Paper
22 September 2003 DARPA OPX information assurance: technologies and lessons learned
John H. Lowry, Doug Maughan
Author Affiliations +
Abstract
The behavior of cyber-terrorists and other cyber-adversaries can be modeled to identify critical phases of their behavior yielding insights into necessary behavior for them to accomplish their mission. Focusing technology on thwarting the adversary mission rather than particular exploits is a critical component of successful defense-in-depth. This paper presents the results of modeling workshops that led to a set of experiments that successfully thwarted a cyber-adversary’s mission.
© (2003) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
John H. Lowry and Doug Maughan "DARPA OPX information assurance: technologies and lessons learned", Proc. SPIE 5071, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement II, (22 September 2003); https://doi.org/10.1117/12.500843
Lens.org Logo
CITATIONS
Cited by 3 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information assurance

Tolerancing

Process modeling

Information technology

Data modeling

Systems modeling

Telecommunications

Back to Top