This journal discusses cyber risks to transportation control systems, the Schedule Compliance Risk Assessment Methodology (SCRAM), and security for mobile network operators.
The Journal of Cyber Security and Information Systems
The Journal of Cyber Security and Information Systems is a quarterly journal focusing on scientific and technical research & development, methods and processes, policies and standards, security, reliability, quality, and lessons learned case histories.
This journal issue covers Supervisory Control and Data Acquisition (SCADA) systems. Articles in this issue discuss how SCADA systems can improve efficiency but also present new challenges. How those challenges can be addressed by applying agile software engineering methods to systems engineering.
This issue discusses advances in the acquisition of secure systems based on open architectures. It also attempts to quantify productivity in software development projects.
Welcome to the new and enhanced Cyber Security and Information Systems Information Analysis Center - CSIAC
The Keys to Better Security on a Tight Budget Subject Matter Expert: COL Gregory Conti The Biometrics Capability Maturity Model Responsible Information Sharing Part II: Sharing Responsibly United States Service Academies Searching For the Best — U.S. Cyber Challenge USENIX Federated Conferences Week
Social Media Malware As social media platforms become more prevalent, their security threats, attacks, and malware continue to grow. Also Inside: Subject Matter Expert Damages from Cyber Attacks by Attack Category and Damage Type Responsible Information Sharing I: Responsibility to Share IEEE Symposium on Security and Privacy The Open Web
We all understand the importance of data to manage any program, whether it is estimated data for planning purposes or actual data for monitoring project progress and performance. The importance of data in managing systems acquisition programs, from a software intensive systems perspective, is particularly crucial when: Acquisition program requirements
Army Cyber Command: Redefining IA Compliance as Part of Operationalizing Cyber Ask the Expert Training IA Experts of Tomorrow Trends in Academic Cybersecurity and IA Research Since 1996 Securing the Mobile Device…and its User CSIAC Prepares Organizations to Tackle the Newest Battlespace— Cyberspace Cyberlaw's Evolution Over the Past 20
There has been so much published about cloud computing in the last couple of years it would seem difficult to find new things to say about it. However, the model is changing so rapidly there is indeed plenty to say about it, and there will be for years to come. As you will read in “Cloud Computing – How Easy Is It”, the environment is evolving so fast that
An Introduction to Security Automation United States Cyber Command has made major strides in defending, securing and improving the operations of Defense networks. Also Inside: - CSIAC Spotlight on a University - An Introduction to Security Automation - Security Automation: Commercial Sector Perspectives and Contributions - Enabling Distributed