a
- Alexander, Keith
- Analyzing Mission Impacts of Cyber Actions (AMICA) 42, 60, 63, 64, 72
- ARMOUR (DRDC) 29, 30, 32, 33, 42, 52, 122
- ATT@CK Framework 23, 94
- Attack Graph , 15, 25, 32, 59, 63, 72, 94, 105, 106, 140, 154
- Australian Signal Directorate’s “Top 4” 31, 42, 55
b
- Battle Management / Command, Control and Communications (BMC3) 60
- Bots 70
- Business Impact Analysis (BIA) 10, 11, 30, 40
- Business Process Modeling Notation (BPMN) 62
c
- Common Research Into Threats (CRITS) 46, 141
- Computer Assisted Exercises (CAX) 71, 75, 85
- Computer Network Attack (CNA) 39, 83
- Control Objectives for Information and Related Technologies (COBIT) 11, 12
- Course of Action (COA) 22, 39, 59, 60, 64, 67, 71, 75, 92, 147
- Critical security controls (CSCs) 31, 71, 104, 143, 147, 148
- Crown Jewels Analysis (MITRE) , 60, 61
- Cyber for Cyber (C4C) 48, 51, 76
- Cyber for Others (C4O) 48, 76
- Cyber Insurance 14, 16, 17
- Cyber–Physical System (CPS) 93–95, 139, 154, 155
- Cyber Range 22, 25, 33, 38, 49–52, 56, 83–85, 89, 90, 93, 94, 96, 125–131, 133, 136, 151, 152, 161
- Cyber Range Interoperability Standard (CRIS) 46, 126
- Cyber Terrain 36, 70, 71, 86, 124, 148
- CybOX 45, 47, 48
d
- DARPA (Defense Advanced Research Projects Agency) , 59, 127
- Data Farming 65, 67, 70
- Decision Support System (DSS) 59, 64–66
- Department of Homeland Security (DHS) Cyber Security Evaluation Tool (CSET) 69, 139
- DETERLAB 95, 96, 126
- DIACAP 137
- Disaster Recovery/Continuity of Operations (DR/COOP) 13, 31, 71
- Distributed Denial of Service (DDoS) , , 39, 85
- DoDAF Architecture Frameworks 18
- Dragonfly 31
f
- Factor Analysis of Information Risk (FAIR) model 11, 124
- Federation Object Model (FOM) 54
g
- General Methodology for Verification and Validation 67, 68, 96
- Georgia , , 71, 148
- German Steel Mill Cyber Attack 31
h
- Human Potential Explorer (HUPEX) 150
i
- Improvised Explosive Device (IED) 116
- ISI 27000series 11
- ISO 31000 11, 17, 22, 103
k
- Key Performance Parameter (KPP) 62
m
- Mean Time to Exploit (MTTE) 107, 114, 118, 120, 122, 146
- Mean Time to Failure (MTTF) 105, 118
- Measure of effectiveness (MOE) 62, 120
- Measure of Enterprise Effectiveness (MOEE) 64
- Measure of Performance (MOP) 62, 64
- Median Time from Compromise to Discovery 29
- Mission Process 63, 64
- Mission Scenario Event List (MSEL) 130
- Mission System 21, 35, 62–64, 122
- Model‐Based Systems Engineering (MBSE) 105, 137
- Modeling and Simulation Information Analysis Center (MSIAC) 137
- Morris Worm
- Moving Target Defense 72
n
- Nessus 63
- Net Working Time (NWT) 143, 144
- Network Tasking Order (NTO) 72
- NIST Baldridge Cybersecurity Excellence Builder process 69
- NMAP 63
- Node Attack 39
o
- OASIS Standards 47
- Observe, Orient, Decide Act (OODA) 64, 77, 78
- OCTAVE Allegro 46
- Open Checklist Interactive Language (OCIL) 55
- Operation Electric Powder 31
p
- Panetta, Leon
- People, Processes and Tools (PPT) 104, 105
r
- Risk Management Framework 10, 137
- Russian Business Network
- Rye Dam 31
s
- Security Content Automation Protocol (SCAP) 55
- Security Information and Event Management (SIEM) 65, 71, 117, 122
- Siemens , 70
- Simulation Interoperability Standards Organization (SISO) 47, 51, 52, 54, 56, 100, 131
- Situational Awareness (SA) 45, 68–70, 75, 78, 143, 144, 150
- STIX (Structured Threat Information eXpression) 45, 46, 48
- Supervisory Control and Data Acquisition System (SCADA) 31, 77, 86, 151, 152
- System Entity Structure (SES) 109, 114
- Systems Modeling Language (SysML) 118, 137–139, 142
- System Under Test (SUT) 129, 133, 134
t
- Tallinn Manual
- TAXII 45, 46, 48
- Threat Assessment and Remediation Analysis (TARA) 61, 141
- Threat Network Degradation 39
- Time Critical Targeting (TCT) 59, 60
- Time to detect (Tdetect) 31, 49, 64
u
- Underwriters Laboratory (UL) 144
- Unified Modeling Language (UML) 137, 138
- Use cases 40
v
- Verification, Validation and Accreditation (VV&A) 67, 90, 96–98
- Visual Analytics 65, 70
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.