This issue contains an article from Joint Forces Command (JFCOM) on their Coalition Interoperability Solution, The Hexagon. Also covered is EUCOM's Information Assurance Conference. At 36 pages, this issue is our largest to date and boasts such great articles as: - JTF-CND Intelligence Support - ZENITH STAR 99-1 - Distributed Denial of Service Tools from
The Journal of Cyber Security and Information Systems
The Journal of Cyber Security and Information Systems is a quarterly journal focusing on scientific and technical research & development, methods and processes, policies and standards, security, reliability, quality, and lessons learned case histories.
The physical analogy for this strategy is the formidable layered defenses of the medieval castle. The Fall 1999 cover article discusses this strategy. This issue features a slew of great articles, such as- - Matrix Mission Planning in Information Operations - DoD Computer Security Tips for Y2K - SHERLOCK: A Third Generation Log Analysis Tool Plus a
The increasing cost and complexity of software development is leading software organizations in the industry to search for new ways through process methodology and tools for improving the quality of the software they develop and deliver. However, the overall process is only as strong as its weakest link. This critical link is software quality engineering as
This feature article is on the U.S. Southern Command's Information Sharing Projects. Also in this issue is an article on the Law of Computer Network Defense. DISA'S DoD CERT covers the DoD IAVA Process. FIWC covers the Naval IO Wargame '99 and the U.S. Air Force Research Lab discusses the Automated Intrusion Detection Environment. This issue includes an
When I hear the word testing, I become stressed. What a headache, I think. Pictures flash through my head of teams burning the midnight oil trying to get a product out. Ed Yourdon’s book Death March1 comes to mind along with visions of sleepless nights and troublesome days. Thoughts about budget and schedule problems clutter my head along with the seemingly
The feature article on Coalition IA is from the U.S. Army Signal Command. Also in this issue is an article on IA Red Teaming from OASD(NII). DISA's DoD CERT covers "Meeting the Melissa Virus Head On." HQCECOM covers "I2WD's Role in Securing the Digitized Force" and the U.S. Army Research Lab speaks out on "Using Operations Security Methods to Protect DoD
Win Win is a computer program that aids in the capture, negotiation, and coordination of requirements for a large system. It assumes that a group of people, called stakeholders, have signed on with the express purpose of discussing and refining the requirements of their proposed system. The system can be of any type. Win Win contains facilities for: -
Some of the most significant changes that have confronted DoD software acquisition efforts in the past few years are the result of using Commercial Off- The-Shelf (COTS) software. However, these changes are not unique to the DoD—virtually all segments of US Government and industry have been forced to deal with the implications of COTS software. These changes
This issue includes a feature article on the Joint Task Force for Computer Network Defense. Also in this issue are articles from USACOM on their IA Certification Program, U.S. Army ODISC4 on "The New Arms Race for the Information Age," NAWCAD on "Risk-Based Decision Making," Sandia National Laboratories on "The Next Generation of Security Engineering Tools,"
This issue highlights Information Assurance (IA) initiatives at various levels within the Department of Defense and the IA Vendor Community. The newsletter features "The Defense-Wide Information Assurance Program" from OASD(NII)/IA and an NIPC article entitled "protecting Our Critical Infrastructures Through Public-Private Partnership." Also included is an