• Home
  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact Us
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Skip to primary navigation
  • Skip to main content
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
/ Journal Issues / Welcome to the CSIAC
Download PDF

Welcome to the CSIAC

Journal of Cyber Security and Information Systems

Volume: 1 Number: 1
Posted: 10/01/2012

Download PDF

Welcome to the new and enhanced Cyber Security and Information Systems Information Analysis Center – CSIAC

Download PDF
« IA on a Tight Budget
Secure Systems and Software Productivity »

Articles In This Issue

  • First Consolidated Basic Center Operations Contract to Quanterion

    Author: Preston MacDiarmid
    Quanterion Solutions is thrilled to be competitively selected to operate the Department of Defense (DoD) Cyber Security and Information Systems (CSIAC) Basic Center Operations (BCO), the first consolidated Information Analysis Center (IAC) contract. The consolidation includes three previous IACs: the Information Assurance Technology Analysis Center (IATAC) previously operated by Booz, Allen and Hamilton, the Modeling & Simulation Information Analysis Center (MSIAC) operated by Alion Science and Technology and the Data and Analysis Center for Software (DACS) operated by Quanterion Solutions. The CSIAC also includes a new technology area, Knowledge Management/Information Sharing.
  • Air Force Research Laboratory’s In-Residence Professor Becomes Cybersecurity Preceptor in South Korea

    Author: Dr. Kevin A. Kwiat
    The Air Force Research Laboratory (AFRL) is fortunate to have one of its subject matter experts (SMEs) working hand-in-hand with South Korea as it looks to advance its cybersecurity capabilities. This SME acquired his expertise prior to his affiliation with AFRL. In recognition of his...
  • Shaping Preventive Policy in “Cyber War” and Cyber Security: A Pragmatic Approach

    Author: Tony Guo
    On January 28th, 2011, Egypt disappeared from the global map. In a coordinated shutdown of all major Egyptian internet service providers–an effort by its government to squelch public dissent- -virtually all Egyptian Internet addresses became unreachable worldwide.1 The action was unprecedented in Internet history.2 At...
  • Securing Systems through Software Reliability Engineering

    Author: Hugh “Taz” Daughtrey
    Software reliability engineering represents a well-established set of techniques supporting specification and assessment of dependability aspects of software-based systems. Application of these techniques to security concerns could provide helpful assistance for software assurance efforts.
  • Signcryption for Biometric Security

    Author: Phillip Griffin
    Biometrics is the “something you are” identity factor used in authentication and identification systems. Organizations that rely on biometric technology should ensure the confidentiality, integrity and authenticity of their biometric assets. To manage security risk, biometric information should be protected from unauthorized access and modification.
  • Cyber Security… the Virtual Frontier

    Author: Paul Engelhart
    Just a few short months ago on July 1st, 2012 the new Cyber Security and Information Systems Information Analysis Center (CSIAC) contract was awarded to Quanterion Solutions Incorporated, marking the beginning of a new era within the Defense Technical Information Center (DTIC) Information Analysis Center...
  • Welcome to the New and Enhanced Cyber Security and Information Systems Information Analysis Center – CSIAC

    Authors: Christopher Zember and Thomas McGibbon
    Change is in the Air: A New IAC Has Been Formed for You – CSIAC * The rest of this article has not yet been converted to HTML. It will be added to this site shortly. Please be patient. *

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
US Department of Defense Logo USD(R&E) Logo DTIC Logo DoD IACs Logo

Copyright 2012-2021, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information
Accessibility / Section 508 | FOIA | Link Disclaimer | No Fear Act | Policy Memoranda | Privacy, Security & Copyright | Recovery Act | USA.Gov

This website uses cookies to provide our services and to improve your experience. By using this site, you consent to the use of our cookies. To read more about the use of our site, please click "Read More". Otherwise, click "Dismiss" to hide this notice. Dismiss Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.