Empower DoD, other government agencies, industry partners, and academia to effectively utilize modeling and simulation capabilities, including emulators, prototypes, simulators, and stimulators, either statically or over time, to develop data as a basis for making managerial or technical decisions. It includes all classes of M&S, including the interface of real-world systems with models or simulations, as well as working with model elements, standards and specifications, and modeling system descriptions, interfaces, and data communication methods.
-
Cyber as a domain and battlespace coincides with the defined attributes of a “wicked problem” with complexity and inter-domain interactions to spare. Since its elevation to domain status, cyber has continued to defy many attempts to explain its reach, importance, and fundamental definition. Corresponding to these intricacies, cyber also presents many interlaced attributes with other information related capabilities (IRCs), namely electromagnetic warfare (EW), information operations (IO), and intelligence, surveillance, and reconnaissance (ISR), within an information warfare (IW) construct that serves to add to its multifaceted nature. In this cyber analysis, the concept of hypergaming will be defined and discussed in reference to its potential as a way to examine cyber as a discipline and domain, and to explore how hypergaming can address cyber’s “wicked” nature from the perspectives of decision making, modeling, operational research (OR), IO, and finally IW. Finally, a cyber-centric hypergame model (CHM) will be presented.
-
Do watch and like our video. Please answer also the survey at the description below. Thank you... https://m.youtube.com/watch?v=RYuVChFhQyA&list=LL&index=2&t=28s
-
M&S Applied Across Broad Spectrum Defense and Federal Endeavors
Volume 7 Issue 3This year’s theme is ‘Innovation’ – a term that often spurs thoughts of an inspired new gadget or possibly a way of doing something in a different manner. The Merriam-Webster definition simply states that innovation is “the introduction of something new” – that’s a pretty broad definition and certainly open to interpretation. A recent podcast…Posted: 01/09/2020 21:00:28Journal -
This edition of the CSIAC Journal focuses on the topic of cybersecurity of Cyber-Physical Systems (CPS), particularly those that make up Critical Infrastructure (CI).Posted: 09/04/2019 18:23:42Journal
-
In response to a DOD Chief Information Officer (CIO) directive, the Defense Information Systems Agency Services Development Directorate deployed Department of Defense Secure Access File Exchange (DOD SAFE) Aug. 15. DOD SAFE, a replacement for the U.S. Army Aviation and Missile Research Development and Engineering Center (AMRDEC) Safe Access File Exchange (SAFE) slated to be…
-
It may be difficult to figure out where and how Artificial Intelligence (AI) and its various sub-types (Machine Learning, Deep Learning, etc.) fit into our world as we move into the future. In some cases it seems straightforward; AI/ML speech recognition is astoundingly good and can be applied across many domains in a meaningful way.…Posted: 04/29/2019 12:36:42Journal
-
The Open Web Application Security Project (OWASP) Amass project was originally created when the project lead was showing organizations what they look like on the Internet. During this process, he noticed that the tools available were returning incomplete results relative to what could be discovered manually. With the identification of this gap in capabilities for…
-
Promises made by Huawei over a year ago were never returned. Huawei never improved there cybersecurity through software development through engineering. This raises concerns in the UK and nation wide for cybersecurity in Huawei. https://arstechnica.com/information-technology/2019/03/uk-cyber-security-officials-report-huaweis-security-practices-are-a-mess/
-
The Science of Security and Privacy (SoS) Initiative, sponsored by the National Security Agency Research Directorate, fosters a self-sustaining, open, and public security science research community to discover key cyber principles necessary to support improved explanations, predictions and confirmation or validation of predicted outcomes. The discipline of Science of Security and Privacy draws on the…
-
On January 29, 2019, the Director of National Intelligence Daniel R. Coates released the Worldwide Threat Assessment of the US Intelligence Community. The unclassified report covers both global and regional threats to US national security from the perspective of the US intelligence community.
-
Launching Innovation Through Medical Modeling and Simulation Technologies Special Edition
Volume 6 Issue 4Medical simulations are an integral part of the military health system, providing opportunities for skills development and performance assessment of both individual and team-level medical-related tasks. This Special Edition of the Journal “Launching Innovation through Medical Modeling and Simulation Technologies” will provide a glimpse into current efforts to improve military medical training with simulation-based solutions.Posted: 12/04/2018 15:23:25Journal -
Innovation Based Ecosystems
Volume 6 Issue 3New buzz words like 'innovation ecosystems' often symbolize a departure from a legacy system to a more modern system and an underlying shift focus from operations management to service delivery with better user experience, reduce operational cost, minimize disruption, and enable personnel to do more with less. This issue of the Journal of Cyber Security…Posted: 11/01/2018 11:59:22Journal -
The Defense M&S Catalog was established by Defense Modeling & Simulation Coordination Office to support the visibility component of the DoD data strategy and to provide an avenue for M&S organizations to make resources available for reuse. The Catalog is a collection point for enterprise discovery and actively seeks contribution of resources from M&S organizations.…
-
President Trump Unveils America’s First Cybersecurity Strategy in 15 Years. The National Cyber Strategy identifies decisive priority actions to protect the American people. This strategy makes clear that the Federal Government will never stop defending our interests, and that we will bring every element of American power to bear to protect our people in the digital domain.
-
The webinar video recording will be available shortly. Thank you for your patience. This webinar describes the Cyber Security Game (CSG). CSG is a method that has been implemented in software that quantitatively identifies cyber security risks and uses this metric to determine the optimal employment of security methods for any given investment level. Cyber…
-
Cyber-As-Zoo: Multidisciplinary Cyber Struggle
Volume 6 Issue 2This quarter’s CSIAC Journal contains five articles that offer some perspectives to address the often-heard phrase “Cyber Is Hard”, usually associated with gnashing of teeth and exasperated sighs.Posted: 08/09/2018 18:10:03Journal -
Paul & All: Given the recent release of OSD's Digital Engineering Strategy [1] I thought this a good time to start a discussion on models and formalization. Some may be surprised to learn that among insiders in government architecture the juxtaposition of the terms "model" and "formal" are considered an oxymoron. Mainstream efforts by well-known…
-
Cybersecurity solutions for critical energy infrastructure are imperative and they must be carefully engineered to develop reliable systems. Cybersecurity for the modernized power grid is bringing together two different communities: Information technology (IT) and Operational technology (OT). The IT and OT environments differ in important ways but each has benefits that can be gained from…
-
Insider Threat and the Malicious Insider Threat
Volume 6 Issue 1Analyze. Deter. Discover. Prevent. Respond. This issue of the CSIAC Journal presents five articles which represent different perspectives on Insider Threat and approaches to understand and remediate that threat. In this journal we are proud to identify and include work by two organizations with a long history of research and good counsel regarding Insider Threat…Posted: 05/09/2018 14:39:24Journal -
In today's episode the CSIAC takes the most important articles in a past CS Digest and discusses the articles' importance in the world of technology and cyber security.
- Load More