-
出版商:
Independently Published
-
出版日期:
2019-07-26
-
售價:
$640
-
貴賓價:
9.5 折
$608
-
語言:
英文
-
頁數:
74
-
裝訂:
Quality Paper - also called trade paper
-
ISBN:
1083006606
-
ISBN-13:
9781083006608
-
相關分類:
Perl 程式語言、控制系統 Control-systems
商品描述
Air Force doctrine inadequately addresses Industrial Control Systems (ICS) security and as a result, the service is improperly organized and trained to secure missions across the domains of air, space, and cyberspace. In response, the Air Force must consider significant changes at the strategic, operational, and tactical levels to provide mission assurance to commanders.An important question that the Chief of Staffs Task Force Cyber Secure (TFCS) asks is: How do we organize, train, and equip Air Force forces to support the five core missions, in and through cyber? By their nature, air, space, and cyber dominance are tied to physical platforms from which the Air Force projects power. Increasingly, the line between physical and cyber has blurred as ICS become a key factor in enabling mission assurance through the basing system. Functional "stovepipes," specifically those of civil engineer and cyber surety, have resulted in ICS vulnerabilities, threating mission assurance at every one of the service's installations.While changes can be made to the way units analyze systems or task organize under a wing, none of that will be effective until Air Force doctrine, both civil engineer and cyber surety adequately recognizes the differences between cyberspace and the traditional physical domains of air and space. The TFCS infrastructure work group should prioritize revising both sets of doctrine to enable the force to view cyberspace for what it is, a digital battlefield that comes under fire every day, whether at home station or forward deployed. Without this revision, the limited mindset of Airmen in the field employing ICS enabled installations and the mission commanders they serve will never change.This compilation includes a reproduction of the 2019 Worldwide Threat Assessment of the U.S. Intelligence Community.The purpose of this paper is to influence the Air Force Deputy Chief of Staff for Logistics, Engineering, and Force Protection and the Chief, Information Dominance and Chief Information Officer to direct doctrinal changes that will drive modifications to the organization and training of civil engineer and cyber surety Airmen to better provide multi-domain mission assurance through securing ICS. First, the paper will suggest that the civil engineer and cyber surety views of ICS originate from fundamentally divergent perspectives, which in-turn, have led to the service unknowingly taking on infrastructure induced risk to mission accomplishment such as that illustrated by the opening vignette. The argument presented will offer that the root of this disconnect lies in doctrine. After framing the problem, the paper will recommend convergent solutions to align and alter the organization and training of civil engineer and cyber surety Airmen with the goal of closing the gap and subsequently, enhancing mission assurance. While the vignette offered provides a deployed example, the lessons are equally valid for home station or deployed-in-place missions.
商品描述(中文翻譯)
空軍的教義對於工業控制系統(ICS)安全的處理不足,因此該服務在空中、太空和網絡領域的任務安全組織和訓練不當。作為回應,空軍必須在戰略、作戰和戰術層面考慮重大變革,以向指揮官提供任務保障。參謀長網絡安全工作小組(TFCS)提出的一個重要問題是:我們如何組織、訓練和裝備空軍部隊,以支持五項核心任務,並在網絡中進行?從本質上講,空中、太空和網絡的主導地位與空軍投射力量的物理平台息息相關。隨著ICS成為通過基地系統實現任務保障的關鍵因素,物理與網絡之間的界限越來越模糊。功能性「煙囪」,特別是土木工程和網絡安全的煙囪,導致了ICS的脆弱性,威脅到該服務所有安裝的任務保障。
雖然可以改變單位分析系統或在某個聯隊下的任務組織方式,但在空軍的教義中,無論是土木工程還是網絡安全,都未能充分認識網絡空間與傳統物理領域(空中和太空)之間的差異之前,這些改變都不會有效。TFCS基礎設施工作組應優先修訂這兩套教義,使部隊能夠將網絡空間視為它所是的——一個每天都受到攻擊的數位戰場,無論是在本地基地還是前方部署。若不進行這一修訂,現場空軍人員在使用ICS啟用的安裝時的有限思維,以及他們所服務的任務指揮官的思維將永遠不會改變。
本文件包含2019年美國情報社群全球威脅評估的複製。本文的目的是影響空軍後勤、工程和部隊保護副參謀長,以及信息主導和首席信息官,指導教義變更,以推動土木工程和網絡安全空軍人員的組織和訓練的修改,從而更好地通過保護ICS提供多領域的任務保障。首先,本文將建議土木工程和網絡安全對ICS的看法源於根本上不同的視角,這反過來導致該服務在不知情的情況下承擔了基礎設施引起的任務完成風險,如開頭的情境所示。所提出的論點將表明,這一脫節的根源在於教義。在框定問題後,本文將建議一致的解決方案,以調整和改變土木工程和網絡安全空軍人員的組織和訓練,目標是縮小差距,隨後增強任務保障。雖然所提供的情境提供了一個部署的例子,但這些教訓對於本地基地或前方部署的任務同樣有效。