首页> 外文期刊>The ITEA Journal >Table Top Wargaming: Cost Effective Planning for Cyber Security Test and Evaluation: Or, How I Learned to Stop Worrying and Love the Six-Phase Cyber Security T&E Process
【24h】

Table Top Wargaming: Cost Effective Planning for Cyber Security Test and Evaluation: Or, How I Learned to Stop Worrying and Love the Six-Phase Cyber Security T&E Process

机译:桌面Wargaming:网络安全测试和评估的经济有效计划:或者,我如何学会不再担心并热爱六阶段网络安全T&E流程

获取原文
获取原文并翻译 | 示例
           

摘要

Bottom Line Up Front: Many Service acquisition and Test and Evaluation (T&E) programs find it difficult and confusing to negotiate the policies and processes in order to develop their requirements and strategy for cyber security T&E. The Cyber Security Table Top (CTT) Wargame Exercise is one way to identify credible vulnerabilities and develop actionable requirements that can be used to design efficient T&E. The CTT was developed and implemented as a joint effort by Paola Pringle, US Navy P-8A (Increment 3) Lead Test Engineer (Interoperability), Hank Steinfeld, US Navy P-8A (Increment 3), and industry partners within the T&E community. This article will provide a brief overview of the CTT and will outline a structured, mission-based approach to analyzing the risk of cyber threat vulnerabilities. It is intended for use by Acquisition Program Management Offices, Chief Developmental Testers, and Lead Developmental Test and Evaluation (DT&E) Organizations. It is also intended as an aid in developing and understanding cyber security requirements, as well as identifying vulnerabilities and adversarial capabilities. This information can then be used to develop and/or refine a strategy and plan for cyber security T&E. In short, this article will introduce the CTT as a low-cost and proven method to start planning for, or to update, a strategy for cyber security T&E.
机译:底线:许多服务获取,测试和评估(T&E)计划发现,就政策和流程进行谈判以制定其对网络安全T&E的要求和策略,既困难又令人困惑。网络安全台式机(CTT)战争游戏练习是识别可信漏洞并制定可用于设计有效T&E的可行要求的一种方法。 CTT由Paola Pringle,美国海军P-8A(增量3)首席测试工程师(互操作性),汉克·斯坦菲尔德,美国海军P-8A(增量3)以及T&E社区中的行业合作伙伴共同开发和实施。本文将简要介绍CTT,并概述一种基于任务的结构化方法来分析网络威胁漏洞的风险。该程序供购置计划管理办公室,首席开发测试人员以及潜在开发测试和评估(DT&E)组织使用。它还旨在帮助开发和了解网络安全要求,并确定漏洞和对抗能力。然后,可以使用此信息来开发和/或完善网络安全T&E的策略和计划。简而言之,本文将介绍CTT,这是一种低成本且经过验证的方法,可以开始计划或更新网络安全T&E策略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号