A Test Readiness Review (TRR) is conducted to determine if the system under review is ready to proceed into formal testing by deciding whether the test proce- dures are complete and verify their compliance with test plans and descriptions, ((TRR), AcqNotes 2017).
• The checklist excel file in (DoD Test Readiness Review (TRR) Risk Assessment) from the reference (test readiness review (TRR), AcqNotes 2017) includes sev- eral questions to be answered as part of TRR. Review and answer those questions while selecting a particular context.
• In an experiment or system of your choice, answer the question in the section (the TRR should answer the following questions) in the reference: ((TRR), AcqNotes 2017).
177
Bibliography
AcqNotes (2018) Test & evaluation overview. acqnotes.com
AGLearn (2018) Operations Security. https://aglearn.usda.gov/customcontent/APHIS/APHIS- OPSEC/OPSsummary.htm
Alsmadi I, Burdwell R, Aleroud A, Wahbeh A, Al-Qudah MA, Al-Omari A (2018) Practical infor- mation security. Springer, Berlin
Arnold JT (2012) The shoreline: where cyber and electronic warfare operations coexist.
BiblioScholar
Balaish T (2017) Cyber soldiers: White-hat hackers, CBS News, 21 Aug 2017
Barber DE, Alan Bobo T, Sturm KP (2015) Cyberspace operations planning: operating a technical military force beyond the kinetic domains. J Military Cyber Professionals Assoc 1(1) Barth TH, Horowitz SA, Kaye MF, Wu L (2015) Staffing Cyber Operations (Presentation). Institute
For Defense Analyses, Alexandria, VA
Bautista W (2018) Practical cyber intelligence: how action-based intelligence can be an effective response to incidents. Packt, Birmingham
Buchanan B (2018) CWPC contingency wartime planning course, global security
Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surveys Tutorials 18(2):1153–1176
CBS News (2016) http://www.cbsnews.com/news/fbi-paid-more-than-1-million-for-san-ber- nardino-iphone-hack-james-comey/
Cho J-H, Alsmadi I, Xu D (2016) Privacy and social capital in Online Social Networks, Global Communications Conference (GLOBECOM), IEEE. pp 1–7. Accessed 12 Apr 2016
CI Glossary – Terms & Definitions of Interest for DoD CI Professionals (2 May 2011), Deffense intelligence agency, https://www.dni.gov/files/NCSC/documents/ci/CI_Glossary.pdf
CRS (2015) Cyber Operations in DOD Policy and Plans: Issues for Congress, Congressional Research Service, 7–5700, www.crs.gov, R43848
Cyber Operations Personnel Report (2011) Department of Defense, Report to the Congressional Defense Committees
D’Aspremont J (2016) Cyber operations and international law: an interventionist legal thought.
J Conflict Security Law 21(3):367–368
Dartnall R (2017) Intelligence preparation of the cyber environment. sans.org
Defense Information Systems Agency (2016) DOD Cloud Computing Strategy Security Requirements Guide, Version 1, Release 2, Mar 18
Deliberate and Crisis Action Planning (2007) A presentation. www.acq.osd.mil
Department of Justice (2014) U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage, May 19.
http://www.justice.gov/opa/pr/2014/May/14-ag-528.html
DoD (1994) Joint tactics, techniques and procedures for noncombat evacuation operations (Joint Report 3-07.51, Second Draft). Washington, DC: Department of Defense
DoD (2010) Joint publication 1-02, Department of Defense Dictionary of military and associated terms
DoD (2011) DRRS Primer for Senior Leaders. http://www.highgroundconsulting.net DoD (2015) Cybersecurity test and evaluation guidebook, Version 1, dote.osd.mil DoD (2018a) Department of Defense Readiness Reporting System (DRRS) DoD (2018b) Cybersecurity test and evaluation guidebook, Version 2. dote.osd.mil FY16 Cybersecurity (2016) dote.osd.mil
GAO (2017) Defense cyber security, DOD’s monitoring of progress in implementing cyber strate- gies can be strengthened, GAO-17-512
Goldsmith J (2010) Can we stop the cyber arms race? WASH POST, Feb 1, 2010, at A17
Greene T (2017) U.S. military wants white-hat hackers to target its cyber security systems ‘Hack the Air Force’ invites vetted attackers to test its public web sites, network world. Accessed 27 Apr 2017
Bibliography
Heckman KE, Stech FJ, Schmocker BS, Thomas RK (2015) Denial and deception in cyber defense.
Computer 48:36–44. https://doi.org/10.1109/mc.2015.104
Hilfiker JL (2013) Responding to cyber attacks and the applicability of existing international law, United States Army War College. http://www.dtic.mil/dtic/tr/fulltext/u2/a589333.pdf
Holland R (2016) The OPSEC Opportunity. https://www.digitalshadows.com/blog-and-research/
the-opsec-opportunity/. Accessed 31 May 2016
Jakobson G (2011) Mission cyber security situation assessment using impact dependency graphs.
In: Proceedings of the 14th International Conference on Information Fusion (FUSION), pp 1–8 Joint Pub (1999) Joint task force planning guidance and procedures. https://www.hsdl.
org/?abstract&did=771543
Joint Publication 3-05.5 (1993) Joint special operations targeting and mission planning proce- dures. Accessed 10 Aug 1993
Joint Publication 3-12 (2013) Cyberspace Operations, Joint Publication 3-12 (R). Accessed 5 Feb 2013. fas.org
Joint Publication 3-12 (2018) Cyberspace operations Accessed 8 Jun 2018
JOPP (2013) Joint operational planning process workbook, NWC 4111J, JMO Department, Naval War College, 1 July 2013 (With Chg1)
Kick J (2014) Cyber exercise playbook. The MITRE Corporation, McLean, VA
Klann G (2003) Crisis leadership: using military lessons, organizational experiences, and the power of influence to lessen the impact of chaos on the people you lead. Center for Creative Leadership, Greensboro, NC
Kott A, Stoianov N, Baykal N, Moller A, Sawilla R, Jain P, Lange M, Vidu C (2015) Assessing Mission impact of cyberattacks: report of the NATO IST-128 Workshop, ARL-TR-7566, Dec 2015
Kott A, Ludwig J, Lange M (2017) Assessing Mission impact of cyberattacks: toward a model-driven paradigm. IEEE Security Privacy 15(5):65–74. https://doi.org/10.1109/
MSP.2017.3681068
Kuusisto T, Kuusisto R, Roehrig W (2015) Situation understanding for operational art in cyber operations. 14th European conference on cyber warfare and security, ECCWS
Lemay A, Knight S, Fernandez J (2014) Intelligence preparation of the cyber environment, finding the high ground in cyberspace. J Inform Warfare 13(3)
Leyden J (2012) The ‘one tiny slip’ that put LulzSec chief Sabu in the FBI’s pocket Well, at least this’ll make a half decent movie, https://www.theregister.co.uk/2012/03/07/lulzsec_takedown_
analysis/. Accesssed 7 Mar 2012
Lizotte M, Derbentseva N (2016) Collaborative understanding of complex situations A Toolbox for Multidisciplinary Collaboration (TMC), Defense Research and Development Canada Scientific Report DRDC-RDDC-2016-R057, April 2015
Long A (2017) A cyber SIOP? Operational considerations for strategic offensive cyber planning.
J Cybersecurity 3(1):19–28
Magdalenski J (2016) Operations Security or Cybersecurity? http://www.doncio.navy.mil/chips/
ArticleDetails.aspx?ID=7377
Mahvi AJ (2018) Strategic offensive cyber operations: capabilities, limitations, and role of the intelligence community. In: Kosal M (ed) Technology and the intelligence community.
Advanced sciences and technologies for security applications. Springer, Cham
Mead J, Kersha D (2016) Shaping defense science and technology in the maritime domain 2016–
2026. www.dst.defence.gov.au
Musman S, Temin A, Tanner M, Fox D, Pridemore B (2009) Evaluating the impact of cyber attacks on missions. MITRE, McLean, VA
Musman S, Temin A, Tanner M, Fox D, Pridemore B (2010) Evaluating the impact of cyber attacks on missions. 5th international conference on information warfare and security
NATO (2013) Cooperative Cyber Defense Centre of Excellence (CCDCOE), ‘The Tallinn Manual’.
http://www.ccdcoe.org/249.html. Accessed 12 Sep 2013
NATO (2016) Social media as a tool of hybrid warfare. NATO StratCOM COE
179
Noel S, Ludwig J, Jain P, Johnson D, Thomas R, McFarland J, King B, Webster S, Tello B (2015) Analyzing mission impacts of cyber actions. In: Proceedings of the NATO IST-128 workshop on cyber attack detection. Forensics and Attribution for Assessment of Mission Impact, Istanbul OPSA (2018) Operational security professional’s association, https://www.opsecprofessionals.
org/terms.html
Rid T (2013) Cyber war will not take place. Oxford University Press, New York, p 32 Riddle BJ (2016) Army cyber structure alignment. Air University, Maxwell, AFB, AL
Schmitt MN (2013) Tallinn manual on the international law applicable to cyber warfare. Cambridge University Press, New York, NY, pp 6–19
Schmitt MN (2017) Peacetime cyber responses and wartime cyber operations under international law: an analytical Vade Mecum. Har Nat Sec J 8:239–282
Schulmeyer G (2008) Handbook of software quality assurance, 4th edn. Artech House, Norwood, MA
Shakarian P, Shakarian J, Ruef A (2013) Introduction to cyber warfare. Elsevier, Amsterdam Spinuzzi MA (2007) CCIR for complex and uncertain environments. School of Advanced Military
Studies, Leavenworth, KS
Steiner H (2017) Cyber operations legal rules and state practice. Authority and control in International Humanitarian Law. Stockholm University
T&E Guide (1993) Test and evaluation management guide, defense systems management college Test Readiness Review (TRR), AcqNotes (2017) http://acqnotes.com/acqnote/acquisitions/
test-readiness-review
Theohary CA, Harrington AI (2015) Cyber Operations in DOD Policy and Plans: Issues for Congress. Congressional Research Service, Washington, DC. https://pdfs.semanticscholar.
org/73f1/5e0fb26f8ad007_d1f8257651fd04f45691e8.pdf. Accessed 25 Oct 2016
U.S. Joint Chiefs of Staff (2015) “Cyberspace Operations” Joint Publication 3-12(R). US Joint Chiefs of Staff, Washington, DC. Accessed 3 Feb 2015
Underwood K (2018) DHS builds mobile defenses. The cyber edge, July 1, 2018
United States, Joint Chiefs of Staff (1997) DOD Dictionary of Military Terms and Associated Terms. Joint Publication 1-02. Washington, DC: JCS
US Naval War College (2014) Maritime component commander guidebook
Usrey J (2014), Changing personnel readiness reporting to measure capability, Army sustainment Wrange P (2014) Intervention in National and Private Cyber Space and International Law. In:
Ebbesson J, Jacobsson M, Klamberg MA (eds) International law and changing perceptions of security. Brill Academic, Leiden
Bibliography
181
© Springer Nature Switzerland AG 2019 I. Alsmadi, The NICE Cyber Security Framework, https://doi.org/10.1007/978-3-030-02360-7_8