Index


a

b

  • Battle Management / Command, Control and Communications (BMC3) 60
  • Bots 70
  • Business Impact Analysis (BIA) 10, 11, 30, 40
  • Business Process Modeling Notation (BPMN) 62

c

d

  • DARPA (Defense Advanced Research Projects Agency) 1, 59, 127
  • Data Farming 65, 67, 70
  • Decision Support System (DSS) 59, 64–66
  • Department of Homeland Security (DHS) Cyber Security Evaluation Tool (CSET) 69, 139
  • DETERLAB 95, 96, 126
  • DIACAP 137
  • Disaster Recovery/Continuity of Operations (DR/COOP) 13, 31, 71
  • Distributed Denial of Service (DDoS) 2, 6, 39, 85
  • DoDAF Architecture Frameworks 18
  • Dragonfly 31

e

f

  • Factor Analysis of Information Risk (FAIR) model 11, 124
  • Federation Object Model (FOM) 54

g

  • General Methodology for Verification and Validation 67, 68, 96
  • Georgia 4, 6, 71, 148
  • German Steel Mill Cyber Attack 31

h

  • Human Potential Explorer (HUPEX) 150

i

  • Improvised Explosive Device (IED) 116
  • ISI 27000series 11
  • ISO 31000 11, 17, 22, 103

k

  • Key Performance Parameter (KPP) 62

l

m

  • Mean Time to Exploit (MTTE) 107, 114, 118, 120, 122, 146
  • Mean Time to Failure (MTTF) 105, 118
  • Measure of effectiveness (MOE) 62, 120
  • Measure of Enterprise Effectiveness (MOEE) 64
  • Measure of Performance (MOP) 62, 64
  • Median Time from Compromise to Discovery 29
  • Mission Process 63, 64
  • Mission Scenario Event List (MSEL) 130
  • Mission System 21, 35, 62–64, 122
  • Model‐Based Systems Engineering (MBSE) 105, 137
  • Modeling and Simulation Information Analysis Center (MSIAC) 137
  • Morris Worm 1
  • Moving Target Defense 72

n

  • Nessus 63
  • Net Working Time (NWT) 143, 144
  • Network Tasking Order (NTO) 72
  • NIST Baldridge Cybersecurity Excellence Builder process 69
  • NMAP 63
  • Node Attack 39

o

  • OASIS Standards 47
  • Observe, Orient, Decide Act (OODA) 64, 77, 78
  • OCTAVE Allegro 46
  • Open Checklist Interactive Language (OCIL) 55
  • Operation Electric Powder 31

p

  • Panetta, Leon 1
  • People, Processes and Tools (PPT) 104, 105

q

  • Quality vs. Security 101

r

  • Risk Management Framework 10, 137
  • Russian Business Network 6
  • Rye Dam 31

s

  • Security Content Automation Protocol (SCAP) 55
  • Security Information and Event Management (SIEM) 65, 71, 117, 122
  • Siemens 2, 70
  • Simulation Interoperability Standards Organization (SISO) 47, 51, 52, 54, 56, 100, 131
  • Situational Awareness (SA) 45, 68–70, 75, 78, 143, 144, 150
  • STIX (Structured Threat Information eXpression) 45, 46, 48
  • Supervisory Control and Data Acquisition System (SCADA) 31, 77, 86, 151, 152
  • System Entity Structure (SES) 109, 114
  • Systems Modeling Language (SysML) 118, 137–139, 142
  • System Under Test (SUT) 129, 133, 134

t

  • Tallinn Manual 5
  • TAXII 45, 46, 48
  • Threat Assessment and Remediation Analysis (TARA) 61, 141
  • Threat Network Degradation 39
  • Time Critical Targeting (TCT) 59, 60
  • Time to detect (Tdetect) 31, 49, 64

u

  • Underwriters Laboratory (UL) 144
  • Unified Modeling Language (UML) 137, 138
  • Use cases 40

v

  • Verification, Validation and Accreditation (VV&A) 67, 90, 96–98
  • Visual Analytics 65, 70

w

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.117.70.132