Listing 1 - 10 of 139 | << page >> |
Sort by
|
Choose an application
Choose an application
Cyber incident response has evolved based on systems and processes developed for other types of incident response, such as response to natural hazards. Large-scale cyber incidents that would have an impact on the United States' national and homeland security, economic security, and public safety and welfare to date are rare. However, they may have additional complications that make them more complex to plan for, including challenges in distinguishing the early stages of a significant cyber incident from a more quotidian incident, and the diversity of stakeholders involved. In this report, RAND researchers compare and contrast incident response for cyber and other types of hazards, both human-caused and natural, to derive initial insights into their similarities and distinctions. The report suggests some ways to improve preparedness for cyber incident response and propose additional areas requiring further research. Recommendations include developing more rigorous and dynamic joint public-private exercises, conducting further analysis to identify how systems could fail through a cyber attack to inform early warning efforts, and developing decision mechanisms and shared understandings that will facilitate coordinated activation and execution of incident response plans.
Cyberinfrastructure --- Computer networks --- Security measures --- Evaluation.
Choose an application
Information and intelligence - and the degree of access to and control of the systems within which the data reside - can yield power and influence at scale. These systems and the networks they create collectively make up digital infrastructure (DI). Spawned from internet growth and the interconnectivity of global telecommunication networks, today's DI - and a country's ownership of, access to, and control over it - has emerged as an area of competition between the United States and China. Beijing and Washington rely on DI to support military forces and use its capabilities to expand national power and extend influence globally. Both countries now aim to shape the DI in ways that align with their long-term strategic priorities and interests. This report defines DI, characterizes the competition for it, and provides evidence showing that how DI evolves carries implications for long-term military competition and conflict. The authors also describe important trends and asymmetries shaping the competition and conclude by discussing the implications and opportunities for the U.S. government and the U.S. Department of Defense.
Choose an application
A competition for digital infrastructure (DI) is underway between the United States and China, which has implications for military forces and operations that rely on this infrastructure in competition and conflict. However, DI as a competition remains largely understudied in a comprehensive way. This report is a product of a multiyear research effort to define DI, characterize the competition underway, identify key factors shaping outcomes, and assess the potential implications for the Department of Defense. This report contributes to the broader understanding of DI by presenting an alternative futures analysis of how the global DI could evolve out to 2050 and the military implications of those futures for the United States and China.
Cyberspace operations (Military science) --- Cyberspace operations (Military science) --- Cyberinfrastructure --- Cyberinfrastructure --- Cyberguerre (Science militaire) --- Cyberguerre (Science militaire) --- Cyberinfrastructure --- Cyberinfrastructure --- China --- United States --- Chine --- États-Unis --- Foreign relations --- Foreign relations --- Relations extérieures --- Relations extérieures
Choose an application
After the devastating 2017 hurricane season, the U.S. Homeland Security Operational Analysis Center supported the congressionally mandated economic and disaster recovery plan, Transformation and Innovation in the Wake of Devastation: An Economic and Disaster Recovery Plan for Puerto Rico. This report contributes to the overall plan with a focus on the communications and information technology (IT) sector. Researchers provide an introduction to the sector (brief history, key assets, prestorm conditions and challenges, and governance); assess damage and needs of the sector; and present 33 courses of action (COAs) for the recovery, rebuilding, and enhancement of the sector with an emphasis on developing and sustaining a resilient, state-of-the-art communications network and furthering the vision for the digital transformation of Puerto Rico. Developed in consultation with a wide variety of stakeholders, including governmental entities, commercial providers, citizens, and municipalities, the COAs address many different (and sometimes competing) needs and also support and benefit COAs in other critical sectors, such as health and social services. The relationships among the communications and IT COAs are outlined. The estimated cost for these COAs is
Disaster relief --- Cyberinfrastructure --- Hurricane damage --- Hurricane Irma, 2017. --- Hurricane Maria, 2017. --- Puerto Rico.
Choose an application
Journal of Big Data publishes high-quality, scholarly research papers, methodologies and case studies covering a broad range of topics, from big data analytics to data-intensive computing and all applications of big data research. The journal examines the challenges facing big data today and going forward including, but not limited to: data capture and storage; search, sharing, and analytics; big data technologies; data visualization; architectures for massively parallel processing; data mining tools and techniques; machine learning algorithms for big data; cloud computing platforms; distributed file systems and databases; and scalable storage systems.
Big data --- Data mining --- Cyberinfrastructure --- Data Mining --- Access to Information --- Information Dissemination --- Information Storage and Retrieval --- Computer Science
Choose an application
The challenges associated with securing U.S. Department of Defense (DoD) information systems have grown as the department's information infrastructure has become more complex and interconnected. At the same time, the potential negative consequences associated with cyber intrusions have become more severe. Are current information assurance (IA) policies and procedures sufficient to address this growing threat, and are they able to address vulnerability issues associated with highly networked information systems? The current IA certification and accreditation (C&A) process focuses on individual, discrete systems or components of larger, aggregated information systems and networks that are colocated or operate on the same platform (such as a Navy ship). An examination of current policy shows that a new approach is needed to effectively extend the IA C&A process to aggregations of information systems and improve the security of DoD information systems. A number of recommendations are put forth to improve current IA policy and to enable the IA C&A of aggregations of DoD information systems that reside on a common platform.
Computer security --- Cyberinfrastructure --- Computer networks --- Information technology --- Management. --- Security measures --- Certification --- Accreditation --- United States. --- Information resources management. --- Information technology.
Choose an application
It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.
Choose an application
The 14 chapters presented in this book cover a wide variety of representative works ranging from hardware design to application development. Particularly, the topics that are addressed are programmable and reconfigurable devices and systems, dependability of GPUs (General Purpose Units), network topologies, cache coherence protocols, resource allocation, scheduling algorithms, peertopeer networks, largescale network simulation, and parallel routines and algorithms. In this way, the articles included in this book constitute an excellent reference for engineers and researchers who have particular interests in each of these topics in parallel and distributed computing.
Electronic data processing --- High performance computing. --- Distributed processing. --- HPC (Computer science) --- Cyberinfrastructure --- Supercomputers --- Distributed computer systems in electronic data processing --- Distributed computing --- Distributed processing in electronic data processing --- Computer networks --- Distributed systems
Choose an application
computer science --- automation --- robotics --- cybersecurity --- mathematics --- artificial intelligence --- Computer systems --- Information technology --- ADP systems (Computer systems) --- Computing systems --- Systems, Computer --- Electronic systems --- Cyberinfrastructure --- Computer systems. --- Information technology. --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management
Listing 1 - 10 of 139 | << page >> |
Sort by
|