Accession Number : AD1041176


Title :   Defending Critical Infrastructure as Cyber Key Terrain


Descriptive Note : Technical Report


Corporate Author : AIR COMMAND AND STAFF COLLEGE, AIR UNIVERSITY MAXWELL AFB United States


Personal Author(s) : Molle,Derek


Full Text : https://apps.dtic.mil/dtic/tr/fulltext/u2/1041176.pdf


Report Date : 01 Aug 2016


Pagination or Media Count : 51


Abstract : This study first examines the problems which necessitate cyber defense of critical infrastructure, then develops criteria necessary for successful cyber defense. Five alternative solutions are introduced as evolutions from two solutions by Kuipers and Fabro: Stand Alone Networks, Converged Enterprise Networks, Logically Isolated Enclaves, Logically Isolated Enterprises, and Stand Alone Enterprises. Based on their estimated ability to fulfil the criteria derived from Department of Defense doctrine, commercial best practice, and recommendations from the Department of Homeland Security and the National Security Agency, this study found that for short term mission assurance of specific cyber key terrain, creation and defense of a Logically Isolated Enclave can be accomplished immediately and with near zero cost by a Cyber Protection Team. Long term mission assurance still requires an enterprise solution for cyber defense of critical infrastructure. The pursuit of a Logically Isolated Enterprise is estimated to provide the best solution for cyber defense of critical infrastructure by extending and enhancing the existing capabilities in the corporate network operations and security center to the logically isolated control system enterprise.


Descriptors :   cyber defense techniques , information systems , Combatant Commanders , computer networks , network architecture , threat evaluation , military doctrine , homeland security , infrastructure


Subject Categories : Computer Systems Management and Standards
      Military Operations, Strategy and Tactics


Distribution Statement : APPROVED FOR PUBLIC RELEASE