise the required amount of cultural relativism needed to influence complex, and sometimes disturbing...that runs counter to their professional ethic ? When cyber tribes employ atrocity to create cultural barriers, how will planners remain focused on...as a cyber actor’s motivation? Meeting these challenges requires new levels of cultural relativism —the understanding of a “culture or a cultural

  16. Tactical Cyber: Building A Strategy For Cyber Support To Corps And Below

    DTIC Science & Technology

    Future U.S. Army cyber operations will need to be conducted jointly and at all echelons and must include both defensive and offensive components.1...The Army is now developing doctrine, concepts, and capabilities to conduct and support tactical cyber operations. We propose the following vision...statement: The Army will be able to employ organic cyber capabilities at the tactical echelon with dedicated personnel in support of tactical units while

  17. CYBER: CHANGING THE LANDSCAPE OF FOREIGN INTERVENTION IN DEMOCRATIC ELECTIONS

    DTIC Science & Technology

    than the costs); and 3) the methods and tools for intervening are readily available. Cyber has had a significant impact on all three of the components...significant domestic actor and can act unilaterally to influence public opinion. Second, cyber lowers both the actual and perceived costs of...intervention. Finally, cyber methods and tools are available to almost anyone at any level. Cyber has lowered the barrier to electoral intervention. As a

  18. Structural Causes and Cyber Effects: A Response to Our Critics

    DTIC Science & Technology

    2015-01-01

    the incident, saying “North Korea’s attack on [Sony] reaf- firms that cyber threats pose one of the gravest national security dangers to the United...around the world to strengthen cyber - security , promote norms of acceptable state behavior, uphold freedom of expression, and ensure that the Internet... cyber working group that made progress toward “interna- tional cyberspace rules, and measures to boost dialogue and cooperation on cyber security .”15

  19. Confronting the Pedagogical Challenge of Cyber Safety

    ERIC Educational Resources Information Center

    Hanewald, Ria

    2008-01-01

    Cyber violence and the antidote of cyber safety are fast becoming a global concern for governments, educational authorities, teachers, parents and children alike. Despite substantial funding for information dissemination on preventative strategies and the development of electronic responses to hinder perpetrators, the phenomenon of cyber violence…

  20. Establishing a Cyber Warrior Force

    DTIC Science & Technology

    2004-09-01

    Cyber Warfare is widely touted to be the next generation of warfare. As America’s reliance on automated systems and information technology increases...so too does the potential vulnerability to cyber attack. Nation and non-nation states are developing the capability to wage cyber warfare . Historically

  1. The Cyber Aggression in Relationships Scale: A New Multidimensional Measure of Technology-Based Intimate Partner Aggression.

    PubMed

    Watkins, Laura E; Maldonado, Rosalita C; DiLillo, David

    2018-07-01

    The purpose of this study was to develop and provide initial validation for a measure of adult cyber intimate partner aggression (IPA): the Cyber Aggression in Relationships Scale (CARS). Drawing on recent conceptual models of cyber IPA, items from previous research exploring general cyber aggression and cyber IPA were modified and new items were generated for inclusion in the CARS. Two samples of adults 18 years or older were recruited online. We used item factor analysis to test the factor structure, model fit, and invariance of the measure structure across women and men. Results confirmed that three-factor models for both perpetration and victimization demonstrated good model fit, and that, in general, the CARS measures partner cyber aggression similarly for women and men. The CARS also demonstrated validity through significant associations with in-person IPA, trait anger, and jealousy. Findings suggest the CARS is a useful tool for assessing cyber IPA in both research and clinical settings.

  2. An Examination of the Partner Cyber Abuse Questionnaire in a College Student Sample.

    PubMed

    Wolford-Clevenger, Caitlin; Zapor, Heather; Brasfield, Hope; Febres, Jeniimarie; Elmquist, JoAnna; Brem, Meagan; Shorey, Ryan C; Stuart, Gregory L

    2016-01-01

    To examine the factor structure and convergent validity of a newly developed measure of an understudied form of partner abuse, cyber abuse, and to examine the prevalence of, and gender differences in, victimization by cyber abuse. College students in a dating relationship ( N = 502) completed the Partner Cyber Abuse Questionnaire (Hamby, 2013), as well as measures of partner abuse victimization and depression. Using exploratory factor analysis, we determined a one-factor solution was the most statistically and conceptually best fitting model. The cyber abuse victimization factor was correlated with depressive symptoms and physical, psychological, and sexual partner abuse victimization, supporting the convergent validity of the measure. The overall prevalence of victimization by cyber abuse was 40%, with victimization by specific acts ranging from 2-31%. Men and women did not differ in their victimization by cyber abuse. Cyber abuse is prevalent among college students and occurs concurrently with other partner abuse forms and depressive symptoms. Given the interrelated nature of partner abuse forms, prevention and intervention programs should address partner abuse occurring in-person and through technology. Cyber abuse should also be considered in the conceptualization and measurement of partner abuse to more fully understand this social problem.

  3. ECO-Report - Fire recovery in the Bitterroot: "It’s a lot of work!"

    Treesearch

    Janie Canton-Thompson; Sharon Ritter; Dave Campbell; Julie Schreck; Peter Kolb; Brooke Thompson; Hans Zuuring; Alan Watson; Yvette Ortega; Kevin McKelvey; Elaine Kennedy Sutherland; Greg Jones

    2002-01-01

    ECO-Report is an annual Rocky Mountain Research Station (RMRS) publication which contains a set of articles showcasing the Bitterroot Ecosystem Management Research Project (BEMRP) research projects and activities. The articles are concise, user-friendly, and designed to inform a broad range of audiences interested in ecosystem management. Articles featured in...

  4. Oil in the Water, Fire in the Sky: Responding to Technological/Environmental Disasters

    ERIC Educational Resources Information Center

    Lazarus, Philip J.; Sulkowski, Michael L.

    2010-01-01

    On April 20, 2010, a massive explosion killed 11 workers on the Deepwater Horizon oil rig. Survivors of this explosion recounted terrifying near-death experiences and mourned the loss of coworkers and friends who had perished. Shock and grief spread through small coastal communities composed mostly of fishers and oil workers. However, this was…

  5. Fires. A Joint Publication for U.S. Artillery Professionals. March - April 2010

    DTIC Science & Technology

    2010-03-01

    than 20 kilometers in range. The radar is refreshed once a second and can be equipped with a number of discriminators to include friendly or foe...political life. But their efforts will be worth it, because the Afghan people are with us, and if we work with them, breaking bread and suffering through

  6. Addressing Human Factors Gaps in Cyber Defense

    DTIC Science & Technology

    2016-09-23

    Factors Gaps in Cyber Defense 5a. CONTRACT NUMBER FA8650-14-D-6501-0009 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Alex... Cyber security is a high-ranking national priority that is only likely to grow as we become more dependent on cyber systems. From a research perspective...currently available work often focuses solely on technological aspects of cyber , acknowledging the human in passing, if at all. In recent years, the

  7. WHEN NORMS FAIL: NORTH KOREA AND CYBER AS AN ELEMENT OF STATECRAFT

    DTIC Science & Technology

    2017-04-06

    use these increased cyber capabilities in attempts to wield greater influence in statecraft, cyber tools have not lived up to the hype of the great... influenced by, the cyber domain. A 2017 U.S. Defense Science Board report recognizes the significant economic, social, and military advantages the U.S. gains...reliant upon or connected to the internet, look to cyber to provide them a disproportionate level of influence in international affairs. The lack of

  8. Interoceptive sensitivity as a proxy for emotional intensity and its relationship with perseverative cognition

    PubMed Central

    Lugo, Ricardo G; Helkala, Kirsi; Knox, Benjamin J; Jøsok, Øyvind; Lande, Natalie M; Sütterlin, Stefan

    2018-01-01

    Background Technical advancement in military cyber defense poses increased cognitive demands on cyber officers. In the cyber domain, the influence of emotion on decision-making is rarely investigated. The purpose of this study was to assess psychophysiological correlation with perseverative cognitions during emotionally intensive/stressful situations in cyber military personnel. In line with parallel research on clinical samples high on perseverative cognition, we expected a decreased interoceptive sensitivity in officers with high levels of perseverative cognition. Method We investigated this association in a sample of 27 cyber officer cadets. Results Contrary to our hypothesis, there was no relationship between the factors. Discussion Cyber officers might display characteristics not otherwise found in general populations. The cyber domain may lead to a selection process that attracts different profiles of cognitive and emotional processing. PMID:29296103

  9. Adapting Unconventional Warfare Doctrine to Cyberspace Operations: An Examination of Hacktivist Based Insurgencies

    DTIC Science & Technology

    2015-06-12

    Unconventional Warfare, Cyberspace Operations, Cyber Warfare , Hacktivism, China, Russia, Georgia, Estonia, Umbrella Revolution, UW, Cyber, Guerilla, Hacktivist...6 Cyber Warfare ............................................................................................................. 7...Internet, and cyber warfare , the nature of the human element in cyberspace exhibits only a scientific advancement in the evolution of warfare, not a

  10. Developing a Hybrid Virtualization Platform Design for Cyber Warfare Training and Education

    DTIC Science & Technology

    2010-06-01

    CYBER WARFARE TRAINING AND EDUCATION THESIS Kyle E. Stewart 2nd...Government. AFIT/GCE/ENG/10-06 DEVELOPING A HYBRID VIRTUALIZATION PLATFORM DESIGN FOR CYBER WARFARE TRAINING...APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT/GCE/ENG/10-06 DEVELOPING A HYBRID VIRTUALIZATION PLATFORM DESIGN FOR CYBER WARFARE

  11. LESSONS FROM THE FRONT: A CASE STUDY OF RUSSIAN CYBER WARFARE

    DTIC Science & Technology

    2015-12-01

    Lessons From The Front: A Case Study Of Russian Cyber Warfare looks to capitalize on the lessons learned from the alleged Russian cyber-offensive on...through the careful analysis and comparison of two disparate conflicts related by their collision with Russian cyber - warfare . Following case study

  12. Coming Soon: More Cyber Careers?

    Science.gov Websites

    exploring the possibility of creating a cyber career field for Army civilians," Lt. Gen. Edward C Programs and Posture," April 14. Establishing a cyber career management field for civilians may be working to implement a cyber career management field for enlisted personnel that will encompass accessions

  13. 78 FR 79411 - Announcement of Competition Under the America COMPETES Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-30

    ... announces the Cyber Grand Challenge (CGC), a prize competition under 15 U.S.C. 3719, the America COMPETES... cyber defense systems. The CGC seeks to engender a new generation of autonomous cyber defense... experts. FOR FURTHER INFORMATION CONTACT: All questions regarding the competition may be sent to Cyber...

  14. 75 FR 2187 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-14

    ... Review: New collection. Title: Authorized Cyber Assistant Host Application. Form: Not yet assigned. Description: The form is used by a business to apply to become an Authorized Cyber Assistant Host. Information... become a Cyber Assistant Host. Cyber Assistant is a software program that assists in the preparation of...

  15. 78 FR 6807 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-31

    ... Cyber Security Trade Mission to Saudi Arabia and Kuwait, September 28-October 1, 2013 AGENCY... coordinating and sponsoring an executive-led Critical Infrastructure Protection and Cyber Security mission to... on the cyber security, critical infrastructure protection, and emergency management, ports of entry...

  16. Cyber High School Students' Transition to a Traditional University

    ERIC Educational Resources Information Center

    Gracey, Dorothy M.

    2010-01-01

    This mixed-method study identifies cyber high school graduates' perceptions of the effect of a cyber high school education on successful transition to a traditional university. The study examined students' perceptions of the advantages and disadvantages their cyber education experience contributed to their academic and social transition to…

  17. Cyber-Threat Assessment for the Air Traffic Management System: A Network Controls Approach

    NASA Technical Reports Server (NTRS)

    Roy, Sandip; Sridhar, Banavar

    2016-01-01

    Air transportation networks are being disrupted with increasing frequency by failures in their cyber- (computing, communication, control) systems. Whether these cyber- failures arise due to deliberate attacks or incidental errors, they can have far-reaching impact on the performance of the air traffic control and management systems. For instance, a computer failure in the Washington DC Air Route Traffic Control Center (ZDC) on August 15, 2015, caused nearly complete closure of the Centers airspace for several hours. This closure had a propagative impact across the United States National Airspace System, causing changed congestion patterns and requiring placement of a suite of traffic management initiatives to address the capacity reduction and congestion. A snapshot of traffic on that day clearly shows the closure of the ZDC airspace and the resulting congestion at its boundary, which required augmented traffic management at multiple locations. Cyber- events also have important ramifications for private stakeholders, particularly the airlines. During the last few months, computer-system issues have caused several airlines fleets to be grounded for significant periods of time: these include United Airlines (twice), LOT Polish Airlines, and American Airlines. Delays and regional stoppages due to cyber- events are even more common, and may have myriad causes (e.g., failure of the Department of Homeland Security systems needed for security check of passengers, see [3]). The growing frequency of cyber- disruptions in the air transportation system reflects a much broader trend in the modern society: cyber- failures and threats are becoming increasingly pervasive, varied, and impactful. In consequence, an intense effort is underway to develop secure and resilient cyber- systems that can protect against, detect, and remove threats, see e.g. and its many citations. The outcomes of this wide effort on cyber- security are applicable to the air transportation infrastructure, and indeed security solutions are being implemented in the current system. While these security solutions are important, they only provide a piecemeal solution. Particular computers or communication channels are protected from particular attacks, without a holistic view of the air transportation infrastructure. On the other hand, the above-listed incidents highlight that a holistic approach is needed, for several reasons. First, the air transportation infrastructure is a large scale cyber-physical system with multiple stakeholders and diverse legacy assets. It is impractical to protect every cyber- asset from known and unknown disruptions, and instead a strategic view of security is needed. Second, disruptions to the cyber- system can incur complex propagative impacts across the air transportation network, including its physical and human assets. Also, these implications of cyber- events are exacerbated or modulated by other disruptions and operational specifics, e.g. severe weather, operator fatigue or error, etc. These characteristics motivate a holistic and strategic perspective on protecting the air transportation infrastructure from cyber- events. The analysis of cyber- threats to the air traffic system is also inextricably tied to the integration of new autonomy into the airspace. The replacement of human operators with cyber functions leaves the network open to new cyber threats, which must be modeled and managed. Paradoxically, the mitigation of cyber events in the airspace will also likely require additional autonomy, given the fast time scale and myriad pathways of cyber-attacks which must be managed. The assessment of new vulnerabilities upon integration of new autonomy is also a key motivation for a holistic perspective on cyber threats.

  18. Characterization of tea polyphenols as potential environment-friendly fire retardants

    NASA Astrophysics Data System (ADS)

    Yao, Fengqi; Zhai, Chunjie; Wang, Haihui; Tao, Junjun

    2018-02-01

    In this work we investigated the oxidation properties of tea polyphenols and their potential as the fire retardants. Two types of tea polyphenols were adopted, which were extracted from red tea and green tea leaves, respectively. Their macroscopic performance during pyrolysis and oxidation at elevated temperatures were examined by using a heating furnace. Mass change, heat evolution and gas products of tea polyphenols during heating in air were also monitored by using a thermo-gravimetric analyzer (TGA) integrated with a differential scanning calorimeter (DSC) in conjunction with online Fourier Transform Infrared Spectroscopy (FTIR) and mass spectroscopy (MS). A tea polyphenol sample first becomes a brown semi-fluid after heating, and gradually turns into highly-porous black chars with significantly expanded volume. By raising the temperature to ∼550 °C at a rate of 10 °C/min, the mass of a sample reduces by nearly 70% to form a large quantity of inert gases that are mainly composed of H2O and CO2. It was found that the aerial oxidation products of tea polyphenols in the solid phase possess good heat insulation property; meanwhile, the substantial release of a lot of water and its evaporation during oxidation of tea polyphenols removes a large amount of heat from a sample located in a heating environment. The heat insulation of tea polyphenols may withstand up to 550 °C. The present work confirms tea polyphenols as potential superior and environment-friendly fire retardants.

  19. Cyber ACTS/SAASS: A Second Year of Command and Staff College for the Future Leaders of Our Cyber Forces

    DTIC Science & Technology

    2009-01-01

    objectives. The Air Force is struggling to determine the best way of developing offensive and defensive capabilities for cyber warfare . Our warfighting...education (IDE) cyber warfare program at the Air Force Institute of Technology (AFIT), located at Wright-Patterson AFB, Ohio. I propose that the Air...Force create a two-year professional military education (PME) path consisting of ACSC followed by AFIT’s cyber warfare program, paralleling the current path of ACSC followed by SAASS.

  20. Leadership of Cyber Warriors: Enduring Principles and New Directions

    DTIC Science & Technology

    2011-07-11

    cyber warfare threat against the United States, the creation of United States Cyber Command and the designation of cyberspace as a warfighting domain now necessitate study of the attributes of successful cyber warfare leaders and the leadership techniques required to successfully lead cyber warriors. In particular, we must develop an understanding of where traditional kinetic leadership paradigms succeed, where they fail, and where new techniques must be adopted. Leadership is not a one size fits all endeavor. The capabilities and characteristics of

  1. CyberPetri at CDX 2016: Real-time Network Situation Awareness

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Arendt, Dustin L.; Best, Daniel M.; Burtner, Edwin R.

    CyberPetri is a novel visualization technique that provides a flexible map of the network based on available characteristics, such as IP address, operating system, or service. Previous work introduced CyberPetri as a visualization feature in Ocelot, a network defense tool that helped security analysts understand and respond to an active defense scenario. In this paper we present a case study in which we use the CyberPetri visualization technique to support real-time situation awareness during the 2016 Cyber Defense Exercise.

  2. Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT)

    DTIC Science & Technology

    2016-07-27

    Validation of the Air Force Cyber Intruder Alert Testbed (CIAT) 5a. CONTRACT NUMBER FA8650-16-C-6722 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...network analysts. Therefore, a new cyber STE focused on network analysts called the Air Force Cyber Intruder Alert Testbed (CIAT) was developed. This...Prescribed by ANSI Std. Z39-18 Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT) Gregory Funke, Gregory Dye, Brett Borghetti

  3. Recruiting the Cyber Leader: An Evaluation of the Human Resource Model Used for Recruiting the Army’s Cyber Operations Officer

    DTIC Science & Technology

    2017-09-01

    For the first time since the creation of the Special Forces branch in 1987, the Army authorized the creation of a new branch, the Cyber branch. With...management model. The purpose of our research is to evaluate the effectiveness of that model to recruit Cyber Operations Officers and to examine the...performance (MOPs) and measures of effectiveness (MOEs) based on data collected from: Army institutions; a survey of the Cyber Branch population; and the

  4. Cyber security issues in online games

    NASA Astrophysics Data System (ADS)

    Zhao, Chen

    2018-04-01

    With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.

  5. Mission Assurance Modeling and Simulation: A Cyber Security Roadmap

    NASA Technical Reports Server (NTRS)

    Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna

    2012-01-01

    This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.

  6. The relationship between young adults' beliefs about anonymity and subsequent cyber aggression.

    PubMed

    Wright, Michelle F

    2013-12-01

    Anonymity is considered a key motivator for cyber aggression, but few investigations have focused on the connection between anonymity and the subsequent engagement in aggression through the cyber context. The present longitudinal study utilized structural equation modeling to reveal indirect associations between two types of anonymity (i.e., punishment by authority figures and retaliation from the target) and later cyber aggression among 130 young adults. These relationships were examined through the influence of beliefs about not getting caught and not believing in the permanency of online content. Findings indicated that both forms of anonymity were related to cyber aggression 6 months later through two explanatory mechanisms (i.e., confidence with not getting caught and believing online content is not permanent), after controlling for gender and cyber aggression at Time 1. The implications of these findings are discussed, and an appeal for additional research investigating cyber aggression among young adults is given.

  7. Joint Command and Control of Cyber Operations: The Joint Force Cyber Component Command (JFCCC)

    DTIC Science & Technology

    2012-05-04

    relies so heavily on complex command and control systems and interconnectivity in general, cyber warfare has become a serious topic of interest at the...defensive cyber warfare into current and future operations and plans. In particular, Joint Task Force (JTF) Commanders must develop an optimum method to

  8. Creating Cyber Libraries: An Instructional Guide for School Library Media Specialists. School Librarianship Series.

    ERIC Educational Resources Information Center

    Craver, Kathleen W.

    This book provides school library media specialists (SLMSs) with practical guidelines and suggested Internet sites for designing cyber libraries that are reflective of their school's research, curriculum, and recreational reading needs. An introduction provides SLMSs with a rationale for designing cyber libraries. Chapter 1, Cyber Library…

  9. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  10. Command and Control of the Department of Defense in Cyberspace

    DTIC Science & Technology

    2011-03-24

    superiority are also unclassified and constantly probed by intruders and cyber criminals .5 To secure and defend our nation from cyber attacks and conduct...USCYBERCOM to use both offensive and defensive cyber weapons and the tools necessary to hunt down cyber criminals based on rule of law and the legal

  11. 75 FR 18819 - Second DRAFT NIST Interagency Report (NISTIR) 7628, Smart Grid Cyber Security Strategy and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ...-0143-01] Second DRAFT NIST Interagency Report (NISTIR) 7628, Smart Grid Cyber Security Strategy and... (NIST) seeks comments on the second draft of NISTIR 7628, Smart Grid Cyber Security Strategy and..., vulnerability categories, bottom-up analysis, individual logical interface diagrams, and the cyber security...

  12. Cyber Children: What Parents Need to Know

    ERIC Educational Resources Information Center

    Roberts, Kevin J.

    2010-01-01

    Parents need to be aware of the dangers and the opportunities the cyber world offers. Video games are being used in the classroom. Commerce is increasingly taking place online and computers are indispensable in the workplace. A cyber-oriented child possesses some great advantages. The author urges parents to become experts in the cyber world so…

  13. An Analysis of Pennsylvania's Cyber Charter Schools. Issue Brief

    ERIC Educational Resources Information Center

    Jack, James; Sludden, John; Schott, Adam

    2013-01-01

    Pennsylvania's first cyber charter school opened in 1998, enrolling 44 full-time students. From this modest beginning, Pennsylvania's cyber charter sector has grown to 16 schools enrolling 35,000 students from all but one school district in the Commonwealth. Pennsylvania has one of the nation's most extensive cyber charter sectors, and six…

  14. Uncovering the Structure of and Gender and Developmental Differences in Cyber Bullying

    ERIC Educational Resources Information Center

    Griezel, Lucy; Finger, Linda R.; Bodkin-Andrews, Gawaian H.; Craven, Rhonda G.; Yeung, Alexander Seeshing

    2012-01-01

    Although literature on traditional bullying is abundant, a limited body of sound empirical research exists regarding its newest form: cyber bullying. The sample comprised Australian secondary students (N = 803) and aimed to identify the underlying structure of cyber bullying, and differences in traditional and cyber bullying behaviors across…

  15. Cyber-Physical System Security of a Power Grid: State-of-the-Art

    DOE PAGES

    Sun, Chih -Che; Liu, Chen -Ching; Xie, Jing

    2016-07-14

    Here, as part of the smart grid development, more and more technologies are developed and deployed on the power grid to enhance the system reliability. A primary purpose of the smart grid is to significantly increase the capability of computer-based remote control and automation. As a result, the level of connectivity has become much higher, and cyber security also becomes a potential threat to the cyber-physical systems (CPSs). In this paper, a survey of the state-of-the-art is conducted on the cyber security of the power grid concerning issues of: the structure of CPSs in a smart grid; cyber vulnerability assessment;more » cyber protection systems; and testbeds of a CPS. At Washington State University (WSU), the Smart City Testbed (SCT) has been developed to provide a platform to test, analyze and validate defense mechanisms against potential cyber intrusions. A test case is provided in this paper to demonstrate how a testbed helps the study of cyber security and the anomaly detection system (ADS) for substations.« less

  16. Cyber-Physical System Security of a Power Grid: State-of-the-Art

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sun, Chih -Che; Liu, Chen -Ching; Xie, Jing

    Here, as part of the smart grid development, more and more technologies are developed and deployed on the power grid to enhance the system reliability. A primary purpose of the smart grid is to significantly increase the capability of computer-based remote control and automation. As a result, the level of connectivity has become much higher, and cyber security also becomes a potential threat to the cyber-physical systems (CPSs). In this paper, a survey of the state-of-the-art is conducted on the cyber security of the power grid concerning issues of: the structure of CPSs in a smart grid; cyber vulnerability assessment;more » cyber protection systems; and testbeds of a CPS. At Washington State University (WSU), the Smart City Testbed (SCT) has been developed to provide a platform to test, analyze and validate defense mechanisms against potential cyber intrusions. A test case is provided in this paper to demonstrate how a testbed helps the study of cyber security and the anomaly detection system (ADS) for substations.« less

  17. Differences in predictors of traditional and cyber-bullying: a 2-year longitudinal study in Korean school children.

    PubMed

    Yang, Su-Jin; Stewart, Robert; Kim, Jae-Min; Kim, Sung-Wan; Shin, Il-Seon; Dewey, Michael E; Maskey, Sean; Yoon, Jin-Sang

    2013-05-01

    Traditional bullying has received considerable research but the emerging phenomenon of cyber-bullying much less so. Our study aims to investigate environmental and psychological factors associated with traditional and cyber-bullying. In a school-based 2-year prospective survey, information was collected on 1,344 children aged 10 including bullying behavior/experience, depression, anxiety, coping strategies, self-esteem, and psychopathology. Parents reported demographic data, general health, and attention-deficit hyperactivity disorder (ADHD) symptoms. These were investigated in relation to traditional and cyber-bullying perpetration and victimization at age 12. Male gender and depressive symptoms were associated with all types of bullying behavior and experience. Living with a single parent was associated with perpetration of traditional bullying while higher ADHD symptoms were associated with victimization from this. Lower academic achievement and lower self esteem were associated with cyber-bullying perpetration and victimization, and anxiety symptoms with cyber-bullying perpetration. After adjustment, previous bullying perpetration was associated with victimization from cyber-bullying but not other outcomes. Cyber-bullying has differences in predictors from traditional bullying and intervention programmes need to take these into consideration.

  18. An Examination of the Partner Cyber Abuse Questionnaire in a College Student Sample

    PubMed Central

    Wolford-Clevenger, Caitlin; Zapor, Heather; Brasfield, Hope; Febres, Jeniimarie; Elmquist, JoAnna; Brem, Meagan; Shorey, Ryan C.; Stuart, Gregory L.

    2015-01-01

    Objective To examine the factor structure and convergent validity of a newly developed measure of an understudied form of partner abuse, cyber abuse, and to examine the prevalence of, and gender differences in, victimization by cyber abuse. Method College students in a dating relationship (N = 502) completed the Partner Cyber Abuse Questionnaire (Hamby, 2013), as well as measures of partner abuse victimization and depression. Results Using exploratory factor analysis, we determined a one-factor solution was the most statistically and conceptually best fitting model. The cyber abuse victimization factor was correlated with depressive symptoms and physical, psychological, and sexual partner abuse victimization, supporting the convergent validity of the measure. The overall prevalence of victimization by cyber abuse was 40%, with victimization by specific acts ranging from 2–31%. Men and women did not differ in their victimization by cyber abuse. Conclusions Cyber abuse is prevalent among college students and occurs concurrently with other partner abuse forms and depressive symptoms. Given the interrelated nature of partner abuse forms, prevention and intervention programs should address partner abuse occurring in-person and through technology. Cyber abuse should also be considered in the conceptualization and measurement of partner abuse to more fully understand this social problem. PMID:27014498

  19. The rate of cyber dating abuse among teens and how it relates to other forms of teen dating violence.

    PubMed

    Zweig, Janine M; Dank, Meredith; Yahner, Jennifer; Lachman, Pamela

    2013-07-01

    To date, little research has documented how teens might misuse technology to harass, control, and abuse their dating partners. This study examined the extent of cyber dating abuse-abuse via technology and new media-in youth relationships and how it relates to other forms of teen dating violence. A total of 5,647 youth from ten schools in three northeastern states participated in the survey, of which 3,745 reported currently being in a dating relationship or having been in one during the prior year (52 % were female; 74 % White). Just over a quarter of youth in a current or recent relationship said that they experienced some form of cyber dating abuse victimization in the prior year, with females reporting more cyber dating abuse victimization than males (particularly sexual cyber dating abuse). One out of ten youth said that they had perpetrated cyber dating abuse, with females reporting greater levels of non-sexual cyber dating abuse perpetration than males; by contrast, male youth were significantly more likely to report perpetrating sexual cyber dating abuse. Victims of sexual cyber dating abuse were seven times more likely to have also experienced sexual coercion (55 vs. 8 %) than were non-victims, and perpetrators of sexual cyber dating abuse were 17 times more likely to have also perpetrated sexual coercion (34 vs. 2 %) than were non-perpetrators. Implications for practice and future research are discussed.

  20. A cyber-event correlation framework and metrics

    NASA Astrophysics Data System (ADS)

    Kang, Myong H.; Mayfield, Terry

    2003-08-01

    In this paper, we propose a cyber-event fusion, correlation, and situation assessment framework that, when instantiated, will allow cyber defenders to better understand the local, regional, and global cyber-situation. This framework, with associated metrics, can be used to guide assessment of our existing cyber-defense capabilities, and to help evaluate the state of cyber-event correlation research and where we must focus our future cyber-event correlation research. The framework, based on the cyber-event gathering activities and analysis functions, consists of five operational steps, each of which provides a richer set of contextual information to support greater situational understanding. The first three steps are categorically depicted as increasingly richer and broader-scoped contexts achieved through correlation activity, while in the final two steps, these richer contexts are achieved through analytical activities (situation assessment, and threat analysis & prediction). Category 1 Correlation focuses on the detection of suspicious activities and the correlation of events from a single cyber-event source. Category 2 Correlation clusters the same or similar events from multiple detectors that are located at close proximity and prioritizes them. Finally, the events from different time periods and event sources at different location/regions are correlated at Category 3 to recognize the relationship among different events. This is the category that focuses on the detection of large-scale and coordinated attacks. The situation assessment step (Category 4) focuses on the assessment of cyber asset damage and the analysis of the impact on missions. The threat analysis and prediction step (Category 5) analyzes attacks based on attack traces and predicts the next steps. Metrics that can distinguish correlation and cyber-situation assessment tools for each category are also proposed.

  1. Cyber / Physical Security Vulnerability Assessment Integration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDonald, Douglas G.; Simpkins, Bret E.

    Abstract Both physical protection and cyber security domains offer solutions for the discovery of vulnerabilities through the use of various assessment processes and software tools. Each vulnerability assessment (VA) methodology provides the ability to identify and categorize vulnerabilities, and quantifies the risks within their own areas of expertise. Neither approach fully represents the true potential security risk to a site and/or a facility, nor comprehensively assesses the overall security posture. The technical approach to solving this problem was to identify methodologies and processes that blend the physical and cyber security assessments, and develop tools to accurately quantify the unaccounted formore » risk. SMEs from both the physical and the cyber security domains developed the blending methodologies, and cross trained each other on the various aspects of the physical and cyber security assessment processes. A local critical infrastructure entity volunteered to host a proof of concept physical/cyber security assessment, and the lessons learned have been leveraged by this effort. The four potential modes of attack an adversary can use in approaching a target are; Physical Only Attack, Cyber Only Attack, Physical Enabled Cyber Attack, and the Cyber Enabled Physical Attack. The Physical Only and the Cyber Only pathway analysis are two of the most widely analyzed attack modes. The pathway from an off-site location to the desired target location is dissected to ensure adversarial activity can be detected and neutralized by the protection strategy, prior to completion of a predefined task. This methodology typically explores a one way attack from the public space (or common area) inward towards the target. The Physical Enabled Cyber Attack and the Cyber Enabled Physical Attack are much more intricate. Both scenarios involve beginning in one domain to affect change in the other, then backing outward to take advantage of the reduced system effectiveness, before penetrating further into the defenses. The proper identification and assessment of the overlapping areas (and interaction between these areas) in the VA process is necessary to accurately assess the true risk.« less

  2. Large-scale, thick, self-assembled, nacre-mimetic brick-walls as fire barrier coatings on textiles

    PubMed Central

    Das, Paramita; Thomas, Helga; Moeller, Martin; Walther, Andreas

    2017-01-01

    Highly loaded polymer/clay nanocomposites with layered structures are emerging as robust fire retardant surface coatings. However, time-intensive sequential deposition processes, e.g. layer-by-layer strategies, hinders obtaining large coating thicknesses and complicates an implementation into existing technologies. Here, we demonstrate a single-step, water-borne approach to prepare thick, self-assembling, hybrid fire barrier coatings of sodium carboxymethyl cellulose (CMC)/montmorillonite (MTM) with well-defined, bioinspired brick-wall nanostructure, and showcase their application on textile. The coating thickness on the textile is tailored using different concentrations of CMC/MTM (1–5 wt%) in the coating bath. While lower concentrations impart conformal coatings of fibers, thicker continuous coatings are obtained on the textile surface from highest concentration. Comprehensive fire barrier and fire retardancy tests elucidate the increasing fire barrier and retardancy properties with increasing coating thickness. The materials are free of halogen and heavy metal atoms, and are sourced from sustainable and partly even renewable building blocks. We further introduce an amphiphobic surface modification on the coating to impart oil and water repellency, as well as self-cleaning features. Hence, our study presents a generic, environmentally friendly, scalable, and one-pot coating approach that can be introduced into existing technologies to prepare bioinspired, thick, fire barrier nanocomposite coatings on diverse surfaces. PMID:28054589

  3. Cyber Analogies

    DTIC Science & Technology

    2014-02-28

    distribution is unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT This anthology of cyber analogies will resonate with readers whose duties call for them...THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT This anthology of cyber analogies will resonate with readers...fresh insights. THE CASE FOR ANALOGIES All of us on the cyber analogies team hope that this anthol- ogy will resonate with readers whose duties call

  4. DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT

    DTIC Science & Technology

    2016-08-01

    AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT...iii ABSTRACT During operations in a contested air environment, adversary electronic warfare (EW) and cyber-attack capability will pose a high...10 Russian Federation Electronic Warfare Systems ...................................................12 Chinese Cyber Warfare Program

  5. An Examination of the Relationship between Self-Control and Cyber Victimization in Adolescents

    ERIC Educational Resources Information Center

    Peker, Adem

    2017-01-01

    Purpose: Cyber bullying is a new phenomenon which adversely affects young people. Exposure to the cyber bullying can negatively affect the mental health. The aim of this study is to examine the predictive effect of self-control on cyber victimization in adolescents. Research Methods: The study group was composed of 353 Turkish secondary school…

  6. Defining Cyber and Focusing the Military’s Role in Cyberspace

    DTIC Science & Technology

    2013-03-01

    Service (USSS) and the U.S. Immigration and Customs Enforcement (ICE) to investigate cyber criminals .7 DoD’s role is not only to defend its own...identify trends, tactics, techniques, and procedures that cyber criminals use so that if the same type of events meet the definition of cyber war, DoD

  7. Discussing Cyber Ethics with Students Is Critical

    ERIC Educational Resources Information Center

    Kruger, Robert

    2003-01-01

    As computers become a larger part of the curriculum, educators everywhere are being asked to take a stand for cyber ethics, the right and wrong of computer and Internet use. Teachers cannot always depend on parents to instill cyber ethics. Parents may not know or follow the rules, either. Once students understand cyber ethics, they may have a…

  8. Interview with a Cyber-Student: A Look behind Online Cheating

    ERIC Educational Resources Information Center

    Davis, Julia

    2014-01-01

    This case study offers insights into the motivation and experiences of a cyber-student, an individual who completes all or portions of an online class for the registered student. The cyber-student shares information on the inner-workings of online companies specializing in matching cyber-students with potential clients. A portrait of both a…

  9. Middle School Students' Perceptions of and Responses to Cyber Bullying

    ERIC Educational Resources Information Center

    Holfeld, Brett; Grabe, Mark

    2012-01-01

    This study explored the nature and extent of middle school students' (n = 665) experiences with cyber bullying. Approximately one in five students reported being cyber bullied in the past year, with 55% of those students being repeatedly victimized within the past 30 days. Female students were more likely to be involved in cyber bullying (victim,…

  10. Cyber Asynchronous versus Blended Cyber Approach in Distance English Learning

    ERIC Educational Resources Information Center

    Ge, Zi-Gang

    2012-01-01

    This study aims to compare the single cyber asynchronous learning approach with the blended cyber learning approach in distance English education. Two classes of 70 students participated in this study, which lasted one semester of about four months, with one class using the blended approach for their English study and the other only using the…

  11. Cyber Victimization and Perceived Stress: Linkages to Late Adolescents' Cyber Aggression and Psychological Functioning

    ERIC Educational Resources Information Center

    Wright, Michelle F.

    2015-01-01

    The present study examined multiple sources of strain, particular cyber victimization, and perceived stress from parents, peers, and academics, in relation to late adolescents' (ages 16-18; N = 423) cyber aggression, anxiety, and depression, each assessed 1 year later (Time 2). Three-way interactions revealed that the relationship between Time 1…

  12. Psychological Impact of Cyber-Bullying: Implications for School Counsellors

    ERIC Educational Resources Information Center

    Nordahl, Jennifer; Beran, Tanya; Dittrick, Crystal J.

    2013-01-01

    Cyber-bullying is a significant problem for children today. This study provides evidence of the psychological impact of cyber-bullying among victimized children ages 10 to 17 years (M = 12.48, SD = 1.79) from 23 urban schools in a western province of Canada (N = 239). Students who were cyber-bullied reported high levels of anxious,…

  13. The Prevalence of Cyber Bullying Victimization and Its Relationship to Academic, Social, and Emotional Adjustment among College Students

    ERIC Educational Resources Information Center

    Beebe, Jennifer Elizabeth

    2010-01-01

    The current study investigated the prevalence and frequency of cyber bullying victimization and examined the impact of cyber bullying on academic, social, and emotional college adjustment. Participants were recruited from two universities in the United States. Participants completed the Revised Cyber Bullying Survey (Kowalski & Limber, 2007)…

  14. Software Acquisition in the Age of Cyber Warfare

    DTIC Science & Technology

    2011-05-01

    s c h o o l o f S Y S T E M S a n d L O G I S T I C S education service research Software Acquisition in the Age of Cyber Warfare Maj...DATE MAY 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Software Acquisition in the Age of Cyber Warfare 5a...AFIT Cyber 200/300 Courses Cyber Warfare IDE Program 34 Special Emphasis On… Enterprise Integration (Active Directory, PKI) Security

  15. Cyber-Informed Engineering

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Anderson, Robert S.; Benjamin, Jacob; Wright, Virginia L.

    A continuing challenge for engineers who utilize digital systems is to understand the impact of cyber-attacks across the entire product and program lifecycle. This is a challenge due to the evolving nature of cyber threats that may impact the design, development, deployment, and operational phases of all systems. Cyber Informed Engineering is the process by which engineers are made aware of both how to use their engineering knowledge to positively impact the cyber security in the processes by which they architect and design components and the services and security of the components themselves.

  16. Gamification for Measuring Cyber Security Situational Awareness

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fink, Glenn A.; Best, Daniel M.; Manz, David O.

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporatesmore » augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.« less

  17. Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety.

    PubMed

    Sackner-Bernstein, Jonathan

    2017-03-01

    The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware.

  18. Use of CYBER 203 and CYBER 205 computers for three-dimensional transonic flow calculations

    NASA Technical Reports Server (NTRS)

    Melson, N. D.; Keller, J. D.

    1983-01-01

    Experiences are discussed for modifying two three-dimensional transonic flow computer programs (FLO 22 and FLO 27) for use on the CDC CYBER 203 computer system. Both programs were originally written for use on serial machines. Several methods were attempted to optimize the execution of the two programs on the vector machine: leaving the program in a scalar form (i.e., serial computation) with compiler software used to optimize and vectorize the program, vectorizing parts of the existing algorithm in the program, and incorporating a vectorizable algorithm (ZEBRA I or ZEBRA II) in the program. Comparison runs of the programs were made on CDC CYBER 175. CYBER 203, and two pipe CDC CYBER 205 computer systems.

  19. U.S. Naval Forces, Vietnam Monthly Historical Summary for October 1969

    DTIC Science & Technology

    1969-12-12

    killed in the action, and there were no friendly casualties with the exception of a helo that was hit by « neny fire forcing it to return to Ben Luc. j...information and captured documents were particularly grat- ifying in that they pointed to the extreme difficulty that the « neny «as having in moving food

  20. Adolescents' Involvement in Cyber Bullying and Perceptions of School: The Importance of Perceived Peer Acceptance for Female Adolescents.

    PubMed

    Betts, Lucy R; Spenser, Karin A; Gardner, Sarah E

    2017-01-01

    Young people are spending increasing amounts of time using digital technology and, as such, are at great risk of being involved in cyber bullying as a victim, bully, or bully/victim. Despite cyber bullying typically occurring outside the school environment, the impact of being involved in cyber bullying is likely to spill over to school. Fully 285 11- to 15-year-olds (125 male and 160 female, M age  = 12.19 years, SD  = 1.03) completed measures of cyber bullying involvement, self-esteem, trust, perceived peer acceptance, and perceptions of the value of learning and the importance of school. For young women, involvement in cyber bullying as a victim, bully, or bully/victim negatively predicted perceptions of learning and school, and perceived peer acceptance mediated this relationship. The results indicated that involvement in cyber bullying negatively predicted perceived peer acceptance which, in turn, positively predicted perceptions of learning and school. For young men, fulfilling the bully/victim role negatively predicted perceptions of learning and school. Consequently, for young women in particular, involvement in cyber bullying spills over to impact perceptions of learning. The findings of the current study highlight how stressors external to the school environment can adversely impact young women's perceptions of school and also have implications for the development of interventions designed to ameliorate the effects of cyber bullying.

  1. The Nature and Frequency of Cyber Bullying Behaviors and Victimization Experiences in Young Canadian Children

    ERIC Educational Resources Information Center

    Holfeld, Brett; Leadbeater, Bonnie J.

    2015-01-01

    As access to technology is increasing in children and adolescents, there are growing concerns over the dangers of cyber bullying. It remains unclear what cyber bullying looks like among young Canadian children and how common these experiences are. In this study, we examine the psychometric properties of a measure of cyber bullying behaviors and…

  2. Cyber Operations: The New Balance

    DTIC Science & Technology

    2009-01-01

    compelling evidence to suggest that enlight - enment, rather than retrenchment, is the path for cyber New Balance. The economic calamity of the Great...www.guardian.co.uk/ technology /2008/ oct/02/interviews.internet>. 16 Langevin, 11. 17 James Lewis, “Cyber Security Recommen- dations for the Next...Administration,” testimony before House Subcommittee on Emerging Threats, Cyber Security, and Science and Technology , Washington, DC, September 16

  3. Pages - U.S. Fleet Cyber Command

    Science.gov Websites

    Links Expand Links : U.S. Fleet Cyber Command Help (new window) Site Help Page Content Website 2nd Banner.jpg Since its establishment on Jan. 29, 2010, U.S. Fleet Cyber Command (FCC)/U.S. TENTH Fleet (C10F civilians organized into 26 active commands, 40 Cyber Mission Force units, and 27 reserve commands around

  4. Cyber Insurance - Managing Cyber Risk

    DTIC Science & Technology

    2015-04-01

    license under the clause at DFARS 252.227-7013 (a)(16) [Jun 2013]. Cyber Insurance – Managing Cyber Risk Data breaches involving...significant personal information losses and financial impact are becoming increasingly common. Whether the data breach has financial implications for...hundreds of millions of dollars depending on the type and size of the breach. Most states have some type of data breach law requiring notification

  5. Co-Simulation Platform For Characterizing Cyber Attacks in Cyber Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sadi, Mohammad A. H.; Ali, Mohammad Hassan; Dasgupta, Dipankar

    Smart grid is a complex cyber physical system containing a numerous and variety of sources, devices, controllers and loads. Communication/Information infrastructure is the backbone of the smart grid system where different grid components are connected with each other through this structure. Therefore, the drawbacks of the information technology related issues are also becoming a part of the smart grid. Further, smart grid is also vulnerable to the grid related disturbances. For such a dynamic system, disturbance and intrusion detection is a paramount issue. This paper presents a Simulink and OPNET based co-simulated test bed to carry out a cyber-intrusion inmore » a cyber-network for modern power systems and smart grid. The effect of the cyber intrusion on the physical power system is also presented. The IEEE 30 bus power system model is used to demonstrate the effectiveness of the simulated testbed. The experiments were performed by disturbing the circuit breakers reclosing time through a cyber-attack in the cyber network. Different disturbance situations in the proposed test system are considered and the results indicate the effectiveness of the proposed co-simulated scheme.« less

  6. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users.

    PubMed

    Veksler, Vladislav D; Buchler, Norbou; Hoffman, Blaine E; Cassenti, Daniel N; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.

  7. Timing of cyber conflict.

    PubMed

    Axelrod, Robert; Iliev, Rumen

    2014-01-28

    Nations are accumulating cyber resources in the form of stockpiles of zero-day exploits as well as other novel methods of engaging in future cyber conflict against selected targets. This paper analyzes the optimal timing for the use of such cyber resources. A simple mathematical model is offered to clarify how the timing of such a choice can depend on the stakes involved in the present situation, as well as the characteristics of the resource for exploitation. The model deals with the question of when the resource should be used given that its use today may well prevent it from being available for use later. The analysis provides concepts, theory, applications, and distinctions to promote the understanding strategy aspects of cyber conflict. Case studies include the Stuxnet attack on Iran's nuclear program, the Iranian cyber attack on the energy firm Saudi Aramco, the persistent cyber espionage carried out by the Chinese military, and an analogous case of economic coercion by China in a dispute with Japan. The effects of the rapidly expanding market for zero-day exploits are also analyzed. The goal of the paper is to promote the understanding of this domain of cyber conflict to mitigate the harm it can do, and harness the capabilities it can provide.

  8. Cyber Victimization, Psychological Intimate Partner Violence, and Problematic Mental Health Outcomes Among First-Year College Students.

    PubMed

    Sargent, Kelli S; Krauss, Alison; Jouriles, Ernest N; McDonald, Renee

    2016-09-01

    Both cyber victimization and psychological intimate partner violence (IPV) have been associated with negative mental health outcomes among adolescents and young adults. The present study examined relations among cyber victimization, psychological IPV, and mental health outcomes (depressive symptoms, antisocial behavior) among first-year college students. Consistent with polyvictimization theory, we hypothesized that cyber victimization and psychological IPV would be related to each other. We also hypothesized that each would uniquely contribute to depressive symptoms and antisocial behavior, after accounting for the other. Participants (N = 342, M age = 18.33 years; 50% male) completed questionnaires during a single lab visit. Results indicated that cyber victimization and psychological IPV were related to each other, and both contributed uniquely to depressive symptoms, but only cyber victimization contributed uniquely to antisocial behavior. Exploratory analyses indicated that experiencing both cyber victimization and psychological IPV was necessary for increased depressive symptoms and antisocial behavior. This study is the first to establish a unique relation between cyber victimization and mental health problems, after accounting for psychological IPV. The findings also suggest a need to consider multiple forms of victimization when considering relations between specific types of victimization and mental health problems.

  9. What good cyber resilience looks like.

    PubMed

    Hult, Fredrik; Sivanesan, Giri

    In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.

  10. Metaphors for cyber security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a varietymore » of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).« less

  11. Towards Resilient Critical Infrastructures: Application of Type-2 Fuzzy Logic in Embedded Network Security Cyber Sensor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ondrej Linda; Todd Vollmer; Jim Alves-Foss

    2011-08-01

    Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL providesmore » a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.« less

  12. Introducing cyber.

    PubMed

    Hult, Fredrik; Sivanesan, Giri

    In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.

  13. Perceived Parenting and Adolescent Cyber-Bullying: Examining the Intervening Role of Autonomy and Relatedness Need Satisfaction, Empathic Concern and Recognition of Humanness.

    PubMed

    Fousiani, Kyriaki; Dimitropoulou, Panagiota; Michaelides, Michalis P; Van Petegem, Stijn

    Due to the progress in information technology, cyber-bullying is becoming one of the most common forms of interpersonal harm, especially among teenagers. The present study ( N  = 548) aimed to investigate the relation between perceived parenting style (in terms of autonomy support and psychological control) and cyber-bullying in adolescence. Thereby, the study tested for the intervening role of adolescent need satisfaction (i.e., autonomy and relatedness), empathic concern towards others, and adolescents' recognition of full humanness to cyber-bullying offenders and victims. Findings revealed both a direct and an indirect relation between parenting and cyber-bullying. More specifically, parental psychological control directly predicted cyber-bullying, whereas parental autonomy support related to less cyber-bullying indirectly, as it was associated with the satisfaction of adolescents' need for autonomy, which predicted more empathic concern towards others, which in turn differentially related to recognition of humanness to victims and bullies. The discussion focuses on the implications of the current findings.

  14. Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety

    PubMed Central

    Sackner-Bernstein, Jonathan

    2017-01-01

    Background: The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware. PMID:27837161

  15. Network Intrusion Detection and Visualization using Aggregations in a Cyber Security Data Warehouse

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Czejdo, Bogdan; Ferragut, Erik M; Goodall, John R

    2012-01-01

    The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our pro-posed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describemore » the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.« less

  16. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment

    PubMed Central

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2013-01-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments. PMID:25685516

  17. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.

    PubMed

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2014-07-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation's electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.

  18. WebGIS Platform Adressed to Forest Fire Management Methodologies

    NASA Astrophysics Data System (ADS)

    André Ramos-Simões, Nuno; Neto Paixão, Helena Maria; Granja Martins, Fernando Miguel; Pedras, Celestina; Lança, Rui; Silva, Elisa; Jordán, António; Zavala, Lorena; Soares, Cristina

    2015-04-01

    Forest fires are one of the natural disasters that causes more damages in nature, as well as high material costs, and sometimes, a significant losses in human lives. In summer season, when high temperatures are attained, fire may rapidly progress and destroy vast areas of forest and also rural and urban areas. The forest fires have effect on forest species, forest composition and structure, soil properties and soil capacity for nutrient retention. In order to minimize the negative impact of the forest fires in the environment, many studies have been developed, e.g. Jordán et al (2009), Cerdà & Jordán (2010), and Gonçalves & Vieira (2013). Nowadays, Remote Sensing (RS) and Geographic Information System (GIS) technologies are used as support tools in fire management decisions, namely during the fire, but also before and after. This study presents the development of a user-friendly WebGIS dedicated to share data, maps and provide updated information on forest fire management for stakeholders in Iberia Peninsula. The WebGIS platform was developed with ArcGIS Online, ArcGIS for Desktop; HyperText Markup Language (HTML) and Javascript. This platform has a database that includes spatial and alphanumeric information, such as: origin, burned areas, vegetation change over time, terrain natural slope, land use, soil erosion and fire related hazards. The same database contains also the following relevant information: water sources, forest tracks and traffic ways, lookout posts and urban areas. The aim of this study is to provide the authorities with a tool to assess risk areas and manage more efficiently forest fire hazards, giving more support to their decisions and helping the populations when facing this kind of phenomena.

  19. Cyber Workforce Retention

    DTIC Science & Technology

    2016-10-01

    movement to focus on cybersecurity in the private sector. The company has shared intelligence and resources on cyber threats, even going as far as...personnel and 1NX intelligence personnel as well as 14N intelligence officers and the 17D/S cyber operations officers who lead and manage Air Force...threat of cyber incidents, the burgeon- ing cost of doing business due to cybersecurity infiltrations, and corporate America’s / senior executives

  20. Electronic Warfare for Cyber Warriors

    DTIC Science & Technology

    2008-06-01

    This research paper provides complete course content for the AFIT EENG 509, Electronic Warfare class. It is intended as a replacement for the existing course and designed for Intermediate Developmental Education (IDE) students in the Cyber Warfare degree program. This course provides relevant academic courseware and study material to give cyber warriors an academic and operational perspective on electronic warfare and its integration in the cyber domain.

  1. Beyond Mission Command: Maneuver Warfare for Cyber Command and Control

    DTIC Science & Technology

    2015-05-18

    operation in an A2AD environment. 15. SUBJECT TERMS command and control; maneuver warfare; cyberspace; cyberspace operations; cyber warfare , mission...Some Principles of Cyber Warfare (NWC 2160) (U.S. Naval War College, Joint Military Operations Department, Newport, RI: U.S. Naval War College...research/ innovationleadership.pdf. Crowell, Richard M. Some Principles of Cyber Warfare (NWC 2160). U.S. Naval War College, Joint Military Operations

  2. Cognitive and Non-cognitive Predictors of Career Intentions within Cyber Jobs

    DTIC Science & Technology

    2016-04-01

    in Anaheim, California, April 14-16, 2016. 15. SUBJECT TERMS Cyber, career intentions, retention , cognitive ability, job fit, normative commitment...Predictors of Cyber Job Career Intentions 1 The views, opinions, and findings contained in this article are solely those of the authors and should...other documentation. Cognitive and Non-cognitive Predictors of Career Intentions within Cyber Jobs Kristophor Canali U. S. Army

  3. Special Operations And Cyber Warfare

    DTIC Science & Technology

    2016-12-01

    with the high level of Soldier competency in the 95th for CA Soldiers to retrain and fulfill the cyber requirement. With the reorganization of the...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. SPECIAL OPERATIONS AND CYBER...OPERATIONS AND CYBER WARFARE 5. FUNDING NUMBERS 6. AUTHOR(S) Jason C. Tebedo 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School

  4. Cyber-Herding and Cyber Activism: Countering Qutbists on the Internet

    DTIC Science & Technology

    2007-12-01

    13 f. Phase 6, Concentrate Web Sites ..........14 g. Phase 7, Develop Darknet ................16 B. CYBER ACTIVISM...continues in Phase 3 with the introduction of web sites owned by the cyber herding program and later on with the introduction of Darknets . The...own doppelganger.) Create several content-rich Darknet environments—a private virtual network where users connect only to people they trust8—that

  5. 28 CFR 81.12 - Submission of reports to the “Cyber Tipline” at the National Center for Missing and Exploited...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Submission of reports to the âCyber... “Cyber Tipline” at the National Center for Missing and Exploited Children. (a) When a provider of... circumstances to the “Cyber Tipline” at the National Center for Missing and Exploited Children Web site (http...

  6. 28 CFR 81.12 - Submission of reports to the “Cyber Tipline” at the National Center for Missing and Exploited...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Submission of reports to the âCyber... “Cyber Tipline” at the National Center for Missing and Exploited Children. (a) When a provider of... circumstances to the “Cyber Tipline” at the National Center for Missing and Exploited Children Web site (http...

  7. 28 CFR 81.12 - Submission of reports to the “Cyber Tipline” at the National Center for Missing and Exploited...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Submission of reports to the âCyber... “Cyber Tipline” at the National Center for Missing and Exploited Children. (a) When a provider of... circumstances to the “Cyber Tipline” at the National Center for Missing and Exploited Children Web site (http...

  8. 28 CFR 81.12 - Submission of reports to the “Cyber Tipline” at the National Center for Missing and Exploited...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Submission of reports to the âCyber... “Cyber Tipline” at the National Center for Missing and Exploited Children. (a) When a provider of... circumstances to the “Cyber Tipline” at the National Center for Missing and Exploited Children Web site (http...

  9. A Case Study on the Development and Implementation of Cyber Capabilities in the United States

    ERIC Educational Resources Information Center

    Walton, Marquetta

    2016-01-01

    The effectiveness of U.S. cyber-capabilities can have a serious effect on the cyber-security stance of the US and significantly impact how well U.S. critical infrastructures are protected. The problem is that the state of the U.S. cyber-security could be negatively impacted by the dependency that the US displays in its use of defensive…

  10. 28 CFR 81.12 - Submission of reports to the “Cyber Tipline” at the National Center for Missing and Exploited...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Submission of reports to the âCyber... “Cyber Tipline” at the National Center for Missing and Exploited Children. (a) When a provider of... circumstances to the “Cyber Tipline” at the National Center for Missing and Exploited Children Web site (http...

  11. Optimizing CyberShake Seismic Hazard Workflows for Large HPC Resources

    NASA Astrophysics Data System (ADS)

    Callaghan, S.; Maechling, P. J.; Juve, G.; Vahi, K.; Deelman, E.; Jordan, T. H.

    2014-12-01

    The CyberShake computational platform is a well-integrated collection of scientific software and middleware that calculates 3D simulation-based probabilistic seismic hazard curves and hazard maps for the Los Angeles region. Currently each CyberShake model comprises about 235 million synthetic seismograms from about 415,000 rupture variations computed at 286 sites. CyberShake integrates large-scale parallel and high-throughput serial seismological research codes into a processing framework in which early stages produce files used as inputs by later stages. Scientific workflow tools are used to manage the jobs, data, and metadata. The Southern California Earthquake Center (SCEC) developed the CyberShake platform using USC High Performance Computing and Communications systems and open-science NSF resources.CyberShake calculations were migrated to the NSF Track 1 system NCSA Blue Waters when it became operational in 2013, via an interdisciplinary team approach including domain scientists, computer scientists, and middleware developers. Due to the excellent performance of Blue Waters and CyberShake software optimizations, we reduced the makespan (a measure of wallclock time-to-solution) of a CyberShake study from 1467 to 342 hours. We will describe the technical enhancements behind this improvement, including judicious introduction of new GPU software, improved scientific software components, increased workflow-based automation, and Blue Waters-specific workflow optimizations.Our CyberShake performance improvements highlight the benefits of scientific workflow tools. The CyberShake workflow software stack includes the Pegasus Workflow Management System (Pegasus-WMS, which includes Condor DAGMan), HTCondor, and Globus GRAM, with Pegasus-mpi-cluster managing the high-throughput tasks on the HPC resources. The workflow tools handle data management, automatically transferring about 13 TB back to SCEC storage.We will present performance metrics from the most recent CyberShake study, executed on Blue Waters. We will compare the performance of CPU and GPU versions of our large-scale parallel wave propagation code, AWP-ODC-SGT. Finally, we will discuss how these enhancements have enabled SCEC to move forward with plans to increase the CyberShake simulation frequency to 1.0 Hz.

  12. Using CyberShake Workflows to Manage Big Seismic Hazard Data on Large-Scale Open-Science HPC Resources

    NASA Astrophysics Data System (ADS)

    Callaghan, S.; Maechling, P. J.; Juve, G.; Vahi, K.; Deelman, E.; Jordan, T. H.

    2015-12-01

    The CyberShake computational platform, developed by the Southern California Earthquake Center (SCEC), is an integrated collection of scientific software and middleware that performs 3D physics-based probabilistic seismic hazard analysis (PSHA) for Southern California. CyberShake integrates large-scale and high-throughput research codes to produce probabilistic seismic hazard curves for individual locations of interest and hazard maps for an entire region. A recent CyberShake calculation produced about 500,000 two-component seismograms for each of 336 locations, resulting in over 300 million synthetic seismograms in a Los Angeles-area probabilistic seismic hazard model. CyberShake calculations require a series of scientific software programs. Early computational stages produce data used as inputs by later stages, so we describe CyberShake calculations using a workflow definition language. Scientific workflow tools automate and manage the input and output data and enable remote job execution on large-scale HPC systems. To satisfy the requests of broad impact users of CyberShake data, such as seismologists, utility companies, and building code engineers, we successfully completed CyberShake Study 15.4 in April and May 2015, calculating a 1 Hz urban seismic hazard map for Los Angeles. We distributed the calculation between the NSF Track 1 system NCSA Blue Waters, the DOE Leadership-class system OLCF Titan, and USC's Center for High Performance Computing. This study ran for over 5 weeks, burning about 1.1 million node-hours and producing over half a petabyte of data. The CyberShake Study 15.4 results doubled the maximum simulated seismic frequency from 0.5 Hz to 1.0 Hz as compared to previous studies, representing a factor of 16 increase in computational complexity. We will describe how our workflow tools supported splitting the calculation across multiple systems. We will explain how we modified CyberShake software components, including GPU implementations and migrating from file-based communication to MPI messaging, to greatly reduce the I/O demands and node-hour requirements of CyberShake. We will also present performance metrics from CyberShake Study 15.4, and discuss challenges that producers of Big Data on open-science HPC resources face moving forward.

  13. Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era

    NASA Astrophysics Data System (ADS)

    Ali, Firkhan Ali Bin Hamid; Zalisham Jali, Mohd, Dr

    2018-05-01

    The development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization’s business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and to indicate degradations.

  14. Department of Homeland Security

    MedlinePlus

    ... Release Joint Technical Alerts on Malicious North Korean Cyber Activity Today, DHS and FBI released a pair ... María Provide Feedback to DHS Protect Myself from Cyber Attacks Report Cyber Incidents Prepare My Family for ...

  15. Longitudinal Associations in Youth Involvement as Victimized, Bullying, or Witnessing Cyberbullying.

    PubMed

    Holfeld, Brett; Mishna, Faye

    2018-04-01

    Although cyberbullying has been linked to cyber victimization, it is unknown whether witnessing cyberbullying impacts and is impacted by experiences of cyberbullying and victimization. In the current study, we examine the frequency of youth involved as victimized, bullying, and witnessing cyberbullying and how these experiences are associated across three academic years. Participants comprised 670 Canadian students who began the longitudinal study in grades 4, 7, or 10 at Time 1 (T1). Cyber witnessing represented the largest role of youth involvement in cyberbullying. Cyber witnessing was positively associated with both cyberbullying and victimization. Cyber victimization at T1 was positively associated with cyber witnessing at T2, which was positively related to both cyberbullying and victimization at T3. Findings highlight the significance of addressing the role of cyber witnesses in cyberbullying prevention and intervention efforts.

  16. Cyber-Physical System Security of Smart Grids

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dagle, Jeffery E.

    2012-01-31

    Abstract—This panel presentation will provide perspectives of cyber-physical system security of smart grids. As smart grid technologies are deployed, the interconnected nature of these systems is becoming more prevalent and more complex, and the cyber component of this cyber-physical system is increasing in importance. Studying system behavior in the face of failures (e.g., cyber attacks) allows a characterization of the systems’ response to failure scenarios, loss of communications, and other changes in system environment (such as the need for emergent updates and rapid reconfiguration). The impact of such failures on the availability of the system can be assessed and mitigationmore » strategies considered. Scenarios associated with confidentiality, integrity, and availability are considered. The cyber security implications associated with the American Recovery and Reinvestment Act of 2009 in the United States are discussed.« less

  17. Remodeling Air Force Cyber Command and Control

    DTIC Science & Technology

    2017-10-10

    AIR FORCE CYBERWORX REPORT: REMODELING AIR FORCE CYBER COMMAND & CONTROL COURSE DESIGN PROJECT CONDUCTED 5 Jan – 5 May 17 Produced...For the Air Force Cyber Command and Control (C2) Design Project, CyberWorx brought together 25 cadets from the United States Air Force Academy...warfighting based upon the findings of the design teams. Participants The design course was attended by a diverse group of civilians from industry

  18. The U.S. Needs International Cyber Treaties

    DTIC Science & Technology

    2010-03-01

    formed to deal with issues surrounding cyber warfare . However, no major treaties between nations exist regarding this form of combat. Examining...the history of cyber warfare , the inadequate international response, the obstacles to international agreement, and poor U.S. readiness demonstrates...the current need for the U.S. to lead the effort to codify treaties. First, a brief history of cyber warfare helps to shed light on the international

  19. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    DTIC Science & Technology

    2014-05-22

    CYBERSPACE AS A COMPLEX ADAPTIVE SYSTEM AND THE POLICY AND OPERTIONAL IMPLICATIONS FOR CYBER WARFARE A Monograph by Major Albert O. Olagbemiro...serves the US, especially in regards to the protect ion o f the 1S. SUBJECT TERMS omplex Adaptive System, Cyberspace, lnfosphere, Cyber Warfare ber...System and the Policy and Operational Implications for Cyber Warfare Approved by: __________________________________, Monograph Director Jeffrey

  20. Cyber Capabilities for Global Strike in 2035

    DTIC Science & Technology

    2012-02-15

    operations force, by treating cyber warfare capabilities in the same manner as it treats its other weapon systems. It argues that despite preconceptions of...As such, while automation is required, cyber warfare will be much more manpower intensive than is currently understood, and will require a force that...constantly keeping cyber warfare capabilities in pace with the technologies of the environment.This paper reaches these conclusions by first providing a

  1. Cyber Security: A Road Map for Turkey

    DTIC Science & Technology

    2012-03-19

    Cyber warfare is a form of information warfare, sometimes seen as analogous to conventional warfare, among a range of potential actors, including...nation states, non-state groups, and a complex hybrid of conflict involving both state and non-state actors. Cyber warfare is a tool of national power...An entire nation s ability to operate and fight in the information age is vital toward survival. Nowadays, cyber warfare is mostly focused on

  2. Cyber Capabilities for Global Strike in 2035

    DTIC Science & Technology

    2012-02-15

    operations force, by treating cyber warfare capabilities in the same manner as it treats its other weapon systems. It argues that despite preconceptions of...As such, while automation is required, cyber warfare will be much more manpower intensive than is currently understood, and will require a force...constantly keeping cyber warfare capabilities in pace with the technologies of the environment. This paper reaches these conclusions by first providing a

  3. Multinational Experiment 7. Outcome 3 - Cyber Domain Objective 3.4: Cyber Situational Awareness Standard Operating Procedure

    DTIC Science & Technology

    2012-12-01

    and activity coordination (for example, SOC management ). 10. In Reference D the information sharing framework represents a hub & node model in... management , vulnerabilities, critical assets, threats, impacts on operations etc. UNCLASSIFIED UNCLASSIFIED 6 PART 3 - CYBER SITUATIONAL AWARENESS...limit the effect of cyber incidents. 23. Tasks of the SOC include: • System maintenance and management including applying the directed security

  4. FORMAL MODELING, MONITORING, AND CONTROL OF EMERGENCE IN DISTRIBUTED CYBER PHYSICAL SYSTEMS

    DTIC Science & Technology

    2018-02-23

    FORMAL MODELING, MONITORING, AND CONTROL OF EMERGENCE IN DISTRIBUTED CYBER- PHYSICAL SYSTEMS UNIVERSITY OF TEXAS AT ARLINGTON FEBRUARY 2018 FINAL...COVERED (From - To) APR 2015 – APR 2017 4. TITLE AND SUBTITLE FORMAL MODELING, MONITORING, AND CONTROL OF EMERGENCE IN DISTRIBUTED CYBER- PHYSICAL ...dated 16 Jan 09 13. SUPPLEMENTARY NOTES 14. ABSTRACT This project studied emergent behavior in distributed cyber- physical systems (DCPS). Emergent

  5. Defending the New Domain: Cyberspace

    DTIC Science & Technology

    2011-03-21

    and time consuming, the FBI has proven technology, techniques, and procedures to hunt down and capture cyber criminals , despite the anonymity of the...help stop cyber crime and make it harder for cyber criminals to commit crime on the internet. MILITARY The U.S. military relies on DoD...one country and attacking another. Cyber criminals are using servers and proxies in one country to execute their criminal activities in another

  6. Information System Incidents: The Development of a Damage Assessment Model

    DTIC Science & Technology

    1999-12-01

    Cyber criminals use creativity, knowledge, software, and hardware to attack and infiltrate information systems (IS) in order to copy, delete, or...the Internet led to an increase in cyber criminals and a variety or cyber crimes such as attacks, intrusions, introduction of viruses, and data theft...organizations on information systems is contributing to the increased number of cyber criminals . Additionally, the growing sophistication and availability of

  7. A Game Theoretic Model Of Strategic Conflict In Cyberspace

    DTIC Science & Technology

    2012-01-01

    EXECUTIVE SUMMARY Conflict in cyberspace is difficult to analyze; methods developed for other dimensions of conflict, such as land warfare , war at sea...and missile warfare , do not adequately address cyber conflict. A characteristic that distinguishes cyber conflict is that actors do not know the...strategic and policy guidance. To analyze the strategic decisions involved in cyber conflict, we use a game theoretic framework—we view cyber warfare as a

  8. Building An Adaptive Cyber Strategy

    DTIC Science & Technology

    2016-06-01

    forces. The primary mission of the military in any domain, including cyber , should be readiness to exert force if needed during crisis . AU/ACSC/SMITH...of crisis . The military must be able to AU/ACSC/SMITH, FI/AY16 manipulate the cyber environment, but should avoid direct use of force against...operations focus on maintaining a manageable threat level. Cyberspace is a continually evolving domain, and nations throughout the world can join in cyber

  9. Defense Civil Support: DOD Needs to Identify National Guards Cyber Capabilities and Address Challenges in Its Exercises

    DTIC Science & Technology

    2016-09-01

    Congress. Consequently, as prepared now, this report does not help DOD leaders identify assets that could be used in a cyber crisis scenario...Guidance. GAO-13-128. Washington, D.C.: October 24, 2012. Defense Cyber Efforts: Management Improvements Needed to Enhance Programs Protecting the...DEFENSE CIVIL SUPPORT DOD Needs to Identify National Guard’s Cyber Capabilities and Address Challenges in Its

  10. Defense Science Board (DSB) Task Force on Cyber Deterrence

    DTIC Science & Technology

    2017-02-01

    the 2015 cyber heist from the Office of Personnel Management of some 18 million records containing personal information as so egregious as to warrant...major war, including through misperception and inadvertent escalation. The dynamics of cyber offensive weapons will increase challenges to crisis ...may have hoped to gain. − Proposed norms for the conduct of offensive cyber operations, in crisis and conflict. These norms will provide boundaries

  11. Quantum-Enhanced Cyber Security: Experimental Computation on Quantum-Encrypted Data

    DTIC Science & Technology

    2017-03-02

    AFRL-AFOSR-UK-TR-2017-0020 Quantum-Enhanced Cyber Security: Experimental Computation on Quantum-Encrypted Data Philip Walther UNIVERSITT WIEN Final...REPORT TYPE Final 3. DATES COVERED (From - To) 15 Oct 2015 to 31 Dec 2016 4. TITLE AND SUBTITLE Quantum-Enhanced Cyber Security: Experimental Computation...FORM SF 298 Final Report for FA9550-1-6-1-0004 Quantum-enhanced cyber security: Experimental quantum computation with quantum-encrypted data

  12. The Current Status and Future Directions in the Development of the Cyber Home Learning System in Korea

    ERIC Educational Resources Information Center

    Kang, Myunghee; Kim, Seyoung; Yoon, Seonghye; Chung, Warren

    2017-01-01

    The purpose of this study was to set future directions of the Cyber Home Learning System in Korea based on its current status. The Cyber Home Learning System has been designed and used by K-12 students to study voluntarily at home using online lessons. The development process of the Cyber Home Learning System was composed of the following four…

  13. Functional Mission Analysis (FMA) for the Air Force Cyber Squadron Initiative (CS I)

    DTIC Science & Technology

    2017-03-17

    Analysis for the Air Force Cyber Squadron Initiative DESIGN PROJECT CONDUCTED 13 FEB – 17 FEB 17 Produced with input from numerous units...Success The Air Force’s base-level Communications Squadrons are engaged in a cultural and technological transformation through the Cyber Squadron...sharpening their focus to include active cyber defense and mission assurance as core competencies to enable operational advantages and out-maneuver our

  14. Timing of cyber conflict

    PubMed Central

    Axelrod, Robert; Iliev, Rumen

    2014-01-01

    Nations are accumulating cyber resources in the form of stockpiles of zero-day exploits as well as other novel methods of engaging in future cyber conflict against selected targets. This paper analyzes the optimal timing for the use of such cyber resources. A simple mathematical model is offered to clarify how the timing of such a choice can depend on the stakes involved in the present situation, as well as the characteristics of the resource for exploitation. The model deals with the question of when the resource should be used given that its use today may well prevent it from being available for use later. The analysis provides concepts, theory, applications, and distinctions to promote the understanding strategy aspects of cyber conflict. Case studies include the Stuxnet attack on Iran’s nuclear program, the Iranian cyber attack on the energy firm Saudi Aramco, the persistent cyber espionage carried out by the Chinese military, and an analogous case of economic coercion by China in a dispute with Japan. The effects of the rapidly expanding market for zero-day exploits are also analyzed. The goal of the paper is to promote the understanding of this domain of cyber conflict to mitigate the harm it can do, and harness the capabilities it can provide. PMID:24474752

  15. Bullying in school and cyberspace: Associations with depressive symptoms in Swiss and Australian adolescents

    PubMed Central

    2010-01-01

    Background Cyber-bullying (i.e., bullying via electronic means) has emerged as a new form of bullying that presents unique challenges to those victimised. Recent studies have demonstrated that there is a significant conceptual and practical overlap between both types of bullying such that most young people who are cyber-bullied also tend to be bullied by more traditional methods. Despite the overlap between traditional and cyber forms of bullying, it remains unclear if being a victim of cyber-bullying has the same negative consequences as being a victim of traditional bullying. Method The current study investigated associations between cyber versus traditional bullying and depressive symptoms in 374 and 1320 students from Switzerland and Australia respectively (52% female; Age: M = 13.8, SD = 1.0). All participants completed a bullying questionnaire (assessing perpetration and victimisation of traditional and cyber forms of bullying behaviour) in addition to scales on depressive symptoms. Results Across both samples, traditional victims and bully-victims reported more depressive symptoms than bullies and non-involved children. Importantly, victims of cyber-bullying reported significantly higher levels of depressive symptoms, even when controlling for the involvement in traditional bullying/victimisation. Conclusions Overall, cyber-victimisation emerged as an additional risk factor for depressive symptoms in adolescents involved in bullying. PMID:21092266

  16. Protecting water and wastewater infrastructure from cyber attacks

    NASA Astrophysics Data System (ADS)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  17. Impact modeling and prediction of attacks on cyber targets

    NASA Astrophysics Data System (ADS)

    Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan

    2010-04-01

    In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.

  18. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users

    PubMed Central

    Veksler, Vladislav D.; Buchler, Norbou; Hoffman, Blaine E.; Cassenti, Daniel N.; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting. PMID:29867661

  19. Dataset of anomalies and malicious acts in a cyber-physical subsystem.

    PubMed

    Laso, Pedro Merino; Brosset, David; Puentes, John

    2017-10-01

    This article presents a dataset produced to investigate how data and information quality estimations enable to detect aNomalies and malicious acts in cyber-physical systems. Data were acquired making use of a cyber-physical subsystem consisting of liquid containers for fuel or water, along with its automated control and data acquisition infrastructure. Described data consist of temporal series representing five operational scenarios - Normal, aNomalies, breakdown, sabotages, and cyber-attacks - corresponding to 15 different real situations. The dataset is publicly available in the .zip file published with the article, to investigate and compare faulty operation detection and characterization methods for cyber-physical systems.

  20. Effects of fire, insect, and pathogen damage on wood quality of dead and dying western conifers

    Treesearch

    Eini C. Lowell; Valerie A. Rapp; Richard W. Haynes; Caitlin Cray

    2010-01-01

    We update and expand the 1992 survey of research findings by Lowell and colleagues, providing an ecological context for the findings, using a more reader-friendly format, and including extensive citations so readers can get indepth information on particular topics. Our intent is that managers will use this report as a desktop reference and field guide. The worksheet...

  1. Managing the Risks and Rewards of Instant Messaging

    ERIC Educational Resources Information Center

    Goldsborough, Reid

    2004-01-01

    You probably think instant messaging (IM) as something teenagers do to chat up friends online, whether across the street or across the world. But IM has some buttoned-down business benefits, as well as some risks you may not be aware of. Unlike e-mail, in which you fire off messages to recipients who read them when they next check their in-box,…

  2. Internet VSMOKE: A user-oriented system for smoke management

    Treesearch

    James T. Paul; Alan Dozier; Daniel Chan

    2007-01-01

    The Georgia Forestry Commission has developed an Internet-based, user friendly version of a USDA Forest Service smoke dispersion model called “VSMOKE.” The program provides an easy to use method to quickly evaluate what areas will likely be impacted by smoke from a wild or prescribed fire. This is particularly important in assessing air quality, public safety and...

  3. On a simulation study of cyber attacks on vehicle-to-infrastructure communication (V2I) in Intelligent Transportation System (ITS)

    NASA Astrophysics Data System (ADS)

    Ekedebe, Nnanna; Yu, Wei; Song, Houbing; Lu, Chao

    2015-05-01

    An intelligent transportation system (ITS) is one typical cyber-physical system (CPS) that aims to provide efficient, effective, reliable, and safe driving experiences with minimal congestion and effective traffic flow management. In order to achieve these goals, various ITS technologies need to work synergistically. Nonetheless, ITS's reliance on wireless connectivity makes it vulnerable to cyber threats. Thus, it is critical to understand the impact of cyber threats on ITS. In this paper, using real-world transportation dataset, we evaluated the consequences of cyber threats - attacks against service availability by jamming the communication channel of ITS. In this way, we can have a better understanding of the importance of ensuring adequate security respecting safety and life-critical ITS applications before full and expensive real-world deployments. Our experimental data shows that cyber threats against service availability could adversely affect traffic efficiency and safety performances evidenced by exacerbated travel time, fuel consumed, and other evaluated performance metrics as the communication network is compromised. Finally, we discuss a framework to make ITS secure and more resilient against cyber threats.

  4. Cyber Deterrence and Stability

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Goychayev, Rustam; Carr, Geoffrey A.; Weise, Rachel A.

    Throughout the 20th and early 21st centuries, deterrence and arms control have been cornerstones of strategic stability between the superpowers. However, the weaponization of the cyber realm by State actors and the multipolar nature of cyber conflict now undermines that stability. Strategic stability is the state in which nations believe that if they act aggressively to undermine U.S. national interests and the post-World War II liberal democratic order, the consequences will outweigh the benefits. The sense of lawlessness and lack of consequences in the cyber realm embolden States to be more aggressive in taking actions that undermine stability. Accordingly, thismore » paper examines 1) the role of deterrence and arms control in securing cyber stability, and 2) the limitations and challenges associated with these traditional national security paradigms as applied to this emerging threat domain. This paper demonstrates that many 20th-century deterrence and arms control concepts are not particularly applicable in the cyber realm. However, they are not entirely irrelevant. The United States can distill lessons learned from this rich deterrence and arms control experience to develop and deploy a strategy to advance cyber stability.« less

  5. Online social networking and the experience of cyber-bullying.

    PubMed

    O'Dea, Bridianne; Campbell, Andrew

    2012-01-01

    Online social networking sites (SNS) are popular social tools used amongst adolescents and account for much of their daily internet activity. Recently, these sites have presented opportunities for youth to experience cyber-bullying. Often resulting in psychological distress, cyber-bullying is a common experience for many young people. Continual use of SNS signifies the importance of examining its links to cyber-bullying. This study examined the relationship between online social networking and the experience of cyber-bullying. A total of 400 participants (Mage=14.31 years) completed an online survey which examined the perceived definitions and frequency of cyber-bullying. Users of SNS reported significantly higher frequencies of stranger contact compared to non-users. Spearman's rho correlations determined no significant relationship between daily time on SNS and the frequency of stranger contact. This suggests that ownership of a SNS profile may be a stronger predictor of some cyber-bullying experiences compared to time spent on these sites. Findings encourage continued research on the nature of internet activities used by young adolescents and the possible exposure to online victimization.

  6. Optimization and Control of Cyber-Physical Vehicle Systems

    PubMed Central

    Bradley, Justin M.; Atkins, Ella M.

    2015-01-01

    A cyber-physical system (CPS) is composed of tightly-integrated computation, communication and physical elements. Medical devices, buildings, mobile devices, robots, transportation and energy systems can benefit from CPS co-design and optimization techniques. Cyber-physical vehicle systems (CPVSs) are rapidly advancing due to progress in real-time computing, control and artificial intelligence. Multidisciplinary or multi-objective design optimization maximizes CPS efficiency, capability and safety, while online regulation enables the vehicle to be responsive to disturbances, modeling errors and uncertainties. CPVS optimization occurs at design-time and at run-time. This paper surveys the run-time cooperative optimization or co-optimization of cyber and physical systems, which have historically been considered separately. A run-time CPVS is also cooperatively regulated or co-regulated when cyber and physical resources are utilized in a manner that is responsive to both cyber and physical system requirements. This paper surveys research that considers both cyber and physical resources in co-optimization and co-regulation schemes with applications to mobile robotic and vehicle systems. Time-varying sampling patterns, sensor scheduling, anytime control, feedback scheduling, task and motion planning and resource sharing are examined. PMID:26378541

  7. Optimization and Control of Cyber-Physical Vehicle Systems.

    PubMed

    Bradley, Justin M; Atkins, Ella M

    2015-09-11

    A cyber-physical system (CPS) is composed of tightly-integrated computation, communication and physical elements. Medical devices, buildings, mobile devices, robots, transportation and energy systems can benefit from CPS co-design and optimization techniques. Cyber-physical vehicle systems (CPVSs) are rapidly advancing due to progress in real-time computing, control and artificial intelligence. Multidisciplinary or multi-objective design optimization maximizes CPS efficiency, capability and safety, while online regulation enables the vehicle to be responsive to disturbances, modeling errors and uncertainties. CPVS optimization occurs at design-time and at run-time. This paper surveys the run-time cooperative optimization or co-optimization of cyber and physical systems, which have historically been considered separately. A run-time CPVS is also cooperatively regulated or co-regulated when cyber and physical resources are utilized in a manner that is responsive to both cyber and physical system requirements. This paper surveys research that considers both cyber and physical resources in co-optimization and co-regulation schemes with applications to mobile robotic and vehicle systems. Time-varying sampling patterns, sensor scheduling, anytime control, feedback scheduling, task and motion planning and resource sharing are examined.

  8. Interval forecasting of cyber-attacks on industrial control systems

    NASA Astrophysics Data System (ADS)

    Ivanyo, Y. M.; Krakovsky, Y. M.; Luzgin, A. N.

    2018-03-01

    At present, cyber-security issues of industrial control systems occupy one of the key niches in a state system of planning and management Functional disruption of these systems via cyber-attacks may lead to emergencies related to loss of life, environmental disasters, major financial and economic damage, or disrupted activities of cities and settlements. There is then an urgent need to develop protection methods against cyber-attacks. This paper studied the results of cyber-attack interval forecasting with a pre-set intensity level of cyber-attacks. Interval forecasting is the forecasting of one interval from two predetermined ones in which a future value of the indicator will be obtained. For this, probability estimates of these events were used. For interval forecasting, a probabilistic neural network with a dynamic updating value of the smoothing parameter was used. A dividing bound of these intervals was determined by a calculation method based on statistical characteristics of the indicator. The number of cyber-attacks per hour that were received through a honeypot from March to September 2013 for the group ‘zeppo-norcal’ was selected as the indicator.

  9. Cyber situational awareness and differential hardening

    NASA Astrophysics Data System (ADS)

    Dwivedi, Anurag; Tebben, Dan

    2012-06-01

    The advent of cyber threats has created a need for a new network planning, design, architecture, operations, control, situational awareness, management, and maintenance paradigms. Primary considerations include the ability to assess cyber attack resiliency of the network, and rapidly detect, isolate, and operate during deliberate simultaneous attacks against the network nodes and links. Legacy network planning relied on automatic protection of a network in the event of a single fault or a very few simultaneous faults in mesh networks, but in the future it must be augmented to include improved network resiliency and vulnerability awareness to cyber attacks. Ability to design a resilient network requires the development of methods to define, and quantify the network resiliency to attacks, and to be able to develop new optimization strategies for maintaining operations in the midst of these newly emerging cyber threats. Ways to quantify resiliency, and its use in visualizing cyber vulnerability awareness and in identifying node or link criticality, are presented in the current work, as well as a methodology of differential network hardening based on the criticality profile of cyber network components.

  10. Threats and risks to information security: a practical analysis of free access wireless networks

    NASA Astrophysics Data System (ADS)

    Quirumbay, Daniel I.; Coronel, Iván. A.; Bayas, Marcia M.; Rovira, Ronald H.; Gromaszek, Konrad; Tleshova, Akmaral; Kozbekova, Ainur

    2017-08-01

    Nowadays, there is an ever-growing need to investigate, consult and communicate through the internet. This need leads to the intensification of free access to the web in strategic and functional points for the benefit of the community. However, this open access is also related to the increase of information insecurity. The existing works on computer security primarily focus on the development of techniques to reduce cyber-attacks. However, these approaches do not address the sector of inexperienced users who have difficulty understanding browser settings. Two methods can solve this problem: first the development of friendly browsers with intuitive setups for new users and on the other hand, by implementing awareness programs on essential security without deepening on technical information. This article addresses an analysis of the vulnerabilities of wireless equipment that provides internet service in the open access zones and the potential risks that could be found when using these means.

  11. Pyrokinin β-neuropeptide affects necrophoretic behavior in fire ants (S. invicta), and expression of β-NP in a mycoinsecticide increases its virulence.

    PubMed

    Fan, Yanhua; Pereira, Roberto M; Kilic, Engin; Casella, George; Keyhani, Nemat O

    2012-01-01

    Fire ants are one of the world's most damaging invasive pests, with few means for their effective control. Although ecologically friendly alternatives to chemical pesticides such as the insecticidal fungus Beauveria bassiana have been suggested for the control of fire ant populations, their use has been limited due to the low virulence of the fungus and the length of time it takes to kill its target. We present a means of increasing the virulence of the fungal agent by expressing a fire ant neuropeptide. Expression of the fire ant (Solenopsis invicta) pyrokinin β-neuropeptide (β-NP) by B. bassiana increased fungal virulence six-fold towards fire ants, decreased the LT(50), but did not affect virulence towards the lepidopteran, Galleria mellonella. Intriguingly, ants killed by the β-NP expressing fungus were disrupted in the removal of dead colony members, i.e. necrophoretic behavior. Furthermore, synthetic C-terminal amidated β-NP but not the non-amidated peptide had a dramatic effect on necrophoretic behavior. These data link chemical sensing of a specific peptide to a complex social behavior. Our results also confirm a new approach to insect control in which expression of host molecules in an insect pathogen can by exploited for target specific augmentation of virulence. The minimization of the development of potential insect resistance by our approach is discussed.

  12. Configuration of electro-optic fire source detection system

    NASA Astrophysics Data System (ADS)

    Fabian, Ram Z.; Steiner, Zeev; Hofman, Nir

    2007-04-01

    The recent fighting activities in various parts of the world have highlighted the need for accurate fire source detection on one hand and fast "sensor to shooter cycle" capabilities on the other. Both needs can be met by the SPOTLITE system which dramatically enhances the capability to rapidly engage hostile fire source with a minimum of casualties to friendly force and to innocent bystanders. Modular system design enable to meet each customer specific requirements and enable excellent future growth and upgrade potential. The design and built of a fire source detection system is governed by sets of requirements issued by the operators. This can be translated into the following design criteria: I) Long range, fast and accurate fire source detection capability. II) Different threat detection and classification capability. III) Threat investigation capability. IV) Fire source data distribution capability (Location, direction, video image, voice). V) Men portability. ) In order to meet these design criteria, an optimized concept was presented and exercised for the SPOTLITE system. Three major modular components were defined: I) Electro Optical Unit -Including FLIR camera, CCD camera, Laser Range Finder and Marker II) Electronic Unit -including system computer and electronic. III) Controller Station Unit - Including the HMI of the system. This article discusses the system's components definition and optimization processes, and also show how SPOTLITE designers successfully managed to introduce excellent solutions for other system parameters.

  13. Pyrokinin β-Neuropeptide Affects Necrophoretic Behavior in Fire Ants (S. invicta), and Expression of β-NP in a Mycoinsecticide Increases Its Virulence

    PubMed Central

    Fan, Yanhua; Pereira, Roberto M.; Kilic, Engin; Casella, George; Keyhani, Nemat O.

    2012-01-01

    Fire ants are one of the world's most damaging invasive pests, with few means for their effective control. Although ecologically friendly alternatives to chemical pesticides such as the insecticidal fungus Beauveria bassiana have been suggested for the control of fire ant populations, their use has been limited due to the low virulence of the fungus and the length of time it takes to kill its target. We present a means of increasing the virulence of the fungal agent by expressing a fire ant neuropeptide. Expression of the fire ant (Solenopsis invicta) pyrokinin β -neuropeptide (β-NP) by B. bassiana increased fungal virulence six-fold towards fire ants, decreased the LT50, but did not affect virulence towards the lepidopteran, Galleria mellonella. Intriguingly, ants killed by the β-NP expressing fungus were disrupted in the removal of dead colony members, i.e. necrophoretic behavior. Furthermore, synthetic C-terminal amidated β-NP but not the non-amidated peptide had a dramatic effect on necrophoretic behavior. These data link chemical sensing of a specific peptide to a complex social behavior. Our results also confirm a new approach to insect control in which expression of host molecules in an insect pathogen can by exploited for target specific augmentation of virulence. The minimization of the development of potential insect resistance by our approach is discussed. PMID:22238569

  14. A Better State of War: Surmounting the Ethical Cliff in Cyber Warfare

    DTIC Science & Technology

    2014-06-01

    This study analyzes the emergent field of cyber warfare through the lens of commonly-accepted tenets of ethical warfare. By comparing the...foundational understanding of concepts that determine the justice of wars (jus ad bellum) and justice in war (jus en bello) with the capabilities cyber warfare offers...analyzing how cyber warfare affects each of the core concepts introduced above. The fourth chapter presents a case study that tests the theoretical

  15. Cyber Warfare: A Need for Beyond Goldwater-Nichols

    DTIC Science & Technology

    2011-05-13

    of Military Studies Research Paper September 2010- May 2011 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Cyber Warfare : "A Need for Beyond Goldwater...22134-5068 MASTER OF MlLIT AR Y STUDJES Cyber Warfare : "A Need for Beyond Goldwater Nichols" SlffiMITTED IN PARTIAL FULFitLMENT OF THE...DOCUMENT IS PERMITTED PROVIDED PROPER ACKNOWLEDGEMENT IS MADE.· l . ii EXECUTIVE SUMMARY Title: Cyber Warfare : "A Need for Beyond Goldwater Nichols

  16. Cyber Warfare as a Form of Conflict: Evaluation of Models of Cyber Conflict as a Prototype to Conceptual Analysis

    ERIC Educational Resources Information Center

    Liles, Samuel P.

    2012-01-01

    In April 2007, what has been incorrectly called the first cyber war and since then referred more correctly as a cyber riot, an attack on the domain name systems and the various servers of Estonia occurred. It was perpetrated by ethnic Russians living in Estonia who were incensed by the movement of a bronze war memorial for Russian soldiers to a…

  17. New Tools for Cyber Terrorism

    DTIC Science & Technology

    2010-12-01

    pharmaceutical formulas, and like data can reap huge profits for criminals” 8 . If cyber criminals are capable of these crimes imagine if Bin Laden could hire...and develops a framework to work with civilian agencies to combat cyber criminals and terrorists. The CNCI comprises of education, defensive...trillion dollars worth of intellectual property to data theft. It is quite obvious that if we don’t get a handle on cyber criminals it’s only a

  18. Human Subject Research Protocol: Computer-Aided Human Centric Cyber Situation Awareness: Understanding Cognitive Processes of Cyber Analysts

    DTIC Science & Technology

    2013-11-01

    by existing cyber-attack detection tools far exceeds the analysts’ cognitive capabilities. Grounded in perceptual and cognitive theory , many visual...Processes Inspired by the sense-making theory discussed earlier, we model the analytical reasoning process of cyber analysts using three key...analyst are called “working hypotheses”); each hypothesis could trigger further actions to confirm or disconfirm it. New actions will lead to new

  19. Research Directions for Cyber Experimentation: Workshop Discussion Analysis.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    DeWaard, Elizabeth; Deccio, Casey; Fritz, David Jakob

    Sandia National Laboratories hosted a workshop on August 11, 2017 entitled "Research Directions for Cyber Experimentation," which focused on identifying and addressing research gaps within the field of cyber experimentation , particularly emulation testbeds . This report mainly documents the discussion toward the end of the workshop, which included research gaps such as developing a sustainable research infrastructure, exp anding cyber experimentation, and making the field more accessible to subject matter experts who may not have a background in computer science . Other gaps include methodologies for rigorous experimentation, validation, and uncertainty quantification, which , if addressed, also have themore » potential to bridge the gap between cyber experimentation and cyber engineering. Workshop attendees presented various ways to overcome these research gaps, however the main conclusion for overcoming these gaps is better commun ication through increased workshops, conferences, email lists, and slack chann els, among other opportunities.« less

  20. Toward a theoretical framework for trustworthy cyber sensing

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai

    2010-04-01

    Cyberspace is an indispensable part of the economy and society, but has been "polluted" with many compromised computers that can be abused to launch further attacks against the others. Since it is likely that there always are compromised computers, it is important to be aware of the (dynamic) cyber security-related situation, which is however challenging because cyberspace is an extremely large-scale complex system. Our project aims to investigate a theoretical framework for trustworthy cyber sensing. With the perspective of treating cyberspace as a large-scale complex system, the core question we aim to address is: What would be a competent theoretical (mathematical and algorithmic) framework for designing, analyzing, deploying, managing, and adapting cyber sensor systems so as to provide trustworthy information or input to the higher layer of cyber situation-awareness management, even in the presence of sophisticated malicious attacks against the cyber sensor systems?

  1. Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.

    PubMed

    Mallinder, Jason; Drabwell, Peter

    Cyber threats are growing and evolving at an unprecedented rate.Consequently, it is becoming vitally important that organisations share information internally and externally before, during and after incidents they encounter so that lessons can be learned, good practice identified and new cyber resilience capabilities developed. Many organisations are reluctant to share such information for fear of divulging sensitive information or because it may be vague or incomplete. This provides organisations with a complex dilemma: how to share information as openly as possibly about cyber incidents, while protecting their confidentiality and focusing on service recovery from such incidents. This paper explores the dilemma of information sharing versus sensitivity and provides a practical overview of considerations every business continuity plan should address to plan effectively for information sharing in the event of a cyber incident.

  2. The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance.

    PubMed

    Dawson, Jessica; Thomson, Robert

    2018-01-01

    One of the challenges in writing an article reviewing the current state of cyber education and workforce development is that there is a paucity of quantitative assessment regarding the cognitive aptitudes, work roles, or team organization required by cybersecurity professionals to be successful. In this review, we argue that the people who operate within the cyber domain need a combination of technical skills, domain specific knowledge, and social intelligence to be successful. They, like the networks they operate, must also be reliable, trustworthy, and resilient. Defining the knowledge, skills, attributes, and other characteristics is not as simple as defining a group of technical skills that people can be trained on; the complexity of the cyber domain makes this a unique challenge. There has been little research devoted to exactly what attributes individuals in the cyber domain need. What research does exist places an emphasis on technical and engineering skills while discounting the important social and organizational influences that dictate success or failure in everyday settings. This paper reviews the literature on cyber expertise and cyber workforce development to identify gaps and then argues for the important contribution of social fit in the highly complex and heterogenous cyber workforce. We then identify six assumptions for the future of cybersecurity workforce development, including the requirement for systemic thinkers, team players, a love for continued learning, strong communication ability, a sense of civic duty, and a blend of technical and social skill. Finally, we make recommendations for social and cognitive metrics which may be indicative of future performance in cyber work roles to provide a roadmap for future scholars.

  3. Prevalence and patterns of traditional bullying victimization and cyber-teasing among college population in Spain.

    PubMed

    Caravaca Sánchez, Francisco; Falcón Romero, María; Navarro-Zaragoza, Javier; Luna Ruiz-Cabello, Aurelio; Rodriges Frantzisko, Oriali; Luna Maldonado, Aurelio

    2016-02-19

    Traditional bullying victimization and the growing number of cyber-teasing victims during the last decade is a major public health concern. The objective of this study was to examine the relationship between students' experiences of traditional bullying victimization and cyber-teasing and the sociodemographic characteristics of a sample composed of college students in Spain. In the fall of 2014, 543 sixth-grade students from southeast Spain completed an anonymous survey on their experience of both kinds of to ascertain any relationship with sociodemographic characteristics, including gender, nationality, economic problems, family conflicts and alcohol and cannabis use. A total of 62.2% of the students reported to having suffered traditional bullying victimization and 52.7% reported that they had been subject to cyber-teasing. 40.7% of participants had been victims of traditional bullying victimization and cyber-teasing in the past 12 months. Most (65.7%) of the victims were at the same time cyber-teasing victims; 77.6% of cyber-teasing victims were also victimized in a different manner. Traditional bullying victimization was higher among boys than among girls, while female students were more likely to have been subjected to cyber-teasing than male students. The characteristics that most heavily influenced suffering traditional bullying victimization were economic problems, family conflicts and cannabis use. Our findings confirm overlapping results in the risk factors that influence suffering both traditional bullying victimization and cyber-teasing: there was a strong influence of certain sociodemographic and individual characteristics of the college population, suggesting that specific policies are necessary to improve college students' environment in Spain.

  4. Longitudinal predictors of cyber and traditional bullying perpetration in Australian secondary school students

    PubMed Central

    Hemphill, Sheryl A.; Kotevski, Aneta; Tollit, Michelle; Smith, Rachel; Herrenkohl, Todd I.; Toumbourou, John W.; Catalano, Richard F.

    2013-01-01

    Purpose Cyber bullying perpetration (using communication technology to engage in bullying) is a recent phenomenon that has generated much concern. There are few prospective longitudinal studies of cyber bullying. The current paper examines the individual, peer, family and school risk factors for both cyber and traditional bullying (the latter is bullying that does not utilize technology) in adolescents. Methods This paper draws on a rich data set from the International Youth Development Study, a longitudinal study of students in Victoria, Australia and Washington State, United States, which began in 2002. In this paper, data from almost 700 Victorian students recruited in Grade 5 is analyzed to examine Grade 7 (aged 12-13 years) predictors of traditional and cyber bullying perpetration in Grade 9 (aged 14-15 years). Results Fifteen per cent of students engaged in cyber bullying, 21% in traditional bullying and 7% in both. There are similarities and important differences in the predictors of cyber and traditional bullying. In the fully adjusted model, only prior engagement in relational aggression (a covert form of bullying such as spreading rumors about another student) predicted cyber bullying perpetration. For traditional bullying, previous relational aggression was also predictive, as was having been a victim and perpetrator of traditional bullying, family conflict, and academic failure. Conclusions The use of evidence-based bullying prevention programs is supported to reduce experiences of all forms of bullying perpetration(cyber, traditional, and relational aggression). In addition, for traditional bullying perpetration, addressing family conflict and student academic support are also important. PMID:22727078

  5. 78 FR 11737 - Improving Critical Infrastructure Cybersecurity

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-19

    ... of America, it is hereby ordered as follows: Section 1. Policy. Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cybersecurity. The cyber threat to critical... cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety...

  6. 77 FR 38306 - GFIRST Conference Stakeholder Evaluation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-27

    ...), National Cyber Security Division (NCSD), United States Computer Emergency Readiness Team (US-CERT) will...- CERT, [email protected] . SUPPLEMENTARY INFORMATION: GFIRST is DHS's premier cyber conference and continually seeks to enhance collaborative efforts among cyber constituencies, partners, and stakeholders. The...

  7. Cyber crimes.

    PubMed

    Nuzback, Kara

    2014-07-01

    Since it began offering cyber liability coverage in December 2011, the Texas Medical Liability Trust has received more than 150 cyber liability claims, most of which involved breaches of electronic protected health information. TMLT's cyber liability insurance will protect practices financially should a breach occur. The insurance covers a breach notification to customers and business partners, expenses for legal counsel, information security and forensic data services, public relations support, call center and website support, credit monitoring, and identity theft restoration services.

  8. Does It Matter How the U.S. Army Organizes To Deal with Cyber Threats?

    DTIC Science & Technology

    2013-12-10

    document “Joint Operating Environment 2010” conceptualizes the cyber domain into three layers: the physical layer, the logical layer, and the social ...the network of nodes; and the social layer consists of the human and cognitive aspects of the cyber domain.14 The layers of the cyber domain...Innovations and Organizations. (1973), 131. Expanding upon the findings of Zaltman et al., social scientists developed a model to illustrate four

  9. Cyber as a Team Sport: Operationalizing a Whole-Of-Government Approach to Cyberspace Operations

    DTIC Science & Technology

    2011-06-07

    July 2010-7 June 2011 4. TITLE AND SUBTITLE • -~ ·- ~ I 5a. CONTRACT NUMBER CYBER AS A "TEAM SPORT ": OPERATIONALIZING A WHOLE-OF-GOVERNMENT APPROACH...JOINT FORCES STAFF COLLEGE JOINT ADVANCED WARFIGHTING SCHOOL CYBER AS A “TEAM SPORT ”: OPERATIONALIZING A WHOLE-OF- GOVERNMENT APPROACH...TO CYBERSPACE OPERATIONS by Elizabeth A. Myers Department of Defense CYBER AS A "TEAM SPORT ": OPERATIONALIZING A WHOLE-OF· GOVERNMENT

  10. RFID as a Tool in Cyber Warfare

    DTIC Science & Technology

    2010-11-01

    RTO-MP-IST-091 P4 - 1 RFID as a Tool in Cyber Warfare Mikko Kiviharju P.O.Box 10 FIN-11311 Riihimaki FINLAND mikko.kiviharju@mil.fi...auditing existing systems and planning new establishments. 1 INTRODUCTION Cyber warfare , especially computer network operations (CNO) have a deep...SUBTITLE RFID as a Tool in Cyber Warfare 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK

  11. Emerging Roles of Combat Communication Squadrons in Cyber Warfare as Related to Computer Network Attack, Defense and Exploitation

    DTIC Science & Technology

    2011-06-01

    EMERGING ROLES OF COMBAT COMMUNICATION SQUADRONS IN CYBER WARFARE AS RELATED TO COMPUTER NETWORK ATTACK, DEFENSE AND EXPLOITATION GRADUATE RESEARCH...Communication Squadrons in Cyber Warfare as Related to Computer Network Attack, Defense and Exploitation GRADUATE RESEARCH PROJECT Presented to the Faculty...Education and Training Command In Partial Fulfillment of the Requirements for the Degree of Master of Cyber Warfare Michael J. Myers Major, USAF June 2011

  12. Department of Defense Information Network (DODIN): A Study of Current Cyber Threats and Best Practices for Network Security

    DTIC Science & Technology

    2016-06-10

    DODIN) is being threatened by state actors, non-state actors, and continuous hacking and cyber-attacks. These threats against the network come in a...variety of forms; physical attacks from radio jamming, logical cyber threats from hacking , or a combination of both physical and logical attacks. Each...year the number of hacking attacks is increasing. Corporations like Symantec publish annual reports on cyber threats and provide tips for best

  13. CORESAFE: A Formal Approach against Code Replacement Attacks on Cyber Physical Systems

    DTIC Science & Technology

    2018-04-19

    AFRL-AFOSR-JP-TR-2018-0035 CORESAFE:A Formal Approach against Code Replacement Attacks on Cyber Physical Systems Sandeep Shukla INDIAN INSTITUTE OF...Formal Approach against Code Replacement Attacks on Cyber Physical Systems 5a.  CONTRACT NUMBER 5b.  GRANT NUMBER FA2386-16-1-4099 5c.  PROGRAM ELEMENT...Institute of Technology Kanpur India Final Report for AOARD Grant “CORESAFE: A Formal Approach against Code Replacement Attacks on Cyber Physical

  14. NATO’s Options for Defensive Cyber Against Non-State Actors

    DTIC Science & Technology

    2013-04-01

    services to cyber criminals and hacker patriots.”33 The FSB had maintained an unsavory relationship with hackers since the early 1990s; 9 Oleg...responsibility under international law to stop the DDOS being facilitated by botnet controllers located within its geographic borders, and prosecute the cyber ... criminals involved. “Rule 5” of the Tallinn Manual addresses the cyber responsibility of a nation-state: “A State shall not knowingly allow the

  15. CYBER THREAT AWARENESS FOR THE WARFIGHTER

    DTIC Science & Technology

    2016-02-16

    Writing on the future of cyber warfare, Col William Poirier and Maj James Lotspeich posit that eventually advances in the Air Force’s cyber...Defending the Walls,” 3. 7 Col William J. Poirier and Maj James Lotspeich, “Air Force Cyber Warfare - Now and the Future,” Air and Space Power Journal 27...and Associated Terms, 8 November 2010. http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf. Poirier , Col William J., and Lotspeich, Maj James. “Air

  16. Advanced Cyber Industrial Control System Tactics, Techniques, and Procedures (ACI TTP) for Department of Defense (DOD) Industrial Control Systems (ICS)

    DTIC Science & Technology

    2016-08-10

    enable JCS managers to detect advanced cyber attacks, mitigate the effects of those attacks, and recover their networks following an attack. It also... managers of ICS networks to Detect, Mitigate, and Recover from nation-state-level cyber attacks (strategic, deliberate, well-trained, and funded...Successful Detection of cyber anomalies is best achieved when IT and ICS managers remain in close coordination. The Integrity Checks Table

  17. 7 Key Challenges for Visualization in Cyber Network Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Best, Daniel M.; Endert, Alexander; Kidwell, Dan

    In this paper we present seven challenges, informed by two user studies, to be considered when developing a visualization for cyber security purposes. Cyber security visualizations must go beyond isolated solutions and “pretty picture” visualizations in order to make impact to users. We provide an example prototype that addresses the challenges with a description of how they are met. Our aim is to assist in increasing utility and adoption rates for visualization capabilities in cyber security.

  18. Impact of a Participatory Cyber Crime Prevention Programme on Secondary School Students' Attainment in Crime Prevention Concepts in Civic Education and Social Studies

    ERIC Educational Resources Information Center

    Amosun, Peter Adewale; Ige, Olugbenga Adedayo; Choo, Kim-Kwang Raymond

    2015-01-01

    Nigeria is considered by many to be a cyber crime hot spot, and is often ranked among the world's top cyber crime committing countries (e.g. advanced fee fraud is also known as Nigerian scams and 419 scams--419 is a section under the Nigerian Criminal Code Act that prohibits obtaining goods by false pretences). We designed a cyber crime prevention…

  19. The psychological effects of cyber terrorism.

    PubMed

    Gross, Michael L; Canetti, Daphna; Vashdi, Dana R

    2016-01-01

    When ordinary citizens think of cyber threats, most are probably worried about their passwords and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as physical destruction, and our research has found that, depending on who the attackers and the victims are, the psychological effects of cyber threats can rival those of traditional terrorism.

  20. Rapid Delivery of Cyber Capabilities: Evaluation of the Requirement for a Rapid Cyber Acquisition Process

    DTIC Science & Technology

    2012-06-01

    record (PoR) to give both a quantitative and qualitative perspective on the rapid cyber acquisitions framework . It also investigates if cyber operations...acquisition is a complex topic that does not yet have a solidified framework . To scope this research, a comprehensive review of past, present and...for AT&L is working with the DoD cyberspace community to develop a common framework for Services and Agencies to acquire capabilities for cyberspace

  1. Development of Self Fire Retardant Melamine-Animal Glue Formaldehyde (MGF) Resin for the Manufacture of BWR Ply Board

    NASA Astrophysics Data System (ADS)

    Khatua, Pijus Kanti; Dubey, Rajib Kumar; Roymahapatra, Gourisankar; Mishra, Anjan; Shahoo, Shadhu Charan; Kalawate, Aparna

    2017-10-01

    Wood is one of the most sustainable, naturally growing materials that consist mainly of combustible organic carbon compounds. Since plywood are widely used nowadays especially in buildings, furniture and cabinets. Too often the fire behavior of ply-board may be viewed as a drawback. Amino-plastic based thermosetting resin adhesives are the important and most widely used in the plywood panel industries. The fire retardant property of wood panel products by adding animal glue as an additive in the form of MGF resin and used as substitute of melamine for manufacture of plywood. Environment concerns and higher cost of petroleum based resins have resulted in the development of technologies to replace melamine partially by biomaterials for the manufacturing of resin adhesive. Natural bio-based materials such as tannin, CNSL (cardanol), lignin, soya etc. are used as partial substitution of melamine. This article presents the development of melamine-animal glue formaldehyde resin as plywood binder. About 30 % melamine was substituted by animal glue and optimized. The different physico-mechanical and fire retardant property properties tested as per IS: 1734-1983 and IS: 5509-2000 respectively are quite satisfactory. The production of adhesive from melamine with compatible natural proteinous material is cost effective, eco-friendly and enhance the fire retardant property.

  2. Cyber Warfare: Protecting Military Systems

    DTIC Science & Technology

    2000-01-01

    Software is a key component in nearly every critical system used by the Department of Defense. Attacking the software in a system- cyber warfare - is a...revolutionary method of pursuing war. This article describes various cyber warfare approaches and suggests methods to counter them.

  3. 32 CFR 236.2 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE... defense information. (e) Cyber incident means actions taken through the use of computer networks that... residing therein. (f) Cyber intrusion damage assessment means a managed, coordinated process to determine...

  4. 32 CFR 236.2 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE... defense information. (e) Cyber incident means actions taken through the use of computer networks that... residing therein. (f) Cyber intrusion damage assessment means a managed, coordinated process to determine...

  5. 77 FR 72673 - Critical Infrastructure Protection and Resilience Month, 2012

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-05

    .... Cyber incidents can have devastating consequences on both physical and virtual infrastructure, which is... work within existing authorities to fortify our country against cyber risks, comprehensive legislation remains essential to improving infrastructure security, enhancing cyber information sharing between...

  6. 77 FR 12320 - Information Collection Request: GFIRST Conference Stakeholder Evaluation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-29

    ... Communications (CS&C), National Cyber Security Division (NCSD), United States Computer Emergency Readiness Team... personal information provided. SUPPLEMENTARY INFORMATION: The purpose of DHS's premier cyber conference is to continually seek to enhance collaborative efforts between cyber constituencies, partners and...

  7. 48 CFR 204.7302 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... cyber incidents that affect unclassified controlled technical information resident on or transiting... the clause at 252.204-7012, Safeguarding of Unclassified Controlled Technical Information. (2) A cyber... at 252.204-7012. When a cyber incident is reported, the contracting officer shall consult with a...

  8. Evaluation of a complementary cyber education program for a pathophysiology class.

    PubMed

    Yoo, Ji-Soo; Ryue, Sook-Hee; Lee, Jung Eun; Ahn, Jeong-Ah

    2009-12-01

    The goal of this study was to develop and evaluate a complementary cyber education program for a required pathophysiology class for nursing students. The cyber education program comprised electronic bulletin boards, correspondence material storage, an announcement section, a report submission section, reference sites, and statistics on learning rates. Twelve online lectures complemented five lectures in the classroom. To evaluate the course's educational effectiveness, we performed an online objective questionnaire and an open questionnaire survey anonymously, and compared the complementary cyber education program with traditional classroom education. The complementary cyber education program effected significant improvements in scores for importance with regard to major, clarity of goals and education plans for courses, professor readiness, preciseness and description of lectures, amount and efficiency of assignments, and fairness in appraisal standards compared with the traditional classroom education group. This study indicates that a complementary cyber education program provides nursing students with the flexibility of time and space, the newest information through updated lectures, efficient motivational aids through intimacy between the lecturer and students, and concrete and meaningful tasks. The complementary cyber education course also increased student effort toward studying and student satisfaction with the class.

  9. Cyber Operations and Cyber Terrorism

    DTIC Science & Technology

    2005-08-15

    available from http://www.geocities.com/ Area51 /Shadowlands/6583/project395.html; Internet; accessed 14 April 2004. DCSINT Handbook 1.02, Cyber...www.geocities.com/ Area51 /Shadowlands/6583/project395.html; Internet; Accessed 14 April 2004. Raufer, Xavier. “New World Disorder, New

  10. Cyber War: The Next Frontier for NATO

    DTIC Science & Technology

    2015-03-01

    cyber-attacks as a way to advance their agenda. Common examples of cyber- attacks include computer viruses, worms , malware, and distributed denial of...take advantage of security holes and cause damage to computer systems, steal financial data, or acquire sensitive secrets. As technology becomes

  11. 32 CFR 236.2 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... DEPARTMENT OF DEFENSE (DoD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE... information. (e) Cyber incident means actions taken through the use of computer networks that result in an...) Cyber intrusion damage assessment means a managed, coordinated process to determine the effect on...

  12. 76 FR 58730 - Version 4 Critical Infrastructure Protection Reliability Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-22

    ... provide a cybersecurity framework for the identification and protection of ``Critical Cyber Assets'' to... the identification and documentation of Critical Cyber Assets associated with Critical Assets that... Standards provide a cybersecurity framework for the identification and protection of ``Critical Cyber Assets...

  13. 78 FR 53736 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-30

    ...: Title, Associated Form and OMB Number: Defense Industrial Base Cyber Security/Information Assurance (DIB CS/IA) Cyber Incident Reporting; OMB Control Number 0704-0489. Type of Request: Reinstatement without.... The requested information supports the collaborative cyber threat information sharing and incident...

  14. 75 FR 35508 - Draft Regulatory Guide: Issuance, Availability

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-22

    ... Systems and Networks,'' requires licensees to develop cyber-security plans and programs to protect critical digital assets, including digital safety systems, from malicious cyber attacks. Regulatory Guide 5.71, ``Cyber Security Programs for Nuclear Facilities,'' provides guidance to meet the requirements of...

  15. Bridging the Gap in the Realm of Information Dominance: A Concept of Operations for the Naval Postgraduate School Center for Cyber Warfare

    DTIC Science & Technology

    2010-09-01

    THE REALM OF INFORMATION DOMINANCE : A CONCEPT OF OPERATIONS FOR THE NAVAL POSTGRADUATE SCHOOL CENTER FOR CYBER WARFARE by Cynthia R. Duke...Bridging the Gap in the Realm of Information Dominance : A Concept of Operations for the Naval Postgraduate School Center for Cyber Warfare 6...of importance to the U.S. Military service and its allies. 15. NUMBER OF PAGES 102 14. SUBJECT TERMS Cyber Warfare, Information Dominance 16

  16. The psychological effects of cyber terrorism

    PubMed Central

    Gross, Michael L.; Canetti, Daphna; Vashdi, Dana R.

    2016-01-01

    When ordinary citizens think of cyber threats, most are probably worried about their passwords and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as physical destruction, and our research has found that, depending on who the attackers and the victims are, the psychological effects of cyber threats can rival those of traditional terrorism. PMID:28366962

  17. Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation

    DTIC Science & Technology

    2009-10-09

    Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation Prepared for The US-China Economic and...the People?s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT...Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation 2 US-China Economic and Security Review

  18. Cyber risk and privacy liability: a click in the right direction?

    PubMed

    McDonough, William J

    2007-01-01

    Cyber risk and privacy exposure exert an impact upon virtually every aspect of a healthcare organization (HCO)--assets, clinical operations, finances and reputation. Exposure is enterprise-wide and includes risk to both physical and non-physical assets in increasing degrees. The consequences of a cyber attack or privacy breach could be operationally and financially catastrophic, so an HCO's move toward an enterprise-wide approach at identifying and minimizing risk, cyber and privacy liability should be on the radar screen for risk managers and leadership.

  19. Expanding the Department of Defense’s Role in Cyber Civil Support

    DTIC Science & Technology

    2011-06-17

    vulnerability of this very crucial domain. They include the Y2K problem, the Estonia cyber-attacks in 2007, and the role of cyber in the Russian-Georgia...cyber security vulnerabilities associated with critical infrastructure. The Year 2000 Challenge The Year 2000 ( Y2K ) problem was the result of...and microprocessors failed to make the correct transition from 1999 to 2000.19 One of the most critical concerns with Y2K was the potential cascading

  20. Implementation experiences of NASTRAN on CDC CYBER 74 SCOPE 3.4 operating system

    NASA Technical Reports Server (NTRS)

    Go, J. C.; Hill, R. G.

    1973-01-01

    The implementation of the NASTRAN system on the CDC CYBER 74 SCOPE 3.4 Operating System is described. The flexibility of the NASTRAN system made it possible to accomplish the change with no major problems. Various sizes of benchmark and test problems, ranging from two hours to less than one minute CP time were run on the CDC CYBER SCOPE 3.3, Univac EXEC-8, and CDC CYBER SCOPE 3.4. The NASTRAN installation deck is provided.

  1. Longwall top coal caving (LTCC) mining technologies with roof softening by hydraulic fracturing method

    NASA Astrophysics Data System (ADS)

    Klishin, V.; Nikitenko, S.; Opruk, G.

    2018-05-01

    The paper discusses advanced top coal caving technologies for thick coal seams and addresses some issues of incomplete coal extraction, which can result in the environmental damage, landscape change, air and water pollution and endogenous fires. The authors put forward a fundamentally new, having no equivalent and ecology-friendly method to difficult-to-cave roof coal – directional hydraulic fracturing and nonexplosive disintegration.

  2. Like Fire to Water: Building Bridging Collaborations between Disability Service Providers and Course Instructors to Create User Friendly and Resource Efficient UDL Implementation Material

    ERIC Educational Resources Information Center

    Fovet, Frederic; Jarrett, Tynan; Mole, Heather; Syncox, David

    2014-01-01

    This study presents a post-secondary campus experience with systematic and global promotion of Universal Design for Learning. It analyzes data collected over a 24 months period, relating to course instructors' responses to the framework, through the lens of the initial hypothesis that successes and failures in adoption might be explained by the…

  3. 2007 Disruptive Technologies Conference - Disruptive Technologies: Turning Lists into Capabilities

    DTIC Science & Technology

    2007-09-05

    Privilege management • Health care, benefits, finance , time and attendance, etc. • Military operations – “Combat Identification” • Friend, Foe, Neutral...Logistics Influence Force Support Corporate Mgt & Support N o im pl ie d pr io ri ti za ti on Movement & Maneuver Surface Warfare Joint Fires Undersea...Starter Generator MEMS Actuators / Valves Atomizer Nozzles Reclaimed Electrical Heat Engine UC Berkely Wankel Engine Exhaust Thermo Electric/Others

  4. Suomi NPP VIIRS active fire product status

    NASA Astrophysics Data System (ADS)

    Ellicott, E. A.; Csiszar, I. A.; Schroeder, W.; Giglio, L.; Wind, B.; Justice, C. O.

    2012-12-01

    We provide an overview of the evaluation and development of the Active Fires product derived from the Visible Infrared Imager Radiometer Suite (VIIRS) sensor on the Suomi National Polar-orbiting Partnership (SNPP) satellite during the first year of on-orbit data. Results from the initial evaluation of the standard SNPP Active Fires product, generated by the SNPP Interface Data Processing System (IDPS), supported the stabilization of the VIIRS Sensor Data Record (SDR) product. This activity focused in particular on the processing of the dual-gain 4 micron VIIRS M13 radiometric measurements into 750m aggregated data, which are fundamental for active fire detection. Following the VIIRS SDR product's Beta maturity status in April 2012, correlative analysis between VIIRS and near-simultaneous fire detections from the Moderate Resolution Imaging Spectroradiometer (MODIS) on the NASA Earth Observing System Aqua satellite confirmed the expected relative detection rates driven primarily by sensor differences. The VIIRS Active Fires Product Development and Validation Team also developed a science code that is based on the latest MODIS Collection 6 algorithm and provides a full spatially explicit fire mask to replace the sparse array output of fire locations from a MODIS Collection 4 equivalent algorithm in the current IDPS product. The Algorithm Development Library (ADL) was used to support the planning for the transition of the science code into IDPS operations in the future. Product evaluation and user outreach was facilitated by a product website that provided end user access to fire data in user-friendly format over North America as well as examples of VIIRS-MODIS comparisons. The VIIRS fire team also developed an experimental product based on 375m VIIRS Imagery band measurements and provided high quality imagery of major fire events in US. By August 2012 the IDPS product achieved Beta maturity, with some known and documented shortfalls related to the processing of incorrect SDR input data and to apparent algorithm deficiencies in select observing and environmental conditions.

  5. The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance

    PubMed Central

    Dawson, Jessica; Thomson, Robert

    2018-01-01

    One of the challenges in writing an article reviewing the current state of cyber education and workforce development is that there is a paucity of quantitative assessment regarding the cognitive aptitudes, work roles, or team organization required by cybersecurity professionals to be successful. In this review, we argue that the people who operate within the cyber domain need a combination of technical skills, domain specific knowledge, and social intelligence to be successful. They, like the networks they operate, must also be reliable, trustworthy, and resilient. Defining the knowledge, skills, attributes, and other characteristics is not as simple as defining a group of technical skills that people can be trained on; the complexity of the cyber domain makes this a unique challenge. There has been little research devoted to exactly what attributes individuals in the cyber domain need. What research does exist places an emphasis on technical and engineering skills while discounting the important social and organizational influences that dictate success or failure in everyday settings. This paper reviews the literature on cyber expertise and cyber workforce development to identify gaps and then argues for the important contribution of social fit in the highly complex and heterogenous cyber workforce. We then identify six assumptions for the future of cybersecurity workforce development, including the requirement for systemic thinkers, team players, a love for continued learning, strong communication ability, a sense of civic duty, and a blend of technical and social skill. Finally, we make recommendations for social and cognitive metrics which may be indicative of future performance in cyber work roles to provide a roadmap for future scholars. PMID:29946276

  6. Protecting drinking water utilities from cyberthreats

    DOE PAGES

    Clark, Robert M.; Panguluri, Srinivas; Nelson, Trent D.; ...

    2017-02-01

    Cyber-security challenges have the potential for becoming one of the defining issues of our time. Cyber-attacks have become an ever-increasing threat and the United States (US) Federal Bureau of Investigation (FBI) now ranks cyber-crime as one of its most important law enforcement activities. In addition to the general problems associated with cyber-crime, critical infrastructure (CI) related to energy production, manufacturing, water supply and other systems have come under attack. For example, drinking water utilities are increasingly incorporating computer technology into their routine operations and are therefore increasingly vulnerable to cyber- threats. Systems control and data acquisition (SCADA) systems used tomore » manage automated physical processes essential to water treatment and distribution systems have become standard in medium to large drinking water utilities and in many small water systems. However, even with the application of standard information technology cybersecurity best practices these types of systems have proven to be vulnerable to cyber-attacks. In 2015, the US Department of Homeland Security (DHS) responded to 25 cybersecurity incidents in the Water Sector and to 46 incidents in the Energy Sector. Comparatively, between 2014 and 2015, the reported number of Water Sector incidents actually increased by 78.6% (from 14 to 25). The DHS is in a collaborative partnership with the US Environmental Protection Agency to ensure cybersecurity in the Water Sector. As a result of this partnership a number of guidance documents and techniques have been developed to counter cyber-attacks and minimize cyber vulnerability. These approaches are documented along with a summary of common vulnerabilities. However, a new approach which has great promise in protecting drinking water systems against hacking and cyber-attacks, based on the concept of unidirectional gateways, is presented and discussed.« less

  7. Protecting drinking water utilities from cyberthreats

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Clark, Robert M.; Panguluri, Srinivas; Nelson, Trent D.

    Cyber-security challenges have the potential for becoming one of the defining issues of our time. Cyber-attacks have become an ever-increasing threat and the United States (US) Federal Bureau of Investigation (FBI) now ranks cyber-crime as one of its most important law enforcement activities. In addition to the general problems associated with cyber-crime, critical infrastructure (CI) related to energy production, manufacturing, water supply and other systems have come under attack. For example, drinking water utilities are increasingly incorporating computer technology into their routine operations and are therefore increasingly vulnerable to cyber- threats. Systems control and data acquisition (SCADA) systems used tomore » manage automated physical processes essential to water treatment and distribution systems have become standard in medium to large drinking water utilities and in many small water systems. However, even with the application of standard information technology cybersecurity best practices these types of systems have proven to be vulnerable to cyber-attacks. In 2015, the US Department of Homeland Security (DHS) responded to 25 cybersecurity incidents in the Water Sector and to 46 incidents in the Energy Sector. Comparatively, between 2014 and 2015, the reported number of Water Sector incidents actually increased by 78.6% (from 14 to 25). The DHS is in a collaborative partnership with the US Environmental Protection Agency to ensure cybersecurity in the Water Sector. As a result of this partnership a number of guidance documents and techniques have been developed to counter cyber-attacks and minimize cyber vulnerability. These approaches are documented along with a summary of common vulnerabilities. However, a new approach which has great promise in protecting drinking water systems against hacking and cyber-attacks, based on the concept of unidirectional gateways, is presented and discussed.« less

  8. Cyber and Traditional Bullying Victimization as a Risk Factor for Mental Health Problems and Suicidal Ideation in Adolescents

    PubMed Central

    Bannink, Rienke; Broeren, Suzanne; van de Looij – Jansen, Petra M.; de Waart, Frouwkje G.; Raat, Hein

    2014-01-01

    Purpose To examine whether traditional and cyber bullying victimization were associated with adolescent's mental health problems and suicidal ideation at two-year follow-up. Gender differences were explored to determine whether bullying affects boys and girls differently. Methods A two-year longitudinal study was conducted among first-year secondary school students (N = 3181). Traditional and cyber bullying victimization were assessed at baseline, whereas mental health status and suicidal ideation were assessed at baseline and follow-up by means of self-report questionnaires. Logistic regression analyses were conducted to assess associations between these variables while controlling for baseline problems. Additionally, we tested whether gender differences in mental health and suicidal ideation were present for the two types of bullying. Results There was a significant interaction between gender and traditional bullying victimization and between gender and cyber bullying victimization on mental health problems. Among boys, traditional and cyber bullying victimization were not related to mental health problems after controlling for baseline mental health. Among girls, both traditional and cyber bullying victimization were associated with mental health problems after controlling for baseline mental health. No significant interaction between gender and traditional or cyber bullying victimization on suicidal ideation was found. Traditional bullying victimization was associated with suicidal ideation, whereas cyber bullying victimization was not associated with suicidal ideation after controlling for baseline suicidal ideation. Conclusions Traditional bullying victimization is associated with an increased risk of suicidal ideation, whereas traditional, as well as cyber bullying victimization is associated with an increased risk of mental health problems among girls. These findings stress the importance of programs aimed at reducing bullying behavior, especially because early-onset mental health problems may pose a risk for the development of psychiatric disorders in adulthood. PMID:24718563

  9. Cyber and traditional bullying victimization as a risk factor for mental health problems and suicidal ideation in adolescents.

    PubMed

    Bannink, Rienke; Broeren, Suzanne; van de Looij-Jansen, Petra M; de Waart, Frouwkje G; Raat, Hein

    2014-01-01

    To examine whether traditional and cyber bullying victimization were associated with adolescent's mental health problems and suicidal ideation at two-year follow-up. Gender differences were explored to determine whether bullying affects boys and girls differently. A two-year longitudinal study was conducted among first-year secondary school students (N = 3181). Traditional and cyber bullying victimization were assessed at baseline, whereas mental health status and suicidal ideation were assessed at baseline and follow-up by means of self-report questionnaires. Logistic regression analyses were conducted to assess associations between these variables while controlling for baseline problems. Additionally, we tested whether gender differences in mental health and suicidal ideation were present for the two types of bullying. There was a significant interaction between gender and traditional bullying victimization and between gender and cyber bullying victimization on mental health problems. Among boys, traditional and cyber bullying victimization were not related to mental health problems after controlling for baseline mental health. Among girls, both traditional and cyber bullying victimization were associated with mental health problems after controlling for baseline mental health. No significant interaction between gender and traditional or cyber bullying victimization on suicidal ideation was found. Traditional bullying victimization was associated with suicidal ideation, whereas cyber bullying victimization was not associated with suicidal ideation after controlling for baseline suicidal ideation. Traditional bullying victimization is associated with an increased risk of suicidal ideation, whereas traditional, as well as cyber bullying victimization is associated with an increased risk of mental health problems among girls. These findings stress the importance of programs aimed at reducing bullying behavior, especially because early-onset mental health problems may pose a risk for the development of psychiatric disorders in adulthood.

  10. Empirical analysis of the effects of cyber security incidents.

    PubMed

    Davis, Ginger; Garcia, Alfredo; Zhang, Weide

    2009-09-01

    We analyze the time series associated with web traffic for a representative set of online businesses that have suffered widely reported cyber security incidents. Our working hypothesis is that cyber security incidents may prompt (security conscious) online customers to opt out and conduct their business elsewhere or, at the very least, to refrain from accessing online services. For companies relying almost exclusively on online channels, this presents an important business risk. We test for structural changes in these time series that may have been caused by these cyber security incidents. Our results consistently indicate that cyber security incidents do not affect the structure of web traffic for the set of online businesses studied. We discuss various public policy considerations stemming from our analysis.

  11. How is cyber threat evolving and what do organisations need to consider?

    PubMed

    Borrett, Martin; Carter, Roger; Wespi, Andreas

    Organisations and members of the public are becoming accustomed to the increasing velocity, frequency and variety of cyber-attacks that they have been facing over the last few years. In response to this challenge, it is important to explore what can be done to offer commercial and private users a reliable and functioning environment. This paper discusses how cyber threats might evolve in the future and seeks to explore these threats more fully. Attention is paid to the changing nature of cyber-attackers and their motivations and what this means for organisations. Finally, useful and actionable steps are provided, which practitioners can use to understand how they can start to address the future challenges of cyber security.

  12. IFIS Model-Plus: A Web-Based GUI for Visualization, Comparison and Evaluation of Distributed Flood Forecasts and Hindcasts

    NASA Astrophysics Data System (ADS)

    Krajewski, W. F.; Della Libera Zanchetta, A.; Mantilla, R.; Demir, I.

    2017-12-01

    This work explores the use of hydroinformatics tools to provide an user friendly and accessible interface for executing and assessing the output of realtime flood forecasts using distributed hydrological models. The main result is the implementation of a web system that uses an Iowa Flood Information System (IFIS)-based environment for graphical displays of rainfall-runoff simulation results for both real-time and past storm events. It communicates with ASYNCH ODE solver to perform large-scale distributed hydrological modeling based on segmentation of the terrain into hillslope-link hydrologic units. The cyber-platform also allows hindcast of model performance by testing multiple model configurations and assumptions of vertical flows in the soils. The scope of the currently implemented system is the entire set of contributing watersheds for the territory of the state of Iowa. The interface provides resources for visualization of animated maps for different water-related modeled states of the environment, including flood-waves propagation with classification of flood magnitude, runoff generation, surface soil moisture and total water column in the soil. Additional tools for comparing different model configurations and performing model evaluation by comparing to observed variables at monitored sites are also available. The user friendly interface has been published to the web under the URL http://ifis.iowafloodcenter.org/ifis/sc/modelplus/.

  13. Reliability analysis for the smart grid : from cyber control and communication to physical manifestations of failure.

    DOT National Transportation Integrated Search

    2010-01-01

    The Smart Grid is a cyber-physical system comprised of physical components, such as transmission lines and generators, and a : network of embedded systems deployed for their cyber control. Our objective is to qualitatively and quantitatively analyze ...

  14. 76 FR 22910 - Agency Information Collection Activities: Submission for Review; Information Collection Request...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-25

    ... (DHS), Science and Technology, CyberForensics Electronic Technology Clearinghouse (CyberFETCH) Program... public to comment on data collection forms for the CyberForensics Electronic Technology Clearinghouse... forensics practitioners from law enforcement, private sector and academia. This clearinghouse will enable...

  15. 76 FR 7870 - Agency Information Collection Activities: Submission for Review; Information Collection Request...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-11

    ... (DHS), Science and Technology, CyberForensics Electronic Technology Clearinghouse (CyberFETCH) Program... public to comment on data collection forms for the CyberForensics Electronic Technology Clearinghouse... forensics practitioners from law enforcement, private sector and academia. This clearinghouse will enable...

  16. 78 FR 66949 - Agency Information Collection Activities: Submission for Review; Information Collection Request...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-07

    ... (DHS), Science and Technology, CyberForensics Electronic Technology Clearinghouse (CyberFETCH) Program... public to comment on data collection forms for the CyberForensics Electronic Technology Clearinghouse... forensics practitioners from law enforcement, private sector and academia. This clearinghouse will enable...

  17. BRI: Cyber Trust and Suspicion

    DTIC Science & Technology

    2017-06-06

    Basis for Trust and Suspicion: Manipulating Insider Threat In Cyber Intelligence & Operations: For 2013, the concepts of Predictability...1 THRUST 1 – A SOCIAL, CULTURAL, AND EMOTIONAL BASIS FOR TRUST AND SUSPICION: MANIPULATING INSIDER THREAT IN CYBER INTELLIGENCE ...APPROACH ......................................... 59 3.1 Cybersecurity with humans in the loop

  18. Cyber-Warfare: Jus Post Bellum

    DTIC Science & Technology

    2015-03-01

    used to design a cyber - warfare jus post bellum framework. It also analyzes analogies to traditional warfare in the damage assessment and aid provided...and the ability to contain and reverse cyberattacks. This thesis proposes a cyber - warfare jus post bellum framework, with emphasis on prevention and

  19. Institutional Foundations for Cyber Security: Current Responses and New Challenges

    DTIC Science & Technology

    2010-09-01

    endowed with regional authority, they remain restricted in their capacity to respond to cyber criminals . National CERTs occupy a first-line responder role...economiccrime/ cybercrime/Documents/CountryProfiles/default_en.asp Federal Bureau of Investigation. (2006). Netting cyber criminals . Retrieved on February

  20. Cyber Power

    DTIC Science & Technology

    2010-05-01

    71 As we saw above, cyber criminals are also a significant current burden on the economy. Looking further ahead, as other states develop their...signed by 27 countries. But at- titudes may change over time if costs exceed benefits. For example, “Russian cyber - criminals no longer follow hands-off

  1. 75 FR 53705 - Science and Technology (S&T) Directorate; Agency Information Collection Activities: Submission...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-01

    ... Defense of Infrastructure Against Cyber Threats (PREDICT) Program AGENCY: Science and Technology... Defense of Infrastructure Against Cyber Threats (PREDICT) initiative. PREDICT is an initiative to... new models, technologies and products that support effective threat assessment and increase cyber...

  2. 32 CFR 236.4 - Procedures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... DEFENSE (DoD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... a recurring basis, and to the greatest extent possible, cyber security information relating to... Office is the overall point of contact for the program. The DoD Cyber Crime Center's DoD-DIB...

  3. 32 CFR 236.4 - Procedures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... a recurring basis, and to the greatest extent possible, cyber security information relating to... Office is the overall point of contact for the program. The DoD Cyber Crime Center's DoD-DIB...

  4. 77 FR 24594 - Version 4 Critical Infrastructure Protection Reliability Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-25

    ... framework for the identification and protection of ``Critical Cyber Assets'' to support the reliable... documentation of Critical Cyber Assets associated with ``Critical Assets'' that support the reliable operation... ``Critical Cyber Assets'' that are associated with ``Critical Assets'' to support the reliable operation of...

  5. 78 FR 39712 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-02

    ... DEPARTMENT OF COMMERCE International Trade Administration Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait Clarification and Amendment AGENCY... cyber-security firms and trade organizations which have not already submitted an application are...

  6. 32 CFR 236.4 - Procedures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... a recurring basis, and to the greatest extent possible, cyber security information relating to... Office is the overall point of contact for the program. The DoD Cyber Crime Center's DoD-DIB...

  7. 77 FR 60607 - National Cybersecurity Awareness Month, 2012

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-04

    ... released the Blueprint for a Secure Cyber Future--a strategic plan to protect government, the private sector, and the public against cyber threats today and tomorrow. As we continue to improve our... infrastructure, facilitating greater cyber information sharing between government and the private sector, and...

  8. Developing information-space Confidence Building Measures (CBMs) between India and Pakistan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yamin, Tughral

    The Internet has changed the world in ways hitherto unknown. The international financial system, air, land and maritime transport systems are all digitally linked. Similarly most militaries are fully or partially networked. This has not only sped up the decision making processes at all levels, it has also rendered these systems vulnerable to cyber-attacks. Cyber-warfare is now recognized as the most potent form of non-kinetic war fighting. In order to prevent large scale network-attacks, cyber-powers are simultaneously spending a lot of time, money and effort to erect redundant cyber-defenses and enhancing their offensive cyber capabilities. Difficulties in creating a stablemore » environment in information-space stem from differing national perceptions regarding the freedom of the Internet, application of international law and problems associated with attribution. This paper discusses a range of Confidence Building Measures that can be created between India and Pakistan in information-space to control malicious cyber behavior and avert an inadvertent war.« less

  9. Virtual Human Role Players for Studying Social Factors in Organizational Decision Making

    PubMed Central

    Khooshabeh, Peter; Lucas, Gale

    2018-01-01

    The cyber domain of military operations presents many challenges. A unique element is the social dynamic between cyber operators and their leadership because of the novel subject matter expertise involved in conducting technical cyber tasks, so there will be situations where senior leaders might have much less domain knowledge or no experience at all relative to the warfighters who report to them. Nonetheless, it will be important for junior cyber operators to convey convincing information relevant to a mission in order to persuade or influence a leader to make informed decisions. The power dynamic will make it difficult for the junior cyber operator to successfully influence a higher ranking leader. Here we present a perspective with a sketch for research paradigm(s) to study how different factors (normative vs. informational social influence, degree of transparency, and perceived appropriateness of making suggestions) might interact with differential social power dynamics of individuals in cyber decision-making contexts. Finally, we contextualize this theoretical perspective for the research paradigms in viable training technologies. PMID:29545759

  10. Disentangling functions of online aggression: The Cyber-Aggression Typology Questionnaire (CATQ).

    PubMed

    Runions, Kevin C; Bak, Michal; Shaw, Thérèse

    2017-01-01

    Aggression in online contexts has received much attention over the last decade, yet there is a need for measures identifying the proximal psychological drivers of cyber-aggressive behavior. The purpose of this study was to present data on the newly developed Cyber-Aggression Typology Questionnaire (CATQ) designed to distinguish between four distinct types of cyber-aggression on dimensions of motivational valence and self-control. A sample 314 undergraduate students participated in the study. The results confirmed the predicted four-factor structure providing evidence for distinct and independent impulsive-aversive, controlled-aversive, impulsive-appetitive, and controlled-appetitive cyber-aggression types. Further analyses with the Berlin Cyberbullying Questionnaire, Reactive Proactive Aggression Questionnaire, and the Behavior Inhibition and Activation Systems Scale provide support for convergent and divergent validity. Understanding the motivations facilitating cyber-aggressive behavior could aid researchers in the development of new prevention and intervention strategies that focus on individual differences in maladaptive proximal drivers of aggression. Aggr. Behav. 43:74-84, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  11. A meta-analysis of the differential relations of traditional and cyber-victimization with internalizing problems.

    PubMed

    Gini, Gianluca; Card, Noel A; Pozzoli, Tiziana

    2018-03-01

    This meta-analysis examined the associations between cyber-victimization and internalizing problems controlling for the occurrence of traditional victimization. Twenty independent samples with a total of 90,877 participants were included. Results confirmed the significant intercorrelation between traditional and cyber-victimization (r = .43). They both have medium-to-large bivariate correlations with internalizing problems. Traditional victimization (sr = .22) and cyber-victimization (sr = .12) were also uniquely related to internalizing problems. The difference in the relations between each type of victimization and internalizing problems was small (differential d = .06) and not statistically significant (p = .053). Moderation of these effect sizes by sample characteristics (e.g., age and proportion of girls) and study features (e.g., whether a definition of bullying was provided to participants and the time frame used as reference) was investigated. Results are discussed within the extant literature on cyber-aggression and cyber-victimization and future directions are proposed. © 2017 Wiley Periodicals, Inc.

  12. Cyber dating abuse: prevalence, context, and relationship with offline dating aggression.

    PubMed

    Borrajo, E; Gámez-Guadix, M; Calvete, E

    2015-04-01

    The use of information and communication technologies (ICT) as tools to intimidate, harass, and control the partner has been, so far, little studied in the literature. The aim of this study was to determine the extension and sex differences of victimization of cyber dating abuse, as well as the context in which it occurs, and its relationship with offline psychological and physical aggressions. The sample consisted of 433 college students ages 18 to 30 years. The results showed that over 50% of the participants had been victims of some type of cyber dating abuse in the last six months. The most common behavior was the use of ICT to control the partner. Also, victims of cyber dating abuse were victimized repeatedly, an average of 23 times in the last six months. The data also showed that cyber dating abuse appear usually in a context of jealousy. Finally, the results revealed a significant relationship between cyber dating abuse and offline psychological dating aggressions. Limitations and future lines of research are discussed.

  13. Cyber Victimization and Internalizing Difficulties: The Mediating Roles of Coping Self-Efficacy and Emotion Dysregulation.

    PubMed

    Trompeter, Nora; Bussey, Kay; Fitzpatrick, Sally

    2018-07-01

    Cyber victimization has consistently been associated with internalizing difficulties in adolescents. However, the underlying psychological mechanisms linking this relationship have not been adequately examined. The present study aimed to investigate the mediational roles of coping self-efficacy and emotion dysregulation in the relationships between cyber victimization with depression and social anxiety. Participants were 459 students (199 girls) from independent middle-class schools in grades 8 (M age  = 13 years 9 months) and 10 (M age  = 15 years 7 months). They completed a self-report questionnaire about cyberbullying participation, internalizing symptoms, coping self-efficacy, and emotion dysregulation. Structural equation modeling revealed that most domains of coping self-efficacy and emotion dysregulation partially mediated the relationship between cyber victimization and depression, and fully mediated the relationship between cyber victimization and social anxiety. The results highlight the importance of targeting these mediating factors in intervention programs to reduce the negative impact of cyber victimization on adolescents.

  14. Measuring Human Performance within Computer Security Incident Response Teams

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. Thesemore » events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.« less

  15. DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDonald, Douglas G.; Clements, Samuel L.; Patrick, Scott W.

    Securing high value and critical assets is one of the biggest challenges facing this nation and others around the world. In modern integrated systems, there are four potential modes of attack available to an adversary: • physical only attack, • cyber only attack, • physical-enabled cyber attack, • cyber-enabled physical attack. Blended attacks involve an adversary working in one domain to reduce system effectiveness in another domain. This enables the attacker to penetrate further into the overall layered defenses. Existing vulnerability assessment (VA) processes and software tools which predict facility vulnerabilities typically evaluate the physical and cyber domains separately. Vulnerabilitiesmore » which result from the integration of cyber-physical control systems are not well characterized and are often overlooked by existing assessment approaches. In this paper, we modified modification of the timely detection methodology, used for decades in physical security VAs, to include cyber components. The Physical and Cyber Risk Analysis Tool (PACRAT) prototype illustrates an integrated vulnerability assessment that includes cyber-physical interdependencies. Information about facility layout, network topology, and emplaced safeguards is used to evaluate how well suited a facility is to detect, delay, and respond to attacks, to identify the pathways most vulnerable to attack, and to evaluate how often safeguards are compromised for a given threat or adversary type. We have tested the PACRAT prototype on critical infrastructure facilities and the results are promising. Future work includes extending the model to prescribe the recommended security improvements via an automated cost-benefit analysis.« less

  16. The Defender's Role in Cyber Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    The embodiment of this work is a table top game to explore cyber security and network defense concepts and cost. The game structure is such that it provides players an immersive environment to play a given role in cyber security to investigate the result of infrastructure and response decisions.

  17. Impacts of Technological Changes in the Cyber Environment on Software/Systems Engineering Workforce Development

    DTIC Science & Technology

    2010-04-01

    for decoupled parallel development Ref: Barry Boehm 12 Impacts of Technological Changes in the Cyber Environment on Software/Systems Engineering... Pressman , R.S., Software Engineering: A Practitioner’s Approach, 13 Impacts of Technological Changes in the Cyber Environment on Software/Systems

  18. Cyberspace Dependence in Air Force Flying Squadrons and its Effect on Mission Assurance

    DTIC Science & Technology

    2010-06-01

    book Managerial Guide for Handling Cyber-Terrorism and Information Warfare, Lech Janczewski and Andrew Colarik advocate the need for organizations...of Cyber Operations,” High Frontier, 5(3): 11-15 (May 2009). Janczewski, Lech and Andrew Colarik. Managerial Guide for Handling Cyber

  19. Proactive Self Defense in Cyberspace

    DTIC Science & Technology

    2009-02-17

    other security measures. A second theme is the continued expansion of cyber crime. Profit is the motivation for these cyber criminals and many of these...lawbreakers are very successful unfortunately. In fact, experts in the computer and network security fields see that in the future, the cyber criminals “will

  20. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  1. Traditional and Cyber Aggressors and Victims: A Comparison of Psychosocial Characteristics

    ERIC Educational Resources Information Center

    Sontag, Lisa M.; Clemans, Katherine H.; Graber, Julia A.; Lyndon, Sarah T.

    2011-01-01

    To date, relatively little is known about differences between perpetrators and victims of cyber and traditional forms of aggression. Hence, this study investigated differences among traditional and cyber aggressors and victims on psychosocial characteristics typically examined in research on traditional aggression and victimization, specifically…

  2. 75 FR 33629 - Agency Information Collection Activities: Submission for Review; Information Collection Request...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-14

    ... Infrastructure against Cyber Threats (PREDICT) Program AGENCY: Science and Technology Directorate, DHS. ACTION... Infrastructure Against Cyber Threats (PREDICT) initiative. PREDICT is an initiative to facilitate the... effective threat assessment and increase cyber security capabilities. (4) An estimate of the total number of...

  3. 77 FR 29616 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-18

    .... DCIO 01 System name: Defense Industrial Base (DIB) Cyber Security/Information Assurance Records. System location: Director, Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program, 1235 South Clark Street, Suite 1500, Arlington, VA 22202. DoD Cyber Crime Center, 911 Elkridge Landing...

  4. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  5. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  6. 3 CFR 8910 - Proclamation 8910 of November 30, 2012. Critical Infrastructure Protection and Resilience Month...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... also its vulnerabilities to emerging threats. Cyber incidents can have devastating consequences on both... against cyber risks, comprehensive legislation remains essential to improving infrastructure security, enhancing cyber information sharing between government and the private sector, and protecting the privacy...

  7. Mechanical Behavior of Recycled Aggregate Concrete-Filled Steel Tubular Columns before and after Fire.

    PubMed

    Liu, Wenchao; Cao, Wanlin; Zhang, Jianwei; Wang, Ruwei; Ren, Lele

    2017-03-09

    Recycled aggregate concrete (RAC) is an environmentally friendly building material. This paper investigates the mechanical behavior of recycled aggregate concrete filled steel tube (RACFST) columns exposed to fire. Two groups of 12 columns were designed and tested, under axial compression, before and after fire, to evaluate the degradation of bearing capacity due to fire exposure. Six specimens were subjected to axial compression tests at room temperature and the other six specimens were subjected to axial compression tests after a fire exposure. The main parameters of the specimens include the wall thickness of the steel tube (steel content) and the type of concrete materials. Several parameters as obtained from the experimental results were compared and analyzed, including the load-bearing capacity, deformation capacity, and failure characteristics of the specimens. Meanwhile, rate of loss of bearing capacity of specimens exposed to fire were calculated based on the standards EC4 and CECS28:90. The results show that concrete material has a large influence on the rate of loss of bearing capacity in the case of a relatively lower steel ratio. While steel content has little effect on the rate of loss of bearing capacity of concrete-filled steel tube (CFST) columns after fire, it has a relatively large influence on the loss rate of bearing capacity of the RACFST columns. The loss of bearing capacity of the specimens from the experiment is more serious than that from the calculation. As the calculated values are less conservative, particular attention should be given to the application of recycled aggregate concrete in actual structures.

  8. Mechanical Behavior of Recycled Aggregate Concrete-Filled Steel Tubular Columns before and after Fire

    PubMed Central

    Liu, Wenchao; Cao, Wanlin; Zhang, Jianwei; Wang, Ruwei; Ren, Lele

    2017-01-01

    Recycled aggregate concrete (RAC) is an environmentally friendly building material. This paper investigates the mechanical behavior of recycled aggregate concrete filled steel tube (RACFST) columns exposed to fire. Two groups of 12 columns were designed and tested, under axial compression, before and after fire, to evaluate the degradation of bearing capacity due to fire exposure. Six specimens were subjected to axial compression tests at room temperature and the other six specimens were subjected to axial compression tests after a fire exposure. The main parameters of the specimens include the wall thickness of the steel tube (steel content) and the type of concrete materials. Several parameters as obtained from the experimental results were compared and analyzed, including the load-bearing capacity, deformation capacity, and failure characteristics of the specimens. Meanwhile, rate of loss of bearing capacity of specimens exposed to fire were calculated based on the standards EC4 and CECS28:90. The results show that concrete material has a large influence on the rate of loss of bearing capacity in the case of a relatively lower steel ratio. While steel content has little effect on the rate of loss of bearing capacity of concrete-filled steel tube (CFST) columns after fire, it has a relatively large influence on the loss rate of bearing capacity of the RACFST columns. The loss of bearing capacity of the specimens from the experiment is more serious than that from the calculation. As the calculated values are less conservative, particular attention should be given to the application of recycled aggregate concrete in actual structures. PMID:28772634

  9. Health implications of cyber-terrorism.

    PubMed

    Clem, A; Galwankar, Sagar; Buck, George

    2003-01-01

    The world is becoming ever more interconnected via the Internet, creating both benefits and disadvantages for human communities. This article examines cyber-terrorism, one of the major negative consequences of the Internet. It also examines the potential impact of cyber-terrorism on the health of populations, its possible perpetrators, and its prevention and control.

  10. Cyber-Cops: Angels on the Net.

    ERIC Educational Resources Information Center

    Educom Review, 1996

    1996-01-01

    Curtis Sliwa, founder of the Guardian Angels citizens' safety patrol, discusses the development of the Cyber Angels, an online citizens' patrol group that monitors Internet communication. Cyber Angels voluntarily look for and report any illegal activity conducted over the Internet, such as pyramid scams, transmission of stolen credit card and…

  11. A Deeper Level of Network Intelligence: Combating Cyber Warfare

    DTIC Science & Technology

    2010-04-01

    A Deeper Level of Network Intelligence: Combating Cyber Warfare This information is provided for your review only and is not for any distribution...A Deeper Level of Network Intelligence: Combating Cyber Warfare 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  12. Defining Deterrence in Cyberspace Working Toward a Framework to Integrate Cyber Deterrence

    DTIC Science & Technology

    2011-04-01

    The goal of deterrence is not to deter the use of a particular weapon. Rather, a nation deters undesirable behavior. Cyber warfare can produce three...associated limitations will not produce a strategically decisive result. Cyber warfare must be used in conjunction with other instruments of power to

  13. ARMY CYBER STRUCTURE ALIGNMENT

    DTIC Science & Technology

    2016-02-16

    Director of Navy Staff Vice Admiral J. M. Bird , Missions, Functions, and Tasks of Commander, U.S. Fleet Cyber Command and Commander, U.S. Tenth Fleet...www.doncio.navy.mil/ContentView.aspx?ID=649. Director of Navy Staff Vice Admiral J. M. Bird , Missions, Functions, and Tasks of Commander, U.S. Fleet Cyber

  14. Cyber Power Potential of the Army’s Reserve Component

    DTIC Science & Technology

    2017-01-01

    and could extend logically to include electric power, water, food, railway, gas pipelines , and so forth. One consideration to note is that in cases...29 CHAPTER FOUR Army Reserve Component Cyber Inventory Analysis .......................... 31...Background and Analytical Framework ........................................................... 31 Army Reserve Component Cyber Inventory Analysis , 2015

  15. Cyber Bullying and Academic Performance

    ERIC Educational Resources Information Center

    Faryadi, Qais

    2011-01-01

    This research investigates the emotional and physiological effects of cyber bullying on the university students. The primary objective of this investigation is to identify the victims of cyber bullying and critically analyze their emotional state and frame of mind in order to provide them with a workable and feasible intervention in fighting cyber…

  16. Cybersecurity Dynamics

    DTIC Science & Technology

    2014-08-20

    of Cybersecurity Dynamics emerged. Intuitively, Cybersecurity Dynamics describes the evolution of cybersecurity state as caused by cyber attack...Dynamics emerged. Intuitively, Cybersecurity Dynamics describes the evolution of cybersecurity state as caused by cyber attack-defense interactions...evolution of cyberse- curity state as caused by cyber attack-defense interactions. By studying Cybersecurity Dynamics, we can characterize the

  17. 76 FR 6637 - Assumption Buster Workshop: Defense-in-Depth Is a Smart Investment for Cyber Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-07

    ... Technology Research and Development (NITRD) Program. ACTION: Call for participation. FOR FURTHER INFORMATION... regulations and restrictions. SUMMARY: The NCO, on behalf of the Special Cyber Operations Research and Engineering (SCORE) Committee, an interagency working group that coordinates cyber security research...

  18. Leaks in the National Information Infrastructure Dam: Who Should Protect It?

    DTIC Science & Technology

    2004-04-01

    have paid off cyber criminals who threatened to attack their computer systems and destroy their data unless a ‘ransom’ was paid. These cyber...sharing information with law enforcement and appropriate industry groups will we be able to identify and prosecute cyber criminals , identify new

  19. Cyberspace: Time to Reassess, Reorganize, and Resource for Evolving Threats

    DTIC Science & Technology

    2012-03-15

    reflecting on what types of cyber activities have the potential to change the strategic landscape. Arguably an attack by cyber criminals on the...their ability to hire or develop hacker talent.18 Nation states can use cyber criminals as a proxy to commit crimes against other nations in an

  20. Method and apparatus for detecting cyber attacks on an alternating current power grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McEachern, Alexander; Hofmann, Ronald

    A method and apparatus for detecting cyber attacks on remotely-operable elements of an alternating current distribution grid. Two state estimates of the distribution grid are prepared, one of which uses micro-synchrophasors. A difference between the two state estimates indicates a possible cyber attack.

  1. Travels With Lynn: September 2010

    Science.gov Websites

    Cyber Security At the Security Defense Allaince Top Story Lynn Details New U.S. Strategy On New Warfare Landstuhl Regional Medical Center Lynn Continues NATO Meetings in Belgium Lynn Attends Cyber Presentation Against ISIL Terrorists Operation Atlantic Resolve Sexual Assault Prevention Asia-Pacific Rebalance Cyber

  2. 75 FR 9563 - Defense Federal Acquisition Regulation Supplement; Safeguarding Unclassified Information (DFARS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-03

    ... and associated contract clauses for the safeguarding, proper handling, and cyber intrusion reporting..., nor does it address cyber intrusion reporting for that information. The purpose of the potential DFARS... to the Government with regard to certain cyber intrusion events that affect DoD information resident...

  3. Cyber-Victimization and Its Psychosocial Consequences: Relationships with Behavior Management and Traditional Bullying

    ERIC Educational Resources Information Center

    Mindrila, Diana; Moore, Lori; Davis, Pamela

    2015-01-01

    The current study investigated the relationship between behavior management, traditional bullying, cyber-victimization, and several psychosocial consequences of cyber-victimization. Findings from previous research were used to specify a complex path model, which allowed the simultaneous estimation of multiple direct and indirect effects. Data were…

  4. Emotional Problems in Traditional and Cyber Victimization

    ERIC Educational Resources Information Center

    Sjursø, Ida Risanger; Fandrem, Hildegunn; Roland, Erling

    2016-01-01

    Previous studies show an association between traditional and cyber victimization. However, there seem to be differences in how these forms of being bullied relates to emotional problems in the victims. Few studies focus on symptoms of general anxiety and depression as separate variables when comparing traditional and cyber victimization.…

  5. 76 FR 72426 - Agency Information Collection Activities: Submission for Review; Information Collection Request...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... (DHS), Science and Technology, Protected Repository for the Defense of Infrastructure Against Cyber... the Defense of Infrastructure against Cyber Threats (PREDICT) program, and is a revision of a... operational data for use in cyber security research and development through the establishment of distributed...

  6. 78 FR 15046 - InfraGard Membership Application and Profile Proposed Collection, Comments Requested; InfraGard...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-08

    ... Department of Justice (DOJ), Federal Bureau of Investigation (FBI), Cyber Division's National Industry... Agent, National Industry Partnerships Unit, Federal Bureau of Investigation, Cyber Division, FBIHQ, 935... Industry Partnership Unit (NIPU) Cyber Division of the Federal Bureau of Investigation (FBI), Department of...

  7. 76 FR 4123 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-24

    .... The closed portions of the meeting will address threats to our homeland security, results of a cyber... designed to keep our country safe. A briefing on the Cyber Storm III Exercise will include lessons learned and vulnerabilities of cyber assets, as well as potential methods to improve a Federal response to a...

  8. 77 FR 63423 - Proposed Collection; Comment Request for Information Collection Tools

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-16

    ... the Authorized Cyber Assistant Host Application form; Form 11-C, Occupational Tax and Register Return... record-keeping requirements: (1) Title: Authorized Cyber Assistant Host Application. OMB Number: 1545-2170. Form Number: N/A. Abstract: The IRS web-based software program, referred to as Cyber Assistant...

  9. 76 FR 62287 - National Cybersecurity Awareness Month, 2011

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-07

    ... ensures a coordinated national response to major disruptive cyber events. This May, we also proposed to... infrastructure. And because we have seen the benefits and risks of cyber- and information-related technologies... public and private sectors to ensure coordinated and planned responses to cyber incidents, as we do with...

  10. 78 FR 13024 - Developing a Framework To Improve Critical Infrastructure Cybersecurity

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-26

    ... review to develop a framework to reduce cyber risks to critical infrastructure \\1\\ (the ``Cybersecurity... processes that align policy, business, and technological approaches to address cyber risks. \\1\\ For the... cyber activity. Such activity is increasing and its consequences can range from theft through disruption...

  11. 3 CFR 13636 - Executive Order 13636 of February 12, 2013. Improving Critical Infrastructure Cybersecurity

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... hereby ordered as follows: Section 1. Policy. Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cybersecurity. The cyber threat to critical infrastructure continues to grow... resilience of the Nation's critical infrastructure and to maintain a cyber environment that encourages...

  12. 76 FR 19333 - Commission Information Collection Activities (FERC-725B); Comment Request; Submitted for OMB Review

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-07

    ... the Bulk-Power System to comply with specific requirements to safeguard critical cyber assets.\\2\\ These standards help protect the nation's Bulk-Power System against potential disruptions from cyber... recordkeeping requirements. Specifically, CIP- 008-1 requires responsible entities to report cyber security...

  13. 78 FR 26654 - Proposed Collection; Comments Requested; Extension of a Currently Approved Collection: InfraGard...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-07

    .... The Department of Justice (DOJ), Federal Bureau of Investigation (FBI), Cyber Division's National... Industry Partnerships Unit, Federal Bureau of Investigation, Cyber Division, FBIHQ, 935 Pennsylvania Avenue... Industry Partnership Unit (NIPU) Cyber Division of the Federal Bureau of Investigation (FBI), Department of...

  14. 77 FR 55864 - Applications and Amendments to Facility Operating Licenses and Combined Licenses Involving...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    .... ML111940200), which approved the RBS Cyber Security Plan and associated implementation milestone schedule. The Cyber Security Plan Implementation Schedule contained in the licensee's letter dated April 4, 2011... consequences of an accident previously evaluated? Response: No. The proposed change to the Cyber Security Plan...

  15. The Relationship between Cyber-Loafing and Internet Addiction

    ERIC Educational Resources Information Center

    Keser, Hafize; Kavuk, Melike; Numanoglu, Gulcan

    2016-01-01

    The goal of this study was to investigate the relationship between preservice teachers' internet addiction level and cyber-loafing activities. This study was conducted as a survey study. Participants of the study was Computer Education and Instructional Technology department students (n = 139) at Ankara University. "Cyber loafing activity…

  16. Cyber Mentoring in an Online Introductory Statistics Course

    ERIC Educational Resources Information Center

    Rashid, Mamunur; Sarkar, Jyotirmoy

    2018-01-01

    Students in an online statistics course were prone to become increasingly disengaged as the semester progressed. In Spring 2015, we took a proactive measure to retain student engagement by introducing a cyber mentoring session. We describe the framework, operation and effectiveness of cyber mentoring in improving students' learning experience and…

  17. Virtual Voices with Real-Life Consequences: Teaching Students about Cyber-Vetting

    ERIC Educational Resources Information Center

    Hanasono, Lisa Kiyomi

    2013-01-01

    Despite its pervasiveness, many students do not realize how online communication can impact their careers and relationships. Cyber-vetting occurs when people use online search engines, social networking sites, and other Internet tools to uncover information about others. Because cyber-vetting is a relatively new concept, most communication…

  18. Analyzing Online Teacher Networks: Cyber Networks Require Cyber Research Tools

    ERIC Educational Resources Information Center

    Schlager, Mark S.; Farooq, Umer; Fusco, Judith; Schank, Patricia; Dwyer, Nathan

    2009-01-01

    The authors argue that conceptual and methodological limitations in existing research approaches severely hamper theory building and empirical exploration of teacher learning and collaboration through cyber-enabled networks. They conclude that new frameworks, tools, and techniques are needed to understand and maximize the benefits of teacher…

  19. Cyber Threat Assessment of Uplink and Commanding System for Mission Operation

    NASA Technical Reports Server (NTRS)

    Ko, Adans Y.; Tan, Kymie M. C.; Cilloniz-Bicchi, Ferner; Faris, Grant

    2014-01-01

    Most of today's Mission Operations Systems (MOS) rely on Ground Data System (GDS) segment to mitigate cyber security risks. Unfortunately, IT security design is done separately from the design of GDS' mission operational capabilities. This incoherent practice leaves many security vulnerabilities in the system without any notice. This paper describes a new way to system engineering MOS, to include cyber threat risk assessments throughout the MOS development cycle, without this, it is impossible to design a dependable and reliable MOS to meet today's rapid changing cyber threat environment.

  20. Realizing situation awareness within a cyber environment

    NASA Astrophysics Data System (ADS)

    Tadda, George; Salerno, John J.; Boulware, Douglas; Hinman, Michael; Gorton, Samuel

    2006-04-01

    Situation Awareness (SA) problems all require an understanding of current activities, an ability to anticipate what may happen next, and techniques to analyze the threat or impact of current activities and predictions. These processes of SA are common regardless of the domain and can be applied to the detection of cyber attacks. This paper will describe the application of a SA framework to implementing Cyber SA, describe some metrics for measuring and evaluating systems implementing Cyber SA, and discuss ongoing work in this area. We conclude with some ideas for future activities.

  1. Realizing Scientific Methods for Cyber Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carroll, Thomas E.; Manz, David O.; Edgar, Thomas W.

    There is little doubt among cyber security researchers about the lack of scientic rigor that underlies much of the liter-ature. The issues are manifold and are well documented. Further complicating the problem is insufficient scientic methods to address these issues. Cyber security melds man and machine: we inherit the challenges of computer science, sociology, psychology, and many other elds and create new ones where these elds interface. In this paper we detail a partial list of challenges imposed by rigorous science and survey how other sciences have tackled them, in the hope of applying a similar approach to cyber securitymore » science. This paper is by no means comprehensive: its purpose is to foster discussion in the community on how we can improve rigor in cyber security science.« less

  2. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    NASA Astrophysics Data System (ADS)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  3. Impact of the ConRed program on different cyberbulling roles.

    PubMed

    Del Rey, Rosario; Casas, José A; Ortega, Rosario

    2016-01-01

    This article presents results from an evaluation of the ConRed cyberbullying intervention program. The program's impacts were separately determined for the different roles within cyberbullying that students can take, i.e., cyber-victims, cyber-bullies, cyber-bully/victims, and bystanders. The ConRed program is a theory-driven program designed to prevent cyberbullying and improve cyberbullying coping skills. It involves students, teachers, and families. During a 3-month period, external experts conducted eight training sessions with students, two with teachers and one with families. ConRed was evaluated through a quasi-experimental design, in which students from three secondary schools were separated into experimental and control groups. The sample comprised 875 students, aged between 11 and 19 years. More students (n = 586) were allocated to the experimental groups at the specific insistence of the management of all schools; the remainder (n = 289) formed the control. Repeated measures MANOVA showed that cyber victims, cyber aggressors and cyberbully/victims reduced their involvement in cyberbullying. Moreover, cyber-victims and bystanders adjusted their perceptions about their control of personal information on the Internet, and cyber aggressors and bystanders reduced their Internet dependence. The ConRed program had stronger effects on male participants, especially in heightening their affective empathy. © 2015 Wiley Periodicals, Inc.

  4. Ever-present threats from information technology: the Cyber-Paranoia and Fear Scale

    PubMed Central

    Mason, Oliver J.; Stevenson, Caroline; Freedman, Fleur

    2014-01-01

    Delusions involving technology, and specifically the internet, are increasingly common, and fear-reality statistics suggest computer-related fears are very widespread. These fears form a continuum from the widely understandable and realistic to the unrealistic, and frankly paranoid. The present study investigated the validity of this construct in a non-clinical population by constructing a novel self-report measure. The new Cyber-Paranoia and Fear Scale aims to measure the perception of information technology-related threats originating from or enabled by computers, smartphones, social networks, and digital surveillance. Psychometric properties of the new Cyber-Paranoia and Fear Scale are reported alongside an established measure of suspiciousness and paranoia in 181 participants including a sub-group of fifty information technology professionals. Exploratory factor analysis suggested the presence of two, related, dimensions that we term cyber-paranoia and cyber-fear. Both sub-scales were internally consistent and produced a normal distribution of scores. The relationships of the sub-scales with age, gender, trait paranoia, digital literacy, and digital inclusion are supportive of construct validity. The distinctiveness of ‘cyber-paranoia’ from general trait paranoia appears to mirror the clinical distinctiveness of ‘internet’ and other technology-fuelled delusions. Knowledge provision to increase technological proficiency and awareness may bring about a reduction in cyber-paranoia. PMID:25505431

  5. Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies.

    PubMed

    Paté-Cornell, M-Elisabeth; Kuypers, Marshall; Smith, Matthew; Keller, Philip

    2018-02-01

    Managing cyber security in an organization involves allocating the protection budget across a spectrum of possible options. This requires assessing the benefits and the costs of these options. The risk analyses presented here are statistical when relevant data are available, and system-based for high-consequence events that have not happened yet. This article presents, first, a general probabilistic risk analysis framework for cyber security in an organization to be specified. It then describes three examples of forward-looking analyses motivated by recent cyber attacks. The first one is the statistical analysis of an actual database, extended at the upper end of the loss distribution by a Bayesian analysis of possible, high-consequence attack scenarios that may happen in the future. The second is a systems analysis of cyber risks for a smart, connected electric grid, showing that there is an optimal level of connectivity. The third is an analysis of sequential decisions to upgrade the software of an existing cyber security system or to adopt a new one to stay ahead of adversaries trying to find their way in. The results are distributions of losses to cyber attacks, with and without some considered countermeasures in support of risk management decisions based both on past data and anticipated incidents. © 2017 Society for Risk Analysis.

  6. Ever-present threats from information technology: the Cyber-Paranoia and Fear Scale.

    PubMed

    Mason, Oliver J; Stevenson, Caroline; Freedman, Fleur

    2014-01-01

    Delusions involving technology, and specifically the internet, are increasingly common, and fear-reality statistics suggest computer-related fears are very widespread. These fears form a continuum from the widely understandable and realistic to the unrealistic, and frankly paranoid. The present study investigated the validity of this construct in a non-clinical population by constructing a novel self-report measure. The new Cyber-Paranoia and Fear Scale aims to measure the perception of information technology-related threats originating from or enabled by computers, smartphones, social networks, and digital surveillance. Psychometric properties of the new Cyber-Paranoia and Fear Scale are reported alongside an established measure of suspiciousness and paranoia in 181 participants including a sub-group of fifty information technology professionals. Exploratory factor analysis suggested the presence of two, related, dimensions that we term cyber-paranoia and cyber-fear. Both sub-scales were internally consistent and produced a normal distribution of scores. The relationships of the sub-scales with age, gender, trait paranoia, digital literacy, and digital inclusion are supportive of construct validity. The distinctiveness of 'cyber-paranoia' from general trait paranoia appears to mirror the clinical distinctiveness of 'internet' and other technology-fuelled delusions. Knowledge provision to increase technological proficiency and awareness may bring about a reduction in cyber-paranoia.

  7. Final Technical Report. Project Boeing SGS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bell, Thomas E.

    Boeing and its partner, PJM Interconnection, teamed to bring advanced “defense-grade” technologies for cyber security to the US regional power grid through demonstration in PJM’s energy management environment. Under this cooperative project with the Department of Energy, Boeing and PJM have developed and demonstrated a host of technologies specifically tailored to the needs of PJM and the electric sector as a whole. The team has demonstrated to the energy industry a combination of processes, techniques and technologies that have been successfully implemented in the commercial, defense, and intelligence communities to identify, mitigate and continuously monitor the cyber security of criticalmore » systems. Guided by the results of a Cyber Security Risk-Based Assessment completed in Phase I, the Boeing-PJM team has completed multiple iterations through the Phase II Development and Phase III Deployment phases. Multiple cyber security solutions have been completed across a variety of controls including: Application Security, Enhanced Malware Detection, Security Incident and Event Management (SIEM) Optimization, Continuous Vulnerability Monitoring, SCADA Monitoring/Intrusion Detection, Operational Resiliency, Cyber Range simulations and hands on cyber security personnel training. All of the developed and demonstrated solutions are suitable for replication across the electric sector and/or the energy sector as a whole. Benefits identified include; Improved malware and intrusion detection capability on critical SCADA networks including behavioral-based alerts resulting in improved zero-day threat protection; Improved Security Incident and Event Management system resulting in better threat visibility, thus increasing the likelihood of detecting a serious event; Improved malware detection and zero-day threat response capability; Improved ability to systematically evaluate and secure in house and vendor sourced software applications; Improved ability to continuously monitor and maintain secure configuration of network devices resulting in reduced vulnerabilities for potential exploitation; Improved overall cyber security situational awareness through the integration of multiple discrete security technologies into a single cyber security reporting console; Improved ability to maintain the resiliency of critical systems in the face of a targeted cyber attack of other significant event; Improved ability to model complex networks for penetration testing and advanced training of cyber security personnel« less

  8. Fires. A Joint Publication for U.S. Artillery Professionals. November - December 2009

    DTIC Science & Technology

    2009-11-01

    Soldiers. This article examines the dynamic that the Generation Y or Millennial population is having on current training practices and whether or not...around or over their Millennial children in everything they do, according to research conducted in 2008 by J. Newman, author of Leading generation Y ... Millennial friendly? By COL James Lackey, Gene Kamena and CPT Robert B. Lackey 41 Intermediate Level Education: helping to combat field artillery

  9. Proposals for Codaer (Combat Data Exchange Relay)

    DTIC Science & Technology

    1949-04-22

    Target Reporting 6 CODAER INDICATORS 7 SHAFT POSITION TRANSMISSION AND CODING 9 OPERATIONS CONTROL 10 AA FIRE COORDINATION 10 INTERSHIP PLOTS 12 RELAY...of providing tactical data on at least 500 different targets or friends. The link should be insensitive to jamming and have a high degree of security...gyrations of high speed air targets. This sets the minimum data repetition rate at about 5 reports per second. Better results, particularly in view of

  10. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard

    2011-07-01

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's abilitymore » to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.« less

  11. Cyber Bullying in ADHD and Asperger Syndrome Populations

    ERIC Educational Resources Information Center

    Kowalski, Robin M.; Fedina, Cristin

    2011-01-01

    Cyber bullying or electronic bullying refers to bullying that occurs through the Internet or cellular phones. With the rise of technology, researchers have shown a keen interest in the topic of cyber bullying. However, that interest has not extended to individuals with special needs. To address this gap in the literature, the current study…

  12. Bullying and Cyber-Bullying in Higher Education: Current Institutional Practice and Prevention

    ERIC Educational Resources Information Center

    Early, Jeremy Scott

    2014-01-01

    Cyber-bullying led a Rutgers University student to commit suicide, which led the Federal government and institutions of higher education to take a closer look at bullying and cyber-bullying on college campuses. Congress introduced the "Tyler Clementi Higher Education Anti-Harassment Act" (Tyler Clementi Act) that would require…

  13. 21st Century Cyber Security: Legal Authorities and Requirements

    DTIC Science & Technology

    2012-03-22

    Cyber warfare has risen to the level of strategic effect. Exigent threats in cyberspace are a critical U.S. strategic vulnerability for which U.S...operations cross many sections of United States Code. But, they have not yielded a genuine whole-of-government approach. This SRP argues that cyber warfare has

  14. Cyber-Bullying: The Situation in Ireland

    ERIC Educational Resources Information Center

    O'Moore, Mona

    2012-01-01

    This paper reports on the first major survey of cyber-bullying undertaken in Ireland. While preliminary results have been published they were based on a smaller and incomplete sample of 12-16 year olds living in Ireland. The preliminary results addressed the incidence level of cyber-bullying and that of the different subcategories of…

  15. 75 FR 76041 - Notice; Applications and Amendments to Facility Operating Licenses Involving Proposed No...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-07

    ... 73.54 are implemented in order to identify, evaluate, and mitigate cyber attacks up to and including... communications systems and networks are protected from cyber attacks. The proposed change requiring the... 10 CFR 73.54 Rule are protected from cyber attacks and has no impact on the probability or...

  16. 77 FR 61433 - Applications and Amendments to Facility Operating Licenses and Combined Licenses Involving...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-09

    ... attacks up to and including the design basis cyber attack threat, thereby achieving high assurance that... provide assurance that safety-related SSCs are protected from cyber attacks. Implementation of 10 CFR 73... of ``high assurance of adequate protection against cyber attacks.'' The proposed revision would not...

  17. CRIS Cyber Range Lexicon, Version 1.0

    DTIC Science & Technology

    2015-11-10

    Figure 4: Planes and Teams...Technology (S&T) experimentation , Developmental and Operational Test and Evaluation (DT&E, OT&E), cyber force training, and mission rehearsal. To...an Event in cyber space . A Range contains a set of assets and capabilities located at one or more sites. A Range has a single Range Manager. A

  18. Reliable Assessment with CyberTutor, a Web-Based Homework Tutor.

    ERIC Educational Resources Information Center

    Pritchard, David E.; Morote, Elsa-Sofia

    This paper demonstrates that an electronic tutoring program can collect data that enables a far more reliable assessment of students' skills than a standard examination. Socratic electronic homework tutor, CyberTutor can integrate effectively instruction and assessment. CyberTutor assessment has about 62 times less variance due to random test…

  19. Cyber Charter Schools: Evolution, Issues, and Opportunities in Funding and Localized Oversight

    ERIC Educational Resources Information Center

    Ellis, Kathleen

    2008-01-01

    Cyber schools, also known as virtual schools, are noteworthy charter school developments that provide viable options for education. Charter schools in general and cyber charter schools in particular are not "revenue neutral" to local school districts. Nationwide, hundreds of millions of dollars allocated for education are being routed…

  20. The game-theoretic national interstate economic model : an integrated framework to quantify the economic impacts of cyber-terrorist behavior.

    DOT National Transportation Integrated Search

    2014-12-01

    This study suggests an integrated framework to quantify cyber attack impacts on the U.S. airport security system. A cyber attack by terrorists on the U.S. involves complex : strategic behavior by the terrorists because they could plan to invade an ai...

  1. Tearing down the Walls: Cyber Charter Schools and the Public Endorsement of Religion

    ERIC Educational Resources Information Center

    Cambre, Belinda M.

    2009-01-01

    States have the ability to regulate cyber charter schools just as they regulate traditional schools, private schools, and homeschooling. The situation becomes trickier in terms of religion. In homeschool settings, parents have the right to deliver religious education to their children. Under "Zelman v. Simmons-Harris" (2002), a cyber charter…

  2. Cyber-Pedocriminality: Characteristics of a Sample of Internet Child Pornography Offenders

    ERIC Educational Resources Information Center

    Niveau, Gerard

    2010-01-01

    Objective: This descriptive study focused on cyber-pedocriminality, a term chosen to describe the phenomenon of child pornography on the internet. Two specific questions were addressed: whether cyber-pedocriminals present with a specific sociodemographic or psychological profile and what type of contents can be found in the criminal material.…

  3. 3 CFR 8427 - Proclamation 8427 of October 1, 2009. National Cybersecurity Awareness Month, 2009

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... solutions at work and at home. Our Nation’s growing dependence on cyber and information-related technologies, coupled with an increasing threat of malicious cyber attacks and loss of privacy, has given rise to the... digital infrastructures. Cyber attacks and their viral ability to infect networks, devices, and software...

  4. Homework in Cyber Schools: An Exploratory Study in an American School

    ERIC Educational Resources Information Center

    Beck, Dennis; Maranto, Robert; Tuchman, Sivan

    2017-01-01

    Research suggests that homework has moderately positive impacts on student learning in brick-and-mortar schools (Marzano & Pickering, 2007), but no prior research has explored such relationships in cyber schools. We surveyed parents (n = 232) and students (n = 269) at an American cyber school, and collected student achievement data. For…

  5. 75 FR 51490 - Notice; Applications and Amendments to Facility Operating Licenses Involving Proposed No...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-20

    ...). The proposed amendment would approve the cyber security plan and implementation schedule, and revise... maintain in effect all provisions of the NRC-approved cyber security plan. Basis for proposed no... [facility operating license] to implement and maintain a Cyber Security Plan as part of Energy Northwest's...

  6. 76 FR 20377 - Applications and Amendments to Facility Operating Licenses Involving Proposed No Significant...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-12

    ... amendment requests approval of the Exelon Cyber Security Plan, provides an Implementation Schedule, and adds... require Exelon to fully implement and maintain in effect all provisions of the approved Cyber Security..., Revision 6, ``Cyber Security Plan for Nuclear Power Reactors.'' Basis for proposed no significant hazards...

  7. Cyber Security Applications: Freeware & Shareware

    ERIC Educational Resources Information Center

    Rogers, Gary; Ashford, Tina

    2015-01-01

    This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…

  8. Indian Adolescents' Cyber Aggression Involvement and Cultural Values: The Moderation of Peer Attachment

    ERIC Educational Resources Information Center

    Wright, Michelle F.; Kamble, Shanmukh V.; Soudi, Shruti P.

    2015-01-01

    Although research on cyberbullying and cyber aggression is growing, little attention has been given to examinations of these behaviors among adolescents in Asian countries, particularly in India. The present study examined the relationships among cyber aggression involvement and cultural values (i.e. individualism, collectivism), along with peer…

  9. 78 FR 63964 - Request for Comments on Draft NIST Interagency Report (NISTIR) 7628 Rev. 1, Guidelines for Smart...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-25

    ... Grid Cyber Security AGENCY: National Institute of Standards and Technology (NIST), Department of... and Technology (NIST) seeks comments on draft NISTIR 7628 Rev. 1, Guidelines for Smart Grid Cyber... (formerly the Cyber Security Working Group) of the Smart Grid Interoperability Panel. The document has been...

  10. 78 FR 28809 - Reserve Forces Policy Board (RFPB); Notice of Federal Advisory Committee Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-16

    ... Assessment and Program Evaluation; the Deputy Commander, U.S. Cyber Command; Dr. Paul Stockton, former...; and the cost to maintain a strong Reserve Component. Additionally, the Deputy Commander, U.S. Cyber Command, will discuss his views on the increased emphasis placed on cyber security and the logical mission...

  11. 10 CFR 73.54 - Protection of digital computer and communication systems and networks.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ....90 of this chapter, a cyber security plan that satisfies the requirements of this section for.... Implementation of the licensee's cyber security program must be consistent with the approved schedule. Current... Commission prior to the effective date of this rule must amend their applications to include a cyber security...

  12. 10 CFR 73.54 - Protection of digital computer and communication systems and networks.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....90 of this chapter, a cyber security plan that satisfies the requirements of this section for.... Implementation of the licensee's cyber security program must be consistent with the approved schedule. Current... Commission prior to the effective date of this rule must amend their applications to include a cyber security...

  13. 3 CFR 8875 - Proclamation 8875 of October 1, 2012. National Cybersecurity Awareness Month, 2012

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... November 2011, we released the Blueprint for a Secure Cyber Future—a strategic plan to protect government, the private sector, and the public against cyber threats today and tomorrow. As we continue to improve... our critical infrastructure, facilitating greater cyber information sharing between government and the...

  14. Cyber Victimization in High School: Measurement, Overlap with Face-to-Face Victimization, and Associations with Social-Emotional Outcomes

    ERIC Educational Resources Information Center

    Brown, Christina Flynn; Demaray, Michelle Kilpatrick; Tennant, Jaclyn E.; Jenkins, Lyndsay N.

    2017-01-01

    Cyber victimization is a contemporary problem facing youth and adolescents (Diamanduros, Downs, & Jenkins, 2008; Kowalski & Limber, 2007). It is imperative for researchers and school personnel to understand the associations between cyber victimization and student social-emotional outcomes. This article explores (a) gender differences in…

  15. 75 FR 65618 - Commission Information Collection Activities (FERC-725B); Comment Request; Extension

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-26

    ... requirements to safeguard critical cyber assets.\\4\\ These standards help protect the nation's Bulk-Power System against potential disruptions from cyber attacks.\\5\\ \\3\\ CIP-002-1, CIP-003-1, CIP-004-1, CIP-005-1, CIP... Cyber Asset Identification. Security Management Controls. Personnel and Training. Electronic Security...

  16. 10 CFR 73.54 - Protection of digital computer and communication systems and networks.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ....90 of this chapter, a cyber security plan that satisfies the requirements of this section for.... Implementation of the licensee's cyber security program must be consistent with the approved schedule. Current... Commission prior to the effective date of this rule must amend their applications to include a cyber security...

  17. Hurtful Cyber-Teasing and Violence: Who's Laughing out Loud?

    ERIC Educational Resources Information Center

    Madlock, Paul E.; Westerman, David

    2011-01-01

    The current study sought to specifically examine the affect of teasing by way of technology (cyber-teasing) and the importance of the redressive component of a tease. A triangulated approach was used here to gain better insight into the concept of "hurtful" cyber-teasing between romantic partners. A pretheoretical model was developed…

  18. 10 CFR 73.54 - Protection of digital computer and communication systems and networks.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ....90 of this chapter, a cyber security plan that satisfies the requirements of this section for.... Implementation of the licensee's cyber security program must be consistent with the approved schedule. Current... Commission prior to the effective date of this rule must amend their applications to include a cyber security...

  19. 77 FR 59627 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-28

    ... purpose of reviewing and deliberating on recommendations by the HSAC's Cyber Skills Task Force. DATES: The.... The HSAC will meet to review and deliberate on the Cyber Skills Task Force report of findings and... details and the Cyber Skills Task Force report will be provided to interested members of the public at the...

  20. Adolescents' Cyber Aggression Perpetration and Cyber Victimization: The Longitudinal Associations with School Functioning

    ERIC Educational Resources Information Center

    Wright, Michelle F.

    2015-01-01

    The literature on cyber aggression is advancing, revealing many risk factors associated with the involvement in these behaviors. Academic correlates, particularly academic performance, have received some attention, with few studies utilizing longitudinal designs. The present study examined these associations among 673 8th graders (51% female) from…

  1. 75 FR 62592 - Applications and Amendments to Facility Operating Licenses Involving Proposed No Significant...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-12

    ... Operating Licenses include: (1) The proposed Cyber Security Plan for CCNPP, Ginna, and NMPNS, (2) an... provisions of the Nuclear Regulatory Commission-approved Cyber Security Plan for CCNPP, Ginna, and NMPNS as... Communication Systems and Networks,'' establish the requirements for a cyber security program. This regulation...

  2. Cyber Aggression: The Relation between Online Offenders and Offline Social Competence

    ERIC Educational Resources Information Center

    Schoffstall, Corrie L.; Cohen, Robert

    2011-01-01

    Children are increasingly using computer technologies to engage in acts of aggression against peers, often termed "cyber aggression". Media reports have sensationalized instances of cyber aggression, and social scientists have begun to examine its characteristics and consequences. Using a younger sample of children than most previous research (192…

  3. 75 FR 68831 - Notice; Applications and Amendments to Facility Operating Licenses Involving Proposed No...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-09

    ...-safeguards information (SUNSI). The amendments would approve the proposed Cyber Security Plan and... Commission-approved Cyber Security Plan as required by 10 CFR 73.54. Basis for proposed no significant... Facility Operating License (FOL) to implement and maintain a Cyber Security Plan as part of the facility's...

  4. 10 CFR 73.54 - Protection of digital computer and communication systems and networks.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ....90 of this chapter, a cyber security plan that satisfies the requirements of this section for.... Implementation of the licensee's cyber security program must be consistent with the approved schedule. Current... Commission prior to the effective date of this rule must amend their applications to include a cyber security...

  5. Constructing a Cyber Preparedness Framework (CPF): The Lockheed Martin Case Study

    ERIC Educational Resources Information Center

    Beyer, Dawn M.

    2014-01-01

    The protection of sensitive data and technologies is critical in preserving United States (U.S.) national security and minimizing economic losses. However, during a cyber attack, the operational capability to constrain the exfiltrations of sensitive data and technologies may not be available. A cyber preparedness methodology (CPM) can improve…

  6. Developing the Cyber Defenders of Tomorrow with Regional Collegiate Cyber Defense Competitions (CCDC)

    ERIC Educational Resources Information Center

    Carlin, Anna; Manson, Daniel P.; Zhu, Jake

    2010-01-01

    With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, recruiting personnel…

  7. Bullying in the New Playground: Research into Cyberbullying and Cyber Victimisation

    ERIC Educational Resources Information Center

    Li, Qing

    2007-01-01

    This study examines the nature and extent of adolescents' cyberbullying experiences, and explores the extent to which various factors, including bullying, culture, and gender, contribute to cyberbullying and cyber victimisation in junior high schools. In this study, one in three adolescents was a cyber victim, one in five was a cyberbully, and…

  8. Mapping developmental precursors of cyber-aggression: trajectories of risk predict perpetration and victimization.

    PubMed

    Modecki, Kathryn L; Barber, Bonnie L; Vernon, Lynette; Vernon, Lynnette

    2013-05-01

    Technologically mediated contexts are social arenas in which adolescents can be both perpetrators and victims of aggression. Yet, there remains little understanding of the developmental etiology of cyber aggression, itself, as experienced by either perpetrators or victims. The current study examines 3-year latent within-person trajectories of known correlates of cyber-aggression: problem behavior, (low) self-esteem, and depressed mood, in a large and diverse sample of youth (N = 1,364; 54.6% female; 12-14 years old at T1). Findings demonstrate that developmental increases in problem behavior across grades 8-10 predict both cyber-perpetration and victimization in grade 11. Developmental decreases in self-esteem also predicted both grade 11 perpetration and victimization. Finally, early depressed mood predicted both perpetration and victimization later on, regardless of developmental change in depressed mood in the interim. Our results reveal a clear link between risky developmental trajectories across the early high school years and later cyber-aggression and imply that mitigating trajectories of risk early on may lead to decreases in cyber-aggression at a later date.

  9. A Markov game theoretic data fusion approach for cyber situational awareness

    NASA Astrophysics Data System (ADS)

    Shen, Dan; Chen, Genshe; Cruz, Jose B., Jr.; Haynes, Leonard; Kruger, Martin; Blasch, Erik

    2007-04-01

    This paper proposes an innovative data-fusion/ data-mining game theoretic situation awareness and impact assessment approach for cyber network defense. Alerts generated by Intrusion Detection Sensors (IDSs) or Intrusion Prevention Sensors (IPSs) are fed into the data refinement (Level 0) and object assessment (L1) data fusion components. High-level situation/threat assessment (L2/L3) data fusion based on Markov game model and Hierarchical Entity Aggregation (HEA) are proposed to refine the primitive prediction generated by adaptive feature/pattern recognition and capture new unknown features. A Markov (Stochastic) game method is used to estimate the belief of each possible cyber attack pattern. Game theory captures the nature of cyber conflicts: determination of the attacking-force strategies is tightly coupled to determination of the defense-force strategies and vice versa. Also, Markov game theory deals with uncertainty and incompleteness of available information. A software tool is developed to demonstrate the performance of the high level information fusion for cyber network defense situation and a simulation example shows the enhanced understating of cyber-network defense.

  10. Evaluation of the SPAR thermal analyzer on the CYBER-203 computer

    NASA Technical Reports Server (NTRS)

    Robinson, J. C.; Riley, K. M.; Haftka, R. T.

    1982-01-01

    The use of the CYBER 203 vector computer for thermal analysis is investigated. Strengths of the CYBER 203 include the ability to perform, in vector mode using a 64 bit word, 50 million floating point operations per second (MFLOPS) for addition and subtraction, 25 MFLOPS for multiplication and 12.5 MFLOPS for division. The speed of scalar operation is comparable to that of a CDC 7600 and is some 2 to 3 times faster than Langley's CYBER 175s. The CYBER 203 has 1,048,576 64-bit words of real memory with an 80 nanosecond (nsec) access time. Memory is bit addressable and provides single error correction, double error detection (SECDED) capability. The virtual memory capability handles data in either 512 or 65,536 word pages. The machine has 256 registers with a 40 nsec access time. The weaknesses of the CYBER 203 include the amount of vector operation overhead and some data storage limitations. In vector operations there is a considerable amount of time before a single result is produced so that vector calculation speed is slower than scalar operation for short vectors.

  11. Cyber incivility @ work: the new age of interpersonal deviance.

    PubMed

    Giumetti, Gary W; McKibben, Eric S; Hatfield, Andrea L; Schroeder, Amber N; Kowalski, Robin M

    2012-03-01

    The current study was designed to extend the interpersonal deviance literature into the online domain by examining the incidence and impact of supervisor cyber incivility and neuroticism on employee outcomes at work. Conservation of Resources (COR) theory was used as the guiding framework because cyber incivility is thought to deplete energetic resources in much the same way that other stressors do, ultimately leading to negative outcomes like burnout. Results indicate that supervisor cyber incivility is positively related to burnout, absenteeism, and turnover intentions. Support was also found for the role of neuroticism as a moderator of the relationship between supervisor cyber incivility and outcomes. In general, the relations between cyber incivility and outcomes were stronger for those individuals reporting higher levels of neuroticism. Results are discussed in terms of COR theory, and possible mechanisms for the role of neuroticism in the stressor-strain relationship are discussed. The current study highlights the importance of understanding workplace online behavior and its impact on employee health and organizational well-being. Future research directions examining online interpersonal deviance are suggested.

  12. Developing the Cyber Victimization Experiences and Cyberbullying Behaviors Scales.

    PubMed

    Betts, Lucy R; Spenser, Karin A

    2017-01-01

    The reported prevalence rates of cyber victimization experiences and cyberbullying behaviors vary. Part of this variation is likely due to the diverse definitions and operationalizations of the constructs adopted in previous research and the lack of psychometrically robust measures. Through 2 studies, the authors developed (Study 1) and evaluated (Study 2) the cyber victimization experiences and cyberbullying behaviors scales. Participants in Study 1 were 393 (122 boys, 171 girls) and in Study 2 were 345 (153 boys, 192 girls) 11-15-year-olds who completed measures of cyber victimization experiences, cyberbullying behaviors, face-to-face victimization experiences, face-to-face bullying behaviors, and social desirability. The 3-factor cyber victimization experiences scale comprised threat, shared images, and personal attack. The 3-factor cyberbullying behaviors scale comprised sharing images, gossip, and personal attack. Both scales demonstrated acceptable internal consistency and convergent validity.

  13. Neural Cognition and Affective Computing on Cyber Language.

    PubMed

    Huang, Shuang; Zhou, Xuan; Xue, Ke; Wan, Xiqiong; Yang, Zhenyi; Xu, Duo; Ivanović, Mirjana; Yu, Xueer

    2015-01-01

    Characterized by its customary symbol system and simple and vivid expression patterns, cyber language acts as not only a tool for convenient communication but also a carrier of abundant emotions and causes high attention in public opinion analysis, internet marketing, service feedback monitoring, and social emergency management. Based on our multidisciplinary research, this paper presents a classification of the emotional symbols in cyber language, analyzes the cognitive characteristics of different symbols, and puts forward a mechanism model to show the dominant neural activities in that process. Through the comparative study of Chinese, English, and Spanish, which are used by the largest population in the world, this paper discusses the expressive patterns of emotions in international cyber languages and proposes an intelligent method for affective computing on cyber language in a unified PAD (Pleasure-Arousal-Dominance) emotional space.

  14. How do Adolescents Learn Cyber-victimization Coping Skills? An Examination of Parent and Peer Coping Socialization.

    PubMed

    Bradbury, Stacey L; Dubow, Eric F; Domoff, Sarah E

    2018-03-13

    Recently, cyber-victimization has become an ever increasing concern for adolescents. Given the negative consequences of cyber-victimization, it is important to understand how adolescents learn strategies to cope (i.e., "coping socialization") with cyber-victimization. The purpose of this study is to understand common coping strategies reported by adolescents, identify from whom youth learn cyber-victimization coping strategies (coaching), and explore how coaching is associated with adolescents' self-reported use of coping. In a sample of 329 adolescents (49% male; 70% white), we found that positive coping strategies (e.g., problem solving, seeking social support) are used most frequently, and adolescents' perceptions of both parent and peer coping socialization is associated with self-reported use of coping. Interventionists can use this information to adapt interventions to include influential positive socializers.

  15. Associations Between Internet Attachment, Cyber Victimization, and Internalizing Symptoms Among Adolescents.

    PubMed

    Holfeld, Brett; Sukhawathanakul, Paweena

    2017-02-01

    With increasing frequency of Internet use among adolescents, there are growing concerns about their risk for becoming attached to these forms of communication and increased vulnerability for negative online experiences, including cyber victimization. The effect of these experiences on adolescent mental health is not well understood. In this study, we examine how Internet attachment is related to anxiety and depression and assess the mediating effect of cyber victimization on these associations. Participants included 1,151 middle school students (51.4 percent males) aged 10 to 16 (M = 12.7, SD = 0.93). Structural equation models show that greater Internet attachment was associated with more cyber victimization and greater symptoms of anxiety and depression. Cyber victimization mediated the associations between Internet attachment and anxiety and between Internet attachment and depression. Implications for online awareness efforts are discussed.

  16. Neural Cognition and Affective Computing on Cyber Language

    PubMed Central

    Huang, Shuang; Zhou, Xuan; Xue, Ke; Wan, Xiqiong; Yang, Zhenyi; Xu, Duo; Ivanović, Mirjana

    2015-01-01

    Characterized by its customary symbol system and simple and vivid expression patterns, cyber language acts as not only a tool for convenient communication but also a carrier of abundant emotions and causes high attention in public opinion analysis, internet marketing, service feedback monitoring, and social emergency management. Based on our multidisciplinary research, this paper presents a classification of the emotional symbols in cyber language, analyzes the cognitive characteristics of different symbols, and puts forward a mechanism model to show the dominant neural activities in that process. Through the comparative study of Chinese, English, and Spanish, which are used by the largest population in the world, this paper discusses the expressive patterns of emotions in international cyber languages and proposes an intelligent method for affective computing on cyber language in a unified PAD (Pleasure-Arousal-Dominance) emotional space. PMID:26491431

  17. Cyber dating abuse among teens using school-based health centers.

    PubMed

    Dick, Rebecca N; McCauley, Heather L; Jones, Kelley A; Tancredi, Daniel J; Goldstein, Sandi; Blackburn, Samantha; Monasterio, Erica; James, Lisa; Silverman, Jay G; Miller, Elizabeth

    2014-12-01

    To estimate the prevalence of cyber dating abuse among youth aged 14 to 19 years seeking care at school-based health centers and associations with other forms of adolescent relationship abuse (ARA), sexual violence, and reproductive and sexual health indicators. A cross-sectional survey was conducted during the 2012-2013 school year (participant n = 1008). Associations between cyber dating abuse and study outcomes were assessed via logistic regression models for clustered survey data. Past 3-month cyber dating abuse was reported by 41.4% of this clinic-based sample. More female than male participants reported cyber dating abuse victimization (44.6% vs 31.0%). Compared with no exposure, low- ("a few times") and high-frequency ("once or twice a month" or more) cyber dating abuse were significantly associated with physical or sexual ARA (low: adjusted odds ratio [aOR] 2.8, 95% confidence interval [CI] 1.8-4.4; high: aOR 5.4, 95% CI 4.0-7.5) and nonpartner sexual assault (low: aOR 2.7, 95% CI 1.3-5.5; high: aOR 4.1, 95% CI 2.8-5.9). Analysis with female participants found an association between cyber dating abuse exposure and contraceptive nonuse (low: aOR 1.8, 95% CI 1.2-2.7; high: aOR 4.1, 95% CI 2.0-8.4) and reproductive coercion (low: aOR 3.0, 95% CI 1.4-6.2; high: aOR 5.7, 95% CI 2.8-11.6). Cyber dating abuse is common and associated with ARA and sexual assault in an adolescent clinic-based sample. The associations of cyber dating abuse with sexual behavior and pregnancy risk behaviors suggest a need to integrate ARA education and harm reduction counseling into sexual health assessments in clinical settings. Copyright © 2014 by the American Academy of Pediatrics.

  18. Cross-Layer Damage Assessment for Cyber Situational Awareness

    NASA Astrophysics Data System (ADS)

    Liu, Peng; Jia, Xiaoqi; Zhang, Shengzhi; Xiong, Xi; Jhi, Yoon-Chan; Bai, Kun; Li, Jason

    Damage assessment plays a very important role in securing enterprise networks and systems. Gaining good awareness about the effects and impact of cyber attack actions would enable security officers to make the right cyber defense decisions and take the right cyber defense actions. A good number of damage assessment techniques have been proposed in the literature, but they typically focus on a single abstraction level (of the software system in concern). As a result, existing damage assessment techniques and tools are still very limited in satisfying the needs of comprehensive damage assessment which should not result in any “blind spots”.

  19. Forecasting European Wildfires Today and in the Future

    NASA Astrophysics Data System (ADS)

    Navarro Abellan, Maria; Porras Alegre, Ignasi; María Sole, Josep; Gálvez, Pedro; Bielski, Conrad; Nurmi, Pertti

    2017-04-01

    Society as a whole is increasingly exposed and vulnerable to natural disasters due to extreme weather events exacerbated by climate change. The increased frequency of wildfires is not only a result of a changing climate, but wildfires themselves also produce a significant amount of greenhouse gases that, in-turn, further contribute to global warming. I-REACT (Improving Resilience to Emergencies through Advanced Cyber Technologies) is an innovation project funded by the European Commission , which aims to use social media, smartphones and wearables to improve natural disaster management by integrating existing services, both local and European, into a platform that supports the entire emergency management cycle. In order to assess the impact of climate change on wildfire hazards, METEOSIM designed two different System Processes (SP) that will be integrated into the I-REACT service that can provide information on a variety of time scales. SP1 - Climate Change Impact The climate change impact on climate variables related to fires is calculated by building an ensemble based on the Coupled Model Intercomparison Project Phase 5 (CMIP5) and CORDEX data. A validation and an Empirical-Statistical Downscaling (ESD) calibration are done to assess the changes in the past of the climatic variables related to wildfires (temperature, precipitation, wind, relative humidity and Fire Weather Index). Calculations in the trend and the frequency of extreme events of those variables are done for three time scales: near-term (2011-2040), mid-term (2041-2070) and long term (2071-2100). SP2 - Operational daily forecast of the Canadian Forest Fire Weather Index (FWI) Using ensemble data from the ECMWF and from the GLAMEPS (multi-model ensemble) models, both supplied by the Finnish Meteorological Institute (FMI), the Fire Weather Index (FWI) and its index components are produced for each ensemble member within a wide forecast time range, from a few hours up to 10 days resulting in a probabilistic output of the FWI for different regions in Europe. This work will improve the currently available information to various wildfire information users such as fire departments, the civil protection, local authorities, etc., where accurate and reliable information in extreme weather situations are vital for improving planning and risk management.

  20. DoD CIO Annual Information Assurance Report

    DTIC Science & Technology

    2000-04-01

    cyber - warfare group, or a cyber-terrorist driven by ideology, religion, or money. The new warfighter is the cyber-warrior with technical and non-traditional skills. Complicating this new dimension is the need for the Department of Defense (DoD) to change its defensive strategy, because of cost and complexity issues, from the risk-avoidance approach to the risk management

  1. Interdependent Risk and Cyber Security: An Analysis of Security Investment and Cyber Insurance

    ERIC Educational Resources Information Center

    Shim, Woohyun

    2010-01-01

    An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…

  2. Google and the "Twisted Cyber Spy" Affair: US-Chinese Communication in an Age of Globalization

    ERIC Educational Resources Information Center

    Hartnett, Stephen John

    2011-01-01

    The "twisted cyber spy" affair began in 2010, when Google was attacked by Chinese cyber-warriors charged with stealing Google's intellectual property, planting viruses in its computers, and hacking the accounts of Chinese human rights activists. In the ensuing international embroglio, the US mainstream press, corporate leaders, and White…

  3. Cyber Astronomy: A Cyber University Course for School Students

    ERIC Educational Resources Information Center

    Chan, C. W.; Wong, K. Y. Michael

    2003-01-01

    Teaching university physics through the internet is not new, but a new course providing the same service for secondary school students is the first of its kind in Hong Kong. Taking advantage of the fast and affordable broadband internet in the region, some university courses have been converted to a cyber curriculum suitable for secondary school…

  4. New Capabilities for Cyber Charter School Leadership: An Emerging Imperative for Integrating Educational Technology and Educational Leadership Knowledge

    ERIC Educational Resources Information Center

    Kowch, Eugene

    2009-01-01

    Cyber charter schools (CCS) and cyber schools may soon become the most "disruptive innovation" in the education system (Christensen, Horn & Johnson, 2008) so the author urges educational technologists to take up the imperative to develop new administration knowledge among the students along with educational technology skills to support future…

  5. Cyber Terrorism: A Study of the Extent of Coverage in Computer Security Textbooks

    ERIC Educational Resources Information Center

    Prichard, Janet J.; MacDonald, Laurie E.

    2004-01-01

    On September 11th, 2001 the United States experienced the largest terrorist attack in its history. This event caused many government agencies to review their security practices and procedures. It also has raised awareness of other avenues that terrorists might pursue to achieve their goals, including cyber terrorism. Cyber terrorism can be…

  6. Cyber-Porn Dependence: Voices of Distress in an Italian Internet Self-Help Community

    ERIC Educational Resources Information Center

    Cavaglion, Gabriel

    2009-01-01

    This study analyzes narratives of cyber-porn users and defines major patterns of distress as self-reported by contributors to a self-help group in the Internet. It applies narrative analysis methodology to 2000 messages sent by 302 members of an Italian self-help Internet community for cyber-porn dependents ("noallapornodipendenza").…

  7. Influence Operations and the Internet: A 21st Century Issue. Legal, Doctrinal and Policy Challenges in the Cyber World

    DTIC Science & Technology

    2010-02-17

    create a single set of cyberlaws and procedures internationally in order to insure that there is no safe harbor for cyber criminals .”55 PUTTING IT ALL...TOGETHER – OPERATIONAL EXAMPLES Cyber criminals would include state and non-state actors threatening our security. Assuming all of the previous

  8. Defense.gov Special Report: Travels With Panetta - March 2012

    Science.gov Websites

    technology and growing expertise in the use of cyber warfare," he said. "The danger is, I think , [that] the capabilities are available in cyber to virtually cripple this nation: to bring down the power Operation Atlantic Resolve Sexual Assault Prevention Asia-Pacific Rebalance Cyber Strategy News Today in DOD

  9. Defense.gov Special Report: Travels with Lynn - January 2011

    Science.gov Websites

    said during his visit to Brussels, Belgium. Story Lynn: NATO Must Get Ahead of Cyber Threat BRUSSELS , Belgium, Jan. 25, 2011 - Now is the time for NATO to get ahead of the cyber threat, Deputy Defense Assault Prevention Asia-Pacific Rebalance Cyber Strategy News Today in DOD Press Advisories News Releases

  10. 3 CFR 8725 - Proclamation 8725 of October 3, 2011. National Cybersecurity Awareness Month, 2011

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... cyber events. This May, we also proposed to the Congress a plan to strengthen protection of our power... of cyber- and information-related technologies play out across the world, this year we laid out the... planned responses to cyber incidents, as we do with natural disasters. The vast majority of our critical...

  11. 10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...

  12. Stereotypical Beliefs about Cyber Bullying: An Exploratory Study in Terms of Myths

    ERIC Educational Resources Information Center

    Lampridis, Efthymios

    2015-01-01

    The present study investigates stereotypical beliefs about cyber bullying in terms of myths, a well applied concept in the study of beliefs concerning sexual aggression. The level of acceptance of cyber bullying myths (low vs. high) and the relation of myth acceptance to a number of demographic variables such as gender, field of studies, frequency…

  13. 10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...

  14. The Association between Cyber Victimization and Subsequent Cyber Aggression: The Moderating Effect of Peer Rejection

    ERIC Educational Resources Information Center

    Wright, Michelle F.; Li, Yan

    2013-01-01

    Adolescents experience various forms of strain in their lives that may contribute jointly to their engagement in cyber aggression. However, little attention has been given to this idea. To address this gap in the literature, the present longitudinal study examined the moderating influence of peer rejection on the relationship between cyber…

  15. Cyber Bullying @ Schools: What Do Turkish Adolescents Think?

    ERIC Educational Resources Information Center

    Topcu, Cigdem; Yildirim, Ali; Erdur-Baker, Ozgur

    2013-01-01

    Cyber bullying is an emerging form of peer bullying, becoming prominent especially over the past decade. The aim of this study was to investigate through interviews the perceptions of Turkish high school students about cyber bullying. The sample consisted of six male and one female high school students all aged 15 years who identified as being…

  16. 76 FR 81517 - Submission for Review and Comment: “The Menlo Report: Ethical Principles Guiding Information and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-28

    ...'' (``Menlo Report'') for the Department of Homeland Security (DHS), Science and Technology, Cyber Security Division (CSD), Protected Repository for the Defense of Infrastructure Against Cyber Threats (PREDICT... be found at: http://www.cyber.st.dhs.gov/wp-content/uploads/2011/12/MenloPrinciplesCORE-20110915-r560...

  17. 10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) A cyber security plan in accordance with the criteria set forth in § 73.54 of this chapter; (iv) A... cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan, shall protect the plans and...

  18. 10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...

  19. Measuring the Effectiveness of Visual Analytics and Data Fusion Techniques on Situation Awareness in Cyber-Security

    ERIC Educational Resources Information Center

    Giacobe, Nicklaus A.

    2013-01-01

    Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…

  20. Joint Interagency Coordination Group - Cyber: Empowering the Combatant Commanders against the no-borders threat

    DTIC Science & Technology

    2009-05-04

    inconvenience and denial of Internet service, CNAs pose a threat to national security, if the right computer is hacked , to every day operations, if baking...expert J3: Current Operations Rep Private Sector/Civilian: cyber/CNA SME J5 Future Operations Rep Private Sector/Civilian: cyber/CND SME Table 2

Top