This journal issue covers Supervisory Control and Data Acquisition (SCADA) systems. Articles in this issue discuss how SCADA systems can improve efficiency but also present new challenges. How those challenges can be addressed by applying agile software engineering methods to systems engineering.
The Journal of Cyber Security and Information Systems
The Journal of Cyber Security and Information Systems is a quarterly journal focusing on scientific and technical research & development, methods and processes, policies and standards, security, reliability, quality, and lessons learned case histories.
This issue discusses advances in the acquisition of secure systems based on open architectures. It also attempts to quantify productivity in software development projects.
Welcome to the new and enhanced Cyber Security and Information Systems Information Analysis Center - CSIAC
The Keys to Better Security on a Tight Budget Subject Matter Expert: COL Gregory Conti The Biometrics Capability Maturity Model Responsible Information Sharing Part II: Sharing Responsibly United States Service Academies Searching For the Best — U.S. Cyber Challenge USENIX Federated Conferences Week
Social Media Malware As social media platforms become more prevalent, their security threats, attacks, and malware continue to grow. Also Inside: Subject Matter Expert Damages from Cyber Attacks by Attack Category and Damage Type Responsible Information Sharing I: Responsibility to Share IEEE Symposium on Security and Privacy The Open Web
We all understand the importance of data to manage any program, whether it is estimated data for planning purposes or actual data for monitoring project progress and performance. The importance of data in managing systems acquisition programs, from a software intensive systems perspective, is particularly crucial when: Acquisition program requirements
Army Cyber Command: Redefining IA Compliance as Part of Operationalizing Cyber Ask the Expert Training IA Experts of Tomorrow Trends in Academic Cybersecurity and IA Research Since 1996 Securing the Mobile Device…and its User CSIAC Prepares Organizations to Tackle the Newest Battlespace— Cyberspace Cyberlaw's Evolution Over the Past 20
There has been so much published about cloud computing in the last couple of years it would seem difficult to find new things to say about it. However, the model is changing so rapidly there is indeed plenty to say about it, and there will be for years to come. As you will read in “Cloud Computing – How Easy Is It”, the environment is evolving so fast that
An Introduction to Security Automation United States Cyber Command has made major strides in defending, securing and improving the operations of Defense networks. Also Inside: - CSIAC Spotlight on a University - An Introduction to Security Automation - Security Automation: Commercial Sector Perspectives and Contributions - Enabling Distributed
Civilization has always been heavily dependent on information. The fates of people of every nature and position have been determined, directly or indirectly, by outcomes from the use of good or bad information. Decisions were made and history was written. Every moment of every day we process information. Most of this is unconscious, instinctive,