Ontology for Insider Threat Indicators

The study of insider threat presents some of the most complex challenges in information security. Even defining the insider threat has proven difficult, with interpretations and scope varying depending on the problem space. Organizations have begun to acknowledge the importance of detecting and preventing insider threats, but there is a surprising lack of standards within the insider threat domain to assist in the development, description, testing, and sharing of these techniques. For many organizations, establishing an insider threat program and beginning to look for potentially malicious insider activity is a new business activity.

Posted in: Briefs, Aerospace, Defense, Information Technology, Security systems, Data management

Data Mining in Cyber Operations

Data mining models describe dynamic behavior of attacks and failures, enabling defenders to detect and differentiate simultaneous attacks on a target network.

Defending cyberspace is a complex and largely scoped challenge that considers emerging threats to security in space, land, and sea. The global cyber infrastructure presents many challenges because of the complexity and massive amounts of information transferred across the global network daily. The cyber infrastructure is made up of the data resources, network protocols, computing platforms, and computational services that bring people, information, and computational tools together.

Posted in: Briefs, Aerospace, Defense, Information Technology, Communication protocols, Cyber security, Data acquisition

Framework for Resilient Remote Monitoring

This method provides continuous monitoring across network-attached devices to identify and mitigate targeted cyber attacks.

System administrators and cyber defenders continue to face challenges in securing systems as attacks keep increasing in the level of sophistication, and the number of connected systems keeps increasing. To support and automate manual activities associated with obtaining information about systems and taking corrective action in response to suspicious activities, an increasing number of technologies for remote monitoring are becoming available with the premise of increasing resiliency by decreasing the time-to-detect and time-to-mitigate targeted attacks.

Posted in: Briefs, Aerospace, Defense, Information Technology, Cyber security

Communication Protocol for CyAMS and the Cyber Fighter Associate Interface

This program evaluates agility maneuvers that may be employed within networks to mitigate the effect of cyber attacks.

As the military adopts more networked equipment, the opportunity for cyber attacks to occur has also risen. To mitigate the effect these attacks have, network administrators and security experts must be able to decide on the best course of action based on many factors. The Cyber Fighter Associate (CyFiA) will help decide the best course of action given a set of cyber agility maneuvers by measuring the cost and utility of potential maneuvers, along with node and network facts, to select the maneuvers that will lead to mission success.

Posted in: Briefs, Aerospace, Defense, Information Technology, Communication protocols, Cyber security

Implementing Secure Command and Control in Unmanned Systems

Unmanned vehicles are at the forefront of an evolution, especially with the proliferation of the Internet of Things. After decades of serving mission-critical applications in government and defense, the command and control (C2) capabilities of advanced wireless data communications have begun to migrate into the public safety, research, and commercial markets. The robust and secure infrastructure necessary for the eventual proliferation of unmanned vehicles is slowly being realized. Today, however, industries such as public safety, agriculture and oil and gas are being eyed as key markets that can benefit from the use of Remotely Piloted Aircraft (RPA). For several applications, such as wildfire monitoring and border protection, RPAs can even be used to protect people and save lives.

Posted in: Articles, Aerospace, Defense, Cyber security, Unmanned aerial vehicles

Compact Thermal Management Solutions for Mobile Laser Weapon Systems

The Navy is developing a vehicle mounted directed energy (DE) weapon system in their Ground Based Air Defense (GBAD) Directed Energy On-The-Move (OTM) program. As part of this initiative, Advanced Cooling Technologies, Inc. (ACT) has been awarded a $1.2M, three year contract to develop an efficient, lightweight, compact thermal storage and management subsystem. The cooling system will remove waste heat from the laser commensurate with available power and other engineering constraints. The technology being developed will be used to suppress unmanned aerial vehicles (UAV’s).

Posted in: Articles, Aerospace, Defense, Thermal management, Military vehicles and equipment

Powering On

Posted in: Articles, Aerospace, Defense, Research and development, Jet engines, Commercial aircraft

Countering Cybersecurity Threats Against Unmanned Vehicle Systems

Posted in: Articles, Aerospace, Defense, Cyber security, Unmanned aerial vehicles

Enhance EMC Testing with Digital IF

Modern electromagnetic interference (EMI) receivers and spectrum analyzers used for compliance and precompliance testing employ digital intermediate-frequency (digital IF) processing technology for signal analysis. Not only does digital IF boost overall instrument reliability, it enables improved amplitude accuracy, increased measurement throughput, and reduced dependence on operator experience level. These benefits result in higher efficiency and lower operating costs. This article discusses the differences between analog and digital IF architectures, and how digital IF enhances both compliance and precompliance measurement processes.

Posted in: Articles, Aerospace, Defense, RF & Microwave Electronics, Electromagnetic compatibility, Test facilities

Radio Relays Improve Wireless Products

In order to transmit communications through Earth’s atmosphere, satellites and space vehicles need radio equipment that can operate at higher frequencies than on Earth. These higher frequencies, until recently, have demanded mechanical switches in radio relays. Unfortunately, the mechanical switches had some problems with frequency routing, which inspired NASA to seek more rugged, reliable solutions.

Posted in: Articles, Spinoff, Aerospace, Defense, RF & Microwave Electronics, Radio equipment, Relays, Satellite communications