• Tidak ada hasil yang ditemukan

S0104: Skill in Conducting Test Readiness Reviews

A Test Readiness Review (TRR) is conducted to determine if the system under review is ready to proceed into formal testing by deciding whether the test proce- dures are complete and verify their compliance with test plans and descriptions, ((TRR), AcqNotes 2017).

• The checklist excel file in (DoD Test Readiness Review (TRR) Risk Assessment) from the reference (test readiness review (TRR), AcqNotes 2017) includes sev- eral questions to be answered as part of TRR. Review and answer those questions while selecting a particular context.

• In an experiment or system of your choice, answer the question in the section (the TRR should answer the following questions) in the reference: ((TRR), AcqNotes 2017).

177

Bibliography

AcqNotes (2018) Test & evaluation overview. acqnotes.com

AGLearn (2018) Operations Security. https://aglearn.usda.gov/customcontent/APHIS/APHIS- OPSEC/OPSsummary.htm

Alsmadi I, Burdwell R, Aleroud A, Wahbeh A, Al-Qudah MA, Al-Omari A (2018) Practical infor- mation security. Springer, Berlin

Arnold JT (2012) The shoreline: where cyber and electronic warfare operations coexist.

BiblioScholar

Balaish T (2017) Cyber soldiers: White-hat hackers, CBS News, 21 Aug 2017

Barber DE, Alan Bobo T, Sturm KP (2015) Cyberspace operations planning: operating a technical military force beyond the kinetic domains. J Military Cyber Professionals Assoc 1(1) Barth TH, Horowitz SA, Kaye MF, Wu L (2015) Staffing Cyber Operations (Presentation). Institute

For Defense Analyses, Alexandria, VA

Bautista W (2018) Practical cyber intelligence: how action-based intelligence can be an effective response to incidents. Packt, Birmingham

Buchanan B (2018) CWPC contingency wartime planning course, global security

Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surveys Tutorials 18(2):1153–1176

CBS News (2016) http://www.cbsnews.com/news/fbi-paid-more-than-1-million-for-san-ber- nardino-iphone-hack-james-comey/

Cho J-H, Alsmadi I, Xu D (2016) Privacy and social capital in Online Social Networks, Global Communications Conference (GLOBECOM), IEEE. pp 1–7. Accessed 12 Apr 2016

CI Glossary – Terms & Definitions of Interest for DoD CI Professionals (2 May 2011), Deffense intelligence agency, https://www.dni.gov/files/NCSC/documents/ci/CI_Glossary.pdf

CRS (2015) Cyber Operations in DOD Policy and Plans: Issues for Congress, Congressional Research Service, 7–5700, www.crs.gov, R43848

Cyber Operations Personnel Report (2011) Department of Defense, Report to the Congressional Defense Committees

D’Aspremont J (2016) Cyber operations and international law: an interventionist legal thought.

J Conflict Security Law 21(3):367–368

Dartnall R (2017) Intelligence preparation of the cyber environment. sans.org

Defense Information Systems Agency (2016) DOD Cloud Computing Strategy Security Requirements Guide, Version 1, Release 2, Mar 18

Deliberate and Crisis Action Planning (2007) A presentation. www.acq.osd.mil

Department of Justice (2014) U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S.  Corporations and a Labor Organization for Commercial Advantage, May 19.

http://www.justice.gov/opa/pr/2014/May/14-ag-528.html

DoD (1994) Joint tactics, techniques and procedures for noncombat evacuation operations (Joint Report 3-07.51, Second Draft). Washington, DC: Department of Defense

DoD (2010) Joint publication 1-02, Department of Defense Dictionary of military and associated terms

DoD (2011) DRRS Primer for Senior Leaders. http://www.highgroundconsulting.net DoD (2015) Cybersecurity test and evaluation guidebook, Version 1, dote.osd.mil DoD (2018a) Department of Defense Readiness Reporting System (DRRS) DoD (2018b) Cybersecurity test and evaluation guidebook, Version 2. dote.osd.mil FY16 Cybersecurity (2016) dote.osd.mil

GAO (2017) Defense cyber security, DOD’s monitoring of progress in implementing cyber strate- gies can be strengthened, GAO-17-512

Goldsmith J (2010) Can we stop the cyber arms race? WASH POST, Feb 1, 2010, at A17

Greene T (2017) U.S. military wants white-hat hackers to target its cyber security systems ‘Hack the Air Force’ invites vetted attackers to test its public web sites, network world. Accessed 27 Apr 2017

Bibliography

Heckman KE, Stech FJ, Schmocker BS, Thomas RK (2015) Denial and deception in cyber defense.

Computer 48:36–44. https://doi.org/10.1109/mc.2015.104

Hilfiker JL (2013) Responding to cyber attacks and the applicability of existing international law, United States Army War College. http://www.dtic.mil/dtic/tr/fulltext/u2/a589333.pdf

Holland R (2016) The OPSEC Opportunity. https://www.digitalshadows.com/blog-and-research/

the-opsec-opportunity/. Accessed 31 May 2016

Jakobson G (2011) Mission cyber security situation assessment using impact dependency graphs.

In: Proceedings of the 14th International Conference on Information Fusion (FUSION), pp 1–8 Joint Pub (1999) Joint task force planning guidance and procedures. https://www.hsdl.

org/?abstract&did=771543

Joint Publication 3-05.5 (1993) Joint special operations targeting and mission planning proce- dures. Accessed 10 Aug 1993

Joint Publication 3-12 (2013) Cyberspace Operations, Joint Publication 3-12 (R). Accessed 5 Feb 2013. fas.org

Joint Publication 3-12 (2018) Cyberspace operations Accessed 8 Jun 2018

JOPP (2013) Joint operational planning process workbook, NWC 4111J, JMO Department, Naval War College, 1 July 2013 (With Chg1)

Kick J (2014) Cyber exercise playbook. The MITRE Corporation, McLean, VA

Klann G (2003) Crisis leadership: using military lessons, organizational experiences, and the power of influence to lessen the impact of chaos on the people you lead. Center for Creative Leadership, Greensboro, NC

Kott A, Stoianov N, Baykal N, Moller A, Sawilla R, Jain P, Lange M, Vidu C (2015) Assessing Mission impact of cyberattacks: report of the NATO IST-128 Workshop, ARL-TR-7566, Dec 2015

Kott A, Ludwig J, Lange M (2017) Assessing Mission impact of cyberattacks: toward a model-driven paradigm. IEEE Security Privacy 15(5):65–74. https://doi.org/10.1109/

MSP.2017.3681068

Kuusisto T, Kuusisto R, Roehrig W (2015) Situation understanding for operational art in cyber operations. 14th European conference on cyber warfare and security, ECCWS

Lemay A, Knight S, Fernandez J (2014) Intelligence preparation of the cyber environment, finding the high ground in cyberspace. J Inform Warfare 13(3)

Leyden J (2012) The ‘one tiny slip’ that put LulzSec chief Sabu in the FBI’s pocket Well, at least this’ll make a half decent movie, https://www.theregister.co.uk/2012/03/07/lulzsec_takedown_

analysis/. Accesssed 7 Mar 2012

Lizotte M, Derbentseva N (2016) Collaborative understanding of complex situations A Toolbox for Multidisciplinary Collaboration (TMC), Defense Research and Development Canada Scientific Report DRDC-RDDC-2016-R057, April 2015

Long A (2017) A cyber SIOP? Operational considerations for strategic offensive cyber planning.

J Cybersecurity 3(1):19–28

Magdalenski J (2016) Operations Security or Cybersecurity? http://www.doncio.navy.mil/chips/

ArticleDetails.aspx?ID=7377

Mahvi AJ (2018) Strategic offensive cyber operations: capabilities, limitations, and role of the intelligence community. In: Kosal M (ed) Technology and the intelligence community.

Advanced sciences and technologies for security applications. Springer, Cham

Mead J, Kersha D (2016) Shaping defense science and technology in the maritime domain 2016–

2026. www.dst.defence.gov.au

Musman S, Temin A, Tanner M, Fox D, Pridemore B (2009) Evaluating the impact of cyber attacks on missions. MITRE, McLean, VA

Musman S, Temin A, Tanner M, Fox D, Pridemore B (2010) Evaluating the impact of cyber attacks on missions. 5th international conference on information warfare and security

NATO (2013) Cooperative Cyber Defense Centre of Excellence (CCDCOE), ‘The Tallinn Manual’.

http://www.ccdcoe.org/249.html. Accessed 12 Sep 2013

NATO (2016) Social media as a tool of hybrid warfare. NATO StratCOM COE

179

Noel S, Ludwig J, Jain P, Johnson D, Thomas R, McFarland J, King B, Webster S, Tello B (2015) Analyzing mission impacts of cyber actions. In: Proceedings of the NATO IST-128 workshop on cyber attack detection. Forensics and Attribution for Assessment of Mission Impact, Istanbul OPSA (2018) Operational security professional’s association, https://www.opsecprofessionals.

org/terms.html

Rid T (2013) Cyber war will not take place. Oxford University Press, New York, p 32 Riddle BJ (2016) Army cyber structure alignment. Air University, Maxwell, AFB, AL

Schmitt MN (2013) Tallinn manual on the international law applicable to cyber warfare. Cambridge University Press, New York, NY, pp 6–19

Schmitt MN (2017) Peacetime cyber responses and wartime cyber operations under international law: an analytical Vade Mecum. Har Nat Sec J 8:239–282

Schulmeyer G (2008) Handbook of software quality assurance, 4th edn. Artech House, Norwood, MA

Shakarian P, Shakarian J, Ruef A (2013) Introduction to cyber warfare. Elsevier, Amsterdam Spinuzzi MA (2007) CCIR for complex and uncertain environments. School of Advanced Military

Studies, Leavenworth, KS

Steiner H (2017) Cyber operations legal rules and state practice. Authority and control in International Humanitarian Law. Stockholm University

T&E Guide (1993) Test and evaluation management guide, defense systems management college Test Readiness Review (TRR), AcqNotes (2017) http://acqnotes.com/acqnote/acquisitions/

test-readiness-review

Theohary CA, Harrington AI (2015) Cyber Operations in DOD Policy and Plans: Issues for Congress. Congressional Research Service, Washington, DC. https://pdfs.semanticscholar.

org/73f1/5e0fb26f8ad007_d1f8257651fd04f45691e8.pdf. Accessed 25 Oct 2016

U.S. Joint Chiefs of Staff (2015) “Cyberspace Operations” Joint Publication 3-12(R). US Joint Chiefs of Staff, Washington, DC. Accessed 3 Feb 2015

Underwood K (2018) DHS builds mobile defenses. The cyber edge, July 1, 2018

United States, Joint Chiefs of Staff (1997) DOD Dictionary of Military Terms and Associated Terms. Joint Publication 1-02. Washington, DC: JCS

US Naval War College (2014) Maritime component commander guidebook

Usrey J (2014), Changing personnel readiness reporting to measure capability, Army sustainment Wrange P (2014) Intervention in National and Private Cyber Space and International Law. In:

Ebbesson J, Jacobsson M, Klamberg MA (eds) International law and changing perceptions of security. Brill Academic, Leiden

Bibliography

181

© Springer Nature Switzerland AG 2019 I. Alsmadi, The NICE Cyber Security Framework, https://doi.org/10.1007/978-3-030-02360-7_8