Improving the Cybersecurity of U.S. Air Force Military Systems Throughout Their Life Cycles
There is increasing concern that Air Force systems containing information technology are vulnerable to intelligence exploitation and offensive attack through cyberspace. In this report, the authors analyze how the Air Force acquisition/life-cycle management community can improve cybersecurity throug...
Saved in:
Main Author: | |
---|---|
Other Authors: | , , , |
Format: | Electronic Book Chapter |
Language: | English |
Published: |
RAND Corporation
2015
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_115554 | ||
005 | 20231005 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20231005s2015 xx |||||o ||| 0|eng d | ||
020 | |a j.ctt19rmd15 | ||
020 | |a 9780833093387 | ||
020 | |a 9780833089007 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.7249/j.ctt19rmd15 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a UTN |2 bicssc | |
072 | 7 | |a UD |2 bicssc | |
072 | 7 | |a JWG |2 bicssc | |
072 | 7 | |a TTM |2 bicssc | |
100 | 1 | |a Snyder, Don |4 auth | |
700 | 1 | |a Powers, James D. |4 auth | |
700 | 1 | |a Bodine-Baron, Elizabeth |4 auth | |
700 | 1 | |a Fox, Bernard |4 auth | |
700 | 1 | |a Kendrick, Lauren |4 auth | |
245 | 1 | 0 | |a Improving the Cybersecurity of U.S. Air Force Military Systems Throughout Their Life Cycles |
260 | |b RAND Corporation |c 2015 | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a There is increasing concern that Air Force systems containing information technology are vulnerable to intelligence exploitation and offensive attack through cyberspace. In this report, the authors analyze how the Air Force acquisition/life-cycle management community can improve cybersecurity throughout the life cycle of its military systems. | ||
540 | |a All rights reserved |4 http://oapen.org/content/about-rights | ||
546 | |a English | ||
650 | 7 | |a Network security |2 bicssc | |
650 | 7 | |a Digital lifestyle |2 bicssc | |
650 | 7 | |a Air forces & warfare |2 bicssc | |
650 | 7 | |a Military engineering |2 bicssc | |
653 | |a History | ||
653 | |a Technology | ||
856 | 4 | 0 | |a www.oapen.org |u https://www.jstor.org/stable/10.7249/j.ctt19rmd15 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/115554 |7 0 |z DOAB: description of the publication |