DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS

Size: px
Start display at page:

Download "DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS"

Transcription

1 DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS Todd Waskiewicz and Peter LaMonica Air Force Research Laboratory Information and Intelligence Exploitation Division {Todd.Waskiewicz, Abstract Intelligence analysts are tasked with making sense of enormous amounts of data and gaining an awareness of a situation that can be acted upon. This process can be extremely difficult and time consuming. Trying to differentiate between important pieces of information and extraneous data only complicates the problem. When dealing with data containing entities and relationships, social network analysis (SNA) techniques can be employed to make this job easier. Applying network measures to social network graphs can identify the most significant nodes (entities) and edges (relationships) and help the analyst further focus on key areas of concern. Strange developed a model that identifies high value targets such as centers of gravity and critical vulnerabilities 1. SNA lends itself to the discovery of these high value targets and the Air Force Research Laboratory (AFRL) has investigated several network measures such as centrality, betweenness, and grouping to identify centers of gravity and critical vulnerabilities. Using these network measures, a process for the intelligence analyst has been developed to aid analysts in identifying points of tactical emphasis. Organizational Risk Analyzer (ORA) and Terrorist Modus Operandi Discovery System (TMODS) are the two applications used to compute the network measures and identify the points to be acted upon. Therefore, the result of leveraging social network analysis techniques and applications will provide the analyst and the intelligence community with more focused and concentrated analysis results allowing them to more easily exploit key attributes of a network, thus saving time, money, and manpower. Keywords: Social Network Analysis, Center of Gravity, Intelligence Analysis, and Knowledge Discovery Introduction The concept of social networks was developed to provide a new method for analyzing the social structure and concept of entities and relationships within a network 2. Social network analysis consists of a set of metrics and algorithms that analyze network characteristics, such as nodes, edges, and attributes. These techniques can be applied not only to social networks, but they can also be applied to multi-modal domains. Evolutionary and Bio-Inspired Computation: Theory and Applications II edited by Misty Blowers, Alex F. Sisti, Proc. of SPIE Vol. 6964, 69640B, (2008) X/08/$18 doi: / SPIE Digital Library -- Subscriber Archive Copy Proc. of SPIE Vol B-1

2 One particular focus of this research is to apply social network analysis techniques to derive high value targets that are especially critical to the intelligence community. Analysts within the intelligence community are interested in exploiting targets of interest by learning network characteristics such as centers of gravity and their critical vulnerabilities. In determining these attributes, analysts can gain a deeper understanding of the situation, which allows for greater impact of military action. These network attributes can be derived from the Strange Model of Critical Vulnerabilities. Dr. Joe Strange claims that extensive knowledge of the enemy s network is required to determine physical and psychological strengths and weaknesses, and ultimately to identify centers of gravity and critical vulnerabilities 1. For example, the Strange Model states that the first task in planning is to identify centers of gravity, and strategically understand the network that encompasses these centers. Strange Model In an edition of the Marine Corps University s Perspectives on Warfighting, Strange s Centers of Gravity and Critical Vulnerabilities: Building on the Clausewitzian Foundation So That We Can All Speak the Same Language is featured. In this paper, Strange presents a unique perspective on warfighting. For the purposes of this paper, that perspective is adopted for the analysis of criminal and terrorist networks. Strange presents a model for the adversary that includes four different roles. These roles are center of gravity, critical capability, critical requirement, and critical vulnerability 1. Strange defines a center of gravity as a primary source of moral or physical strength, power, and resistance. A critical capability is a primary ability which merits a center of gravity to be identified as such in the context of a given scenario or situation. The essential conditions, resources, and means for a critical capability to be fully operative are critical requirements. Critical vulnerabilities are critical requirements or components thereof, which are deficient or vulnerable to neutralization, interdictions or attack in a manner achieving decisive results. These four roles can be applied to an adversary in an effort to minimize risk when planning action against them. When an adversary is modeled as a network, these roles can be filled through careful analysis of the network. One idea that Strange stresses is that the answer to whom and what fills these roles is completely contextual 1. In the case of warfighting, the answers may depend on the mission. For the analysis of criminal and terrorist networks, it is the same case. When analyzing a criminal or terrorist network, it is for some purpose; whether it is to identify someone who holds a lot of information or the removal of a critical node from the network. For example, if a terrorist network is being analyzed, the objective may be to cripple the network s ability to obtain bomb-making materials. The results of this analysis may be different from analysis concerned with cutting off the flow of money through the network. Consequently, when conducting network analysis, the results must take context. The highest-ranking node of some measurement may not be the most Proc. of SPIE Vol B-2

3 significant according to the purpose of the analysis. Organizational Risk Analyzer (ORA) Organizational Risk Assessment (ORA) is a network analysis tool that detects risks or vulnerabilities of an organization s design structure 3. For example, ORA can help determine if the removal of a certain person from a network will cripple the network s capabilities or who the best person to start the spread of ideas through a network is. Relational data collected by an individual can be represented by a collection of networks called a Meta- Matrix and analyzed by ORA. The relational data can encompass associations between people, knowledge, resources, and tasks. ORA can both read and write a Meta-Matrix in multiple formats making it interoperable with other network analysis software 3. The network analysis can be applied to a variety of fields such as sociology, intelligence analysis, and operations research. This paper will focus on the use of ORA for the analysis of criminal and terrorist networks. ORA provides three main ways to analyze networks; through its Reports, View Charts, and Visualize features. Each feature provides its own value to the analysis of networks. Reports provides a means of analyzing networks from a higher level than simply network measures such as eigenvector centrality and betweenness centrality. The Reports feature gives a high level name to a measure or collection of measures so network measures may easily be selected for the appropriate purpose. For example, the Key Entities report generates a report that allows the user to see who, what, and how key entities are important. For the who portion, the report will identify the person entities that are leaders, in the know, and connect groups along with several other reasons for importance. The Key Entities report also indicates what measures were used to achieve the calculations. The Report capability provides an easy and quick way to analyze a network without spending the time of seeking out and calculating the appropriate measures. The View Charts feature offers a more specialized means of analysis. It provides a large list of measures between the types of entities contained in the network. For example, betweeness centrality can be calculated between person entities or out-degree centrality can be calculated between person and knowledge entity types. Once a measure is selected, a bar graph, scatter plot graph, or histogram can be used to display the results. The user can select the top number of results. For example, the user can select to display the top 5 scores for centrality. View Charts provides the user with a more customized and specialized way of analyzing a network while quickly calculating and displaying the results in a number of ways. The Visualization feature gives another way to view the data and conceptualize the analysis of the network. It provides a number of ways to customize how the data is presented. For example, only certain types of nodes can be displayed or edges below a specific weight can be omitted. Customizing the way the network is displayed is the true value of this feature. By only viewing a subgraph of the network and altering the way it is Proc. of SPIE Vol B-3

4 displayed allows a user to see the graph beyond simple metrics. Significant entities and features of the network may be discovered that ordinarily may not have been found through calculating measures. Visualization can also motivate more analysis through Reports and View Charts. Terrorist Modus Operandi Discovery System (TMODS) Terrorist Modus Operandi Discovery System (TMODS) is an application that has many utilities that include social network and pattern matching algorithms and techniques. This application was developed by 21 st Century Technologies, Inc. and is very effective at assisting analysts to determine areas of importance in a network graph. One such algorithm within the TMODS application is known as the Best Friends Group Detection algorithm. This algorithm is very effective at taking network data and determining the groups of entities that exist within the network based on the relationships and attributes of the network. All nodes, edges, and attributes are analyzed and evaluated in discovering these groups. Thus, no prior domain knowledge is needed to determine the particular groups that exist within a network. The Best Friends Group Detection algorithm uses various social network analysis metrics, such as closeness and betweenness centrality. These two metrics define the connectedness value of each node to the other nodes within the network. From this attribute, groups can be defined within the network. Figure 1 demonstrates how the Best Friends Group Detection algorithm can discover groups from the network data. By gaining this knowledge, analysts can now determine relationships that exist within the network. Not only can this algorithm determine explicit relationships (e.g. A B), but it also can derive implicit relationships. For example, Node A is connected to Node C through its relationship with Node B. Figure 1: TMODS Best Friends Group Detection Algorithm The Best Friends Group Detection algorithm allows analysts to reason about actors and their relationships, groups, and entire networks in a quantifiable and rigorous manner 4. Thus, with limited observability and knowledge of these large networks, analysts can detect groups and relationships that exist that they previously had no knowledge of. Process In an attempt to fulfill the roles described in the Strange model, ORA and TMODS were applied. The network that was analyzed includes trafficking of illicit goods via civil aircraft outside the United States. When using network Proc. of SPIE Vol B-4

5 analysis along with the Strange model, one should start by finding the center of gravity in the network. This is because the critical capabilities, vulnerabilities, and requirements will all be in the context of the center(s) of gravity that exist within the network. They will all be the attributes that enable the center of gravity. Finding the center of gravity in a network lends itself to the use of the eigenvector centrality metric. This is because the metric finds the nodes that are not only highly connected, but also connected to other nodes that are highly connected. A node with a high eigenvector centrality would certainly exhibit the properties of a center of gravity in a network. To find the center of gravity using eigenvector centrality, ORA and its View Charts feature were used selecting Centrality, Eigenvector: agent x agent. The result is pictured in Figure 2. Notice there are two distinct nodes that score higher than the rest of the nodes. These two nodes are most likely to be centers of gravity. Due to the relative closeness of their values, they both could be considered centers of gravity or one could be better suited than the other. To find out which is the case, further investigation is required. To do that, TMODS was used. Centrality, Eigenvector: agent x agent Figure 2. Eigenvector Centrality Results Analysis with TMODS The same dataset that was processed in ORA was then processed in TMODS, with the Best Friends Group Detection algorithm. As noted, the Best Friends Group Detection algorithm can take the network data and determine what groups exist within that data. An image of the data in TMODS can be seen in Figure 3. Figure 3. Dataset in TMODS Once the data is loaded, the user can execute the group detection algorithm and view the results. In one of the group results, the algorithm found that the same first two individuals from the eigenvector centrality analysis were found in the same group. There was also a third individual found that was ranked fourth highest in the eigenvector centrality, which led the analysis to focus more on this person. This person was also a known trafficker of illicit goods, and connects the two top individuals with many other known traffickers. In the Strange model, boundaries are prime candidates for critical vulnerabilities to the network 1. Further, since this individual acts as a boundary between these two groups, it can be inferred that these top two individuals are also associated with the trafficking of illicit goods 5. Figure 4 Proc. of SPIE Vol B-5

6 demonstrates how this group was derived from the data, and how explicit and implicit relationships can be discovered. Figure 4. Group Detection Result Results and Application Comparing the manual analysis of relational data to the process described in this paper, not only is there a significant decrease in the amount of time required for analysis, but greater capabilities such as visualization and report generation are provided. The endstate is that the analyst is provided with a capability to go beyond a trivial analysis, and can delve into the underlying relationships and discover the hotspots of the dataset much faster. This gives the analyst the potential to gain a deeper understanding of the specific scenario resulting in a greater overall awareness. Further, when an analyst has relational data, the process described offers a means for maintenance of the data. Nodes and connections can be easily added and removed using ORA and TMODS. In addition, maintaining this repository of network data in a network analysis tool allows for fast analysis of the data. Possessing the ability to manipulate the visualization of a network and calculate network metrics at a moment s notice is invaluable to the analyst while they carry out their mission. Factoring in the current capabilities of text extraction, a completely automatic process could be developed to save the analyst even more time. Converting open source documents to relational data is a viable option today and would generate far more relational data than a human could manually process in the same amount of time. This would further enhance the process described in this research. The result of taking advantage of these analysis tools achieves the goal of this research and that is to provide the analyst with the ability to perform their job more effectively and efficiently. In addition, Strange states that centers of gravity are dynamic agents of action and influence, which need to be closely monitored and tracked 1. The process outlined in this research can also apply temporally, as it can trace entities and their relationships through time. The analyst can then learn and understand how networks evolve and decay, as well as identify trends and patterns, giving them greater insight and knowledge into their research domain. Summary According to Strange, a critical vulnerability is something that makes a center of gravity vulnerable 1. Intelligence analysts are routinely tasked with exploiting these centers of gravity and determining the weaknesses of the adversary. However, analysts are faced with numerous databases that are all Proc. of SPIE Vol B-6

7 enormous in size, which further justifies the need to apply this process to their problem. When applying the process, the analyst can easily maintain and alter network data while having the ability to execute algorithms against the data. As a result, they will be able to process data more efficiently and gain a greater understanding of the data. Reference [1] Strange, J. (1996). Perspectives on warfighting: Centers of gravity and critical vulnerabilities. Quantico, VA: Marine Corps University. [2] Nadel, S.F. (1957). The Theory of Social Structure. New York, NY: Free Press. [3] Carley, Kathleen & Reminga, Jeffrey. (2004). ORA: Organization Risk Analyzer. Carnegie Mellon University, School of Computer Science, Institute for Software Research International, Technical Report CMU-ISRI [4] Coffman, T.R., and Marcus, S.E. (2004). Pattern classification in social network analysis: A case study, Proceedings of the 2004 IEEE Aerospace Conference, March 6-13, [5] Macskassy, S., and Provost, F. (2005). Suspicion scoring based on guilt by association, collective inference, and focused data access. International Conference on Intelligence Analysis. Proc. of SPIE Vol B-7

Dynamic Context Maintenance in Human Terrain

Dynamic Context Maintenance in Human Terrain Distribution A: Approved for public release; distribution is unlimited. Dynamic Context Maintenance in Human Terrain July 14, 2009 Nadya Belov, Jeff Patti, and Angela Pawlowski Lockheed Martin Advanced

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

Introducing Cyber Resiliency Concerns Into Engineering Education

Introducing Cyber Resiliency Concerns Into Engineering Education Introducing Cyber Resiliency Concerns Into Engineering Education Mr. Tom McDermott Georgia Tech Research Institute Mr. Barry Horowitz University of Virginia NDIA 20 th Annual Systems Engineering Conference

More information

10 Steps to Building an Architecture for Space Surveillance Projects. Eric A. Barnhart, M.S.

10 Steps to Building an Architecture for Space Surveillance Projects. Eric A. Barnhart, M.S. 10 Steps to Building an Architecture for Space Surveillance Projects Eric A. Barnhart, M.S. Eric.Barnhart@harris.com Howard D. Gans, Ph.D. Howard.Gans@harris.com Harris Corporation, Space and Intelligence

More information

Cyber Semantic Landscape Ontology and Taxonomy

Cyber Semantic Landscape Ontology and Taxonomy The Cyber Semantic Landscape Ontology and Taxonomy (CSLOT) provides a structured approach to the dynamic needs of the Cyber security concepts, theories, standards, and compliance issues facing the 21st

More information

A Common Cyber Threat Framework: A Foundation for Communication

A Common Cyber Threat Framework: A Foundation for Communication For For Public Distribution A Common Cyber Threat Framework: A Foundation for Communication This is a work of the U.S. Government and is not subject to copyright protection in the United States. Overview

More information

RiskSense Attack Surface Validation for IoT Systems

RiskSense Attack Surface Validation for IoT Systems RiskSense Attack Surface Validation for IoT Systems 2018 RiskSense, Inc. Surfacing Double Exposure Risks Changing Times and Assessment Focus Our view of security assessments has changed. There is diminishing

More information

Robustness of Centrality Measures for Small-World Networks Containing Systematic Error

Robustness of Centrality Measures for Small-World Networks Containing Systematic Error Robustness of Centrality Measures for Small-World Networks Containing Systematic Error Amanda Lannie Analytical Systems Branch, Air Force Research Laboratory, NY, USA Abstract Social network analysis is

More information

Engineering Improvement in Software Assurance: A Landscape Framework

Engineering Improvement in Software Assurance: A Landscape Framework Engineering Improvement in Software Assurance: A Landscape Framework Lisa Brownsword (presenter) Carol C. Woody, PhD Christopher J. Alberts Andrew P. Moore Agenda Terminology and Problem Scope Modeling

More information

Vulnerability Assessments and Penetration Testing

Vulnerability Assessments and Penetration Testing CYBERSECURITY Vulnerability Assessments and Penetration Testing A guide to understanding vulnerability assessments and penetration tests. OVERVIEW When organizations begin developing a strategy to analyze

More information

Anonymized Social Media Datasets, Dark Networks, and Strategic Simulation

Anonymized Social Media Datasets, Dark Networks, and Strategic Simulation Anonymized Social Media Datasets, Dark Networks, and Strategic Simulation Corey Lofdahl Frank Witmer Prepared for the conference on, Human Security in The New Information Age: How Social Media Impacts

More information

Advanced Security Tester Course Outline

Advanced Security Tester Course Outline Advanced Security Tester Course Outline General Description This course provides test engineers with advanced skills in security test analysis, design, and execution. In a hands-on, interactive fashion,

More information

Evaluation of Organizational Designs with Network-Centric Philosophy

Evaluation of Organizational Designs with Network-Centric Philosophy Evaluation of Organizational Designs with Network-Centric Philosophy Celestine A. Ntuen, Ph.D Distinguished University Professor The Army Center for Human-Centric C2 Decision Making ntuen@ncat.edu http://gandalf.ncat.edu/ihms

More information

System of Systems Architecture Generation and Evaluation using Evolutionary Algorithms

System of Systems Architecture Generation and Evaluation using Evolutionary Algorithms SysCon 2008 IEEE International Systems Conference Montreal, Canada, April 7 10, 2008 System of Systems Architecture Generation and Evaluation using Evolutionary Algorithms Joseph J. Simpson 1, Dr. Cihan

More information

Courses. X E - Verify that system acquisitions policies and procedures include assessment of risk management policies X X

Courses. X E - Verify that system acquisitions policies and procedures include assessment of risk management policies X X 4016 Points * = Can include a summary justification for that section. FUNCTION 1 - INFORMATION SYSTEM LIFE CYCLE ACTIVITIES Life Cycle Duties No Subsection 2. System Disposition/Reutilization *E - Discuss

More information

The Global Cybercrime Industry

The Global Cybercrime Industry Nir Kshetri The Global Cybercrime Industry Economic, Institutional and Strategic Perspectives 4y Springer 1 The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

More information

A Methodology to Build Lasting, Intelligent Cybersecurity Programs

A Methodology to Build Lasting, Intelligent Cybersecurity Programs EBOOK Risk-Centric Cybersecurity Management : A Methodology to Build Lasting, Intelligent Cybersecurity Programs A Brinqa ebook Think InfoSec is ready to keep your enterprise secure through the next transformative

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior

More information

Systems Engineering for Software Assurance

Systems Engineering for Software Assurance Systems Engineering for Software Assurance Kristen Baldwin Office of the Under Secretary of Defense Acquisition, Technology and Logistics Systems Engineering Software Assurance Scope: Software is fundamental

More information

Intelligence Preparation of the Cyber Environment. Rob Dartnall Director Cyber Intelligence

Intelligence Preparation of the Cyber Environment. Rob Dartnall Director Cyber Intelligence Intelligence Preparation of the Cyber Rob Dartnall Director Cyber Intelligence Rob is a CREST Certified Threat Intelligence Manager (CCTIM) and Cyber Intelligence Director/CEO of Security Alliance - a

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Signature Repository A Signature Repository provides a group of signatures for use by network security tools such

More information

Introduction Types of Social Network Analysis Social Networks in the Online Age Data Mining for Social Network Analysis Applications Conclusion

Introduction Types of Social Network Analysis Social Networks in the Online Age Data Mining for Social Network Analysis Applications Conclusion Introduction Types of Social Network Analysis Social Networks in the Online Age Data Mining for Social Network Analysis Applications Conclusion References Social Network Social Network Analysis Sociocentric

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment

Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment SWG G 3 2016 v0.2 ISAO Standards Organization Standards Working Group 3: Information Sharing Kent Landfield, Chair

More information

Achieving & Measuring the Value of Cyber Threat Information Sharing. Lindsley Boiney, Clem Skorupka (presenting)

Achieving & Measuring the Value of Cyber Threat Information Sharing. Lindsley Boiney, Clem Skorupka (presenting) Achieving & Measuring the Value of Cyber Threat Information Sharing Lindsley Boiney, Clem Skorupka (presenting) The MITRE Corporation 2018 International Information Sharing Conference McLean, VA 2 Acknowledgements

More information

2006 CCRTS Some thoughts on the application of military theory to Information Operations and Network Centric Warfare

2006 CCRTS Some thoughts on the application of military theory to Information Operations and Network Centric Warfare 2006 CCRTS Some thoughts on the application of military theory to Information Operations and Network Centric Warfare Information Operations/Assurance Roland Heickerö, PhD Adjunct Professor Deputy Research

More information

Cyber Threat Intelligence: Integrating the Intelligence Cycle. Elias Fox and Michael Norkus, Cyber Threat Intelligence Analysts January 2017

Cyber Threat Intelligence: Integrating the Intelligence Cycle. Elias Fox and Michael Norkus, Cyber Threat Intelligence Analysts January 2017 Cyber Threat Intelligence: Integrating the Intelligence Cycle Elias Fox and Michael Norkus, Cyber Threat Intelligence Analysts January 2017 CLASSIFICATION MARKS The Global Domain Network Domain The internet

More information

Space Cyber: An Aerospace Perspective

Space Cyber: An Aerospace Perspective Space Cyber: An Aerospace Perspective USAF Cyber Vision 2025 AFSPC 19-21 March 2012 Frank Belz and Joe Betser The Aerospace Corporation Computers and Software Division 20 March 2012 frank.belz@aero.org

More information

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported

More information

Employing Mobile Applications for Capability Enhancement

Employing Mobile Applications for Capability Enhancement Employing Mobile Applications for Capability Enhancement TS BAINS Fire is both a friend and a foe depending on how one uses it. Today, technology is becoming akin to fire. While the world is busy finding

More information

TDWI Data Modeling. Data Analysis and Design for BI and Data Warehousing Systems

TDWI Data Modeling. Data Analysis and Design for BI and Data Warehousing Systems Data Analysis and Design for BI and Data Warehousing Systems Previews of TDWI course books offer an opportunity to see the quality of our material and help you to select the courses that best fit your

More information

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches Introduction No matter how hard you work to educate your employees about the constant and evolving threats

More information

What s New in Spotfire DXP 1.1. Spotfire Product Management January 2007

What s New in Spotfire DXP 1.1. Spotfire Product Management January 2007 What s New in Spotfire DXP 1.1 Spotfire Product Management January 2007 Spotfire DXP Version 1.1 This document highlights the new capabilities planned for release in version 1.1 of Spotfire DXP. In this

More information

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions Meeting PCI DSS 3.2 Compliance with Solutions Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 2018, Inc. What s Changing with PCI DSS? Summary of PCI Business

More information

French-American Foundation Conference on cyber issues. Opening remarks. 25 October 2017

French-American Foundation Conference on cyber issues. Opening remarks. 25 October 2017 French-American Foundation Conference on cyber issues Opening remarks 25 October 2017 Général d armée aérienne Denis MERCIER 1 Ladies and gentlemen, It is a great honour and a personal pleasure for me

More information

Choosing the Right Security Assessment

Choosing the Right Security Assessment A Red Team Whitepaper Choosing the Right Security Navigating the various types of Security s and selecting an IT security service provider can be a daunting task; however, it does not have to be. Understanding

More information

An ICS Whitepaper Choosing the Right Security Assessment

An ICS Whitepaper Choosing the Right Security Assessment Security Assessment Navigating the various types of Security Assessments and selecting an IT security service provider can be a daunting task; however, it does not have to be. Understanding the available

More information

UNCLASSIFIED. R-1 Program Element (Number/Name) PE D8Z / Software Engineering Institute (SEI) Applied Research. Prior Years FY 2013 FY 2014

UNCLASSIFIED. R-1 Program Element (Number/Name) PE D8Z / Software Engineering Institute (SEI) Applied Research. Prior Years FY 2013 FY 2014 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior Years

More information

Contents The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and Countermeasures

Contents The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and Countermeasures Contents 1 The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and Countermeasures... 1 1.1 The Rapidly Rising Global Cybercrime Industry... 1 1.1.1 Cybercrime: Definitional

More information

Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018

Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018 Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018 The Homeland Security Systems Engineering and Development Institute (HSSEDI ) is a trademark of the U.S. Department of Homeland

More information

Rodale. Upper East Side

Rodale. Upper East Side Rodale Upper East Side Meet Rodale Native American, 29, PHX Level of trust in news? The best you can expect is 60% : Believes reporter s perspective, motive, and experience all drive credibility, as well

More information

YOU VE GOT 99 PROBLEMS AND A BUDGET S ONE

YOU VE GOT 99 PROBLEMS AND A BUDGET S ONE YOU VE GOT 99 PROBLEMS AND A BUDGET S ONE Rebekah Brown @PDXBek Threat Intelligence Lead at Rapid7 But before that Gunnery Sergeant United State Marine Corps Chinese Crypto linguist and Network Warfare

More information

Certified Manager Certification

Certified Manager Certification Certified Manager Certification Get Trained Get Certified Get Recognized www.hr-pulse.org In Partnership With HR Pulse has the Learning Solutions to Empower Your People & Grow Your Business About ICPM

More information

The Success of the AMRAAM DBMS/DAS

The Success of the AMRAAM DBMS/DAS The Success of the AMRAAM DBMS/DAS John Gerdine Wyle Laboratories Inc. Niceville Florida 32579 U.S.A. 1 Overview Asymmetric Threat AMRAAM Development Test and Evaluation (T&E) History Current AMRAAM Production

More information

Closing the Hybrid Cloud Security Gap with Cavirin

Closing the Hybrid Cloud Security Gap with Cavirin Enterprise Strategy Group Getting to the bigger truth. Solution Showcase Closing the Hybrid Cloud Security Gap with Cavirin Date: June 2018 Author: Doug Cahill, Senior Analyst Abstract: Most organizations

More information

Using the Semantic Web in Ubiquitous and Mobile Computing

Using the Semantic Web in Ubiquitous and Mobile Computing Using the Semantic Web in Ubiquitous and Mobile Computing Ora Lassila Research Fellow, Software & Applications Laboratory, Nokia Research Center Elected Member of Advisory Board, World Wide Web Consortium

More information

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM Modern threats demand analytics-driven security and continuous monitoring Legacy SIEMs are Stuck in the Past Finding a mechanism to collect, store

More information

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT 2018 Viasat White Paper August 27, 2018 UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT With Hybrid Adaptive Networking By Craig Miller Vice President, Chief Technical Officer

More information

Empirical Study on Impact of Developer Collaboration on Source Code

Empirical Study on Impact of Developer Collaboration on Source Code Empirical Study on Impact of Developer Collaboration on Source Code Akshay Chopra University of Waterloo Waterloo, Ontario a22chopr@uwaterloo.ca Parul Verma University of Waterloo Waterloo, Ontario p7verma@uwaterloo.ca

More information

Systems 2020 Strategic Initiative Overview

Systems 2020 Strategic Initiative Overview Systems 2020 Strategic Initiative Overview Kristen Baldwin ODDR&E/Systems Engineering 13 th Annual NDIA Systems Engineering Conference San Diego, CA October 28, 2010 Oct 2010 Page-1 DISTRIBUTION STATEMENT

More information

PPKM: Preserving Privacy in Knowledge Management

PPKM: Preserving Privacy in Knowledge Management PPKM: Preserving Privacy in Knowledge Management N. Maheswari (Corresponding Author) P.G. Department of Computer Science Kongu Arts and Science College, Erode-638-107, Tamil Nadu, India E-mail: mahii_14@yahoo.com

More information

Device Discovery for Vulnerability Assessment: Automating the Handoff

Device Discovery for Vulnerability Assessment: Automating the Handoff Device Discovery for Vulnerability Assessment: Automating the Handoff O V E R V I E W While vulnerability assessment tools are widely believed to be very mature and approaching commodity status, they are

More information

Enriching Lifelong User Modelling with the Social e- Networking and e-commerce Pieces of the Puzzle

Enriching Lifelong User Modelling with the Social e- Networking and e-commerce Pieces of the Puzzle Enriching Lifelong User Modelling with the Social e- Networking and e-commerce Pieces of the Puzzle Demetris Kyriacou Learning Societies Lab School of Electronics and Computer Science, University of Southampton

More information

Network Analysis Software

Network Analysis Software Network Analysis Software This article points the reader to main repositories of listings of network analysis software, provides strategic guidance in selecting the appropriate tool or set of different

More information

Implementing ITIL v3 Service Lifecycle

Implementing ITIL v3 Service Lifecycle Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational

More information

Applying Semantic Web in Mobile and Ubiquitous Computing: Will Policy-Awareness Help?

Applying Semantic Web in Mobile and Ubiquitous Computing: Will Policy-Awareness Help? Applying Semantic Web in Mobile and Ubiquitous Computing: Will Policy-Awareness Help? Ora Lassila Research Fellow Nokia Research Center Burlington, MA, USA Cambridge November 2005 1 NOKIA lassila-isvc2005-slides.ppt

More information

Assured Compliance through Information Security Continuous Monitoring

Assured Compliance through Information Security Continuous Monitoring Assured Compliance through Information Security Continuous Monitoring Trey Breckenridge Director, High Performance Computing Mississippi State University 24 July 2018 Summary Information Security Continuous

More information

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS SOFTWARE ENGINEERING

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS SOFTWARE ENGINEERING DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS 6403 - SOFTWARE ENGINEERING QUESTION BANK TWO MARKS UNIT I SOFTWARE PROCESS AND PROJECT MANAGEMENT 1. What is software engineering? Software engineering

More information

Threat Hunting in Modern Networks. David Biser

Threat Hunting in Modern Networks. David Biser Threat Hunting in Modern Networks David Biser What is Threat Hunting? The act of aggressively pursuing and eliminating cyber adversaries as early as possible in the Cyber Kill Chain. Why Perform Threat

More information

Homeland Security Institute. Annual Report. pursuant to. Homeland Security Act of 2002

Homeland Security Institute. Annual Report. pursuant to. Homeland Security Act of 2002 Homeland Security Institute Annual Report pursuant to Homeland Security Act of 2002 July 1, 2005 Homeland Security Institute ANNUAL REPORT Introduction Established in April 2004, the Homeland Security

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #18

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #18 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: Applied Research COST ($ in Millions)

More information

CYBER THREAT INTELLIGENCE TOWARDS A MATURE CTI PRACTICE

CYBER THREAT INTELLIGENCE TOWARDS A MATURE CTI PRACTICE CYBER THREAT INTELLIGENCE TOWARDS A MATURE CTI PRACTICE Richard Kerkdijk December 7th 2017 A WORD ABOUT TNO Dutch innovation and advisory body, founded by law in 1932 and currently comprising some 2800

More information

CE4031 and CZ4031 Database System Principles

CE4031 and CZ4031 Database System Principles CE431 and CZ431 Database System Principles Course CE/CZ431 Course Database System Principles CE/CZ21 Algorithms; CZ27 Introduction to Databases CZ433 Advanced Data Management (not offered currently) Lectures

More information

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED Position Description Computer Network Defence (CND) Analyst Position purpose: Directorate overview: The CND Analyst seeks to discover, analyse and report on sophisticated computer network exploitation

More information

Cybersecurity in Acquisition

Cybersecurity in Acquisition Kristen J. Baldwin Acting Deputy Assistant Secretary of Defense for Systems Engineering (DASD(SE)) Federal Cybersecurity Summit September 15, 2016 Sep 15, 2016 Page-1 Acquisition program activities must

More information

Database Systems: Design, Implementation, and Management Tenth Edition. Chapter 9 Database Design

Database Systems: Design, Implementation, and Management Tenth Edition. Chapter 9 Database Design Database Systems: Design, Implementation, and Management Tenth Edition Chapter 9 Database Design Objectives In this chapter, you will learn: That successful database design must reflect the information

More information

VETRI VINAYAHA COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

VETRI VINAYAHA COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING VETRI VINAYAHA COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS6403 SOFTWARE ENGINEERING II year/ IV sem CSE (Regulation 2013) UNIT 1- SOFTWARE PROCESS AND PROJECT

More information

THE KNOWLEDGE MANAGEMENT STRATEGY IN ORGANIZATIONS. Summer semester, 2016/2017

THE KNOWLEDGE MANAGEMENT STRATEGY IN ORGANIZATIONS. Summer semester, 2016/2017 THE KNOWLEDGE MANAGEMENT STRATEGY IN ORGANIZATIONS Summer semester, 2016/2017 SOCIAL NETWORK ANALYSIS: THEORY AND APPLICATIONS 1. A FEW THINGS ABOUT NETWORKS NETWORKS IN THE REAL WORLD There are four categories

More information

Alignment of Business and IT - ArchiMate. Dr. Barbara Re

Alignment of Business and IT - ArchiMate. Dr. Barbara Re Alignment of Business and IT - ArchiMate Dr. Barbara Re What is ArchiMate? ArchiMate is a modelling technique ("language") for describing enterprise architectures. It presents a clear set of concepts within

More information

Chapter : Analysis Modeling

Chapter : Analysis Modeling Chapter : Analysis Modeling Requirements Analysis Requirements analysis Specifies software s operational characteristics Indicates software's interface with other system elements Establishes constraints

More information

IHS Connect FORESIGHT SECURITY PLANNING 2015 IHS. ALL RIGHTS RESERVED.

IHS Connect FORESIGHT SECURITY PLANNING 2015 IHS. ALL RIGHTS RESERVED. IHS Connect FORESIGHT SECURITY PLANNING IHS Connect is an online market and business intelligence platform enabling faster, smarter, and more efficient access to world renowned information and insight

More information

Diseño y Evaluación de Arquitecturas de Software. Architecture Based Design Method

Diseño y Evaluación de Arquitecturas de Software. Architecture Based Design Method Diseño y Evaluación de Arquitecturas de Software Architecture Based Design Method César Julio Bustacara Medina Facultad de Ingeniería Pontificia Universidad Javeriana 08/10/2015 1 Architecture Based Design

More information

Applying ISO/IEC Quality Model to Quality Requirements Engineering on Critical Software

Applying ISO/IEC Quality Model to Quality Requirements Engineering on Critical Software Applying ISO/IEC 9126-1 Quality Model to Quality Engineering on Critical Motoei AZUMA Department of Industrial and Management Systems Engineering School of Science and Engineering Waseda University azuma@azuma.mgmt.waseda.ac.jp

More information

Hybrid Cyber Warfare, dual risks?

Hybrid Cyber Warfare, dual risks? Hybrid Cyber Warfare, dual risks? Cologne - 26/04/2017 ing. Giuseppe G. Zorzino ERMCP, CISA, CISM, CGEIT, CRISC, LA ISO27001 Bio Giuseppe Giovanni Zorzino Teacher and consultant of information security,

More information

Guidelines for the application of Data Envelopment Analysis to assess evolving software

Guidelines for the application of Data Envelopment Analysis to assess evolving software Short Paper Guidelines for the application of Data Envelopment Analysis to assess evolving software Alexander Chatzigeorgiou Department of Applied Informatics, University of Macedonia 546 Thessaloniki,

More information

ACL Interpretive Visual Remediation

ACL Interpretive Visual Remediation January 2016 ACL Interpretive Visual Remediation Innovation in Internal Control Management SOLUTIONPERSPECTIVE Governance, Risk Management & Compliance Insight 2015 GRC 20/20 Research, LLC. All Rights

More information

Study of Data Mining Algorithm in Social Network Analysis

Study of Data Mining Algorithm in Social Network Analysis 3rd International Conference on Mechatronics, Robotics and Automation (ICMRA 2015) Study of Data Mining Algorithm in Social Network Analysis Chang Zhang 1,a, Yanfeng Jin 1,b, Wei Jin 1,c, Yu Liu 1,d 1

More information

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Mission Aware Cybersecurity

Mission Aware Cybersecurity Mission Aware Cybersecurity Cody Fleming (UVA) Scott Lucero (OSD) Peter Beling, Barry Horowitz (UVA), Calk Elks (VCU) October 2016 1 Systems Engineering Research Center (SERC) Overview DoD and the Intelligence

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:

More information

Operationalizing Cyber Security Risk Assessments for the Dams Sector

Operationalizing Cyber Security Risk Assessments for the Dams Sector Operationalizing Cyber Security Risk Assessments for the Dams Sector Kevin Burns, Jason Dechant, Darrell Morgeson, and Reginald Meeson, Jr. The Problem To evaluate vulnerability to the postulated threat,

More information

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable

More information

Trustwave Managed Security Testing

Trustwave Managed Security Testing Trustwave Managed Security Testing SOLUTION OVERVIEW Trustwave Managed Security Testing (MST) gives you visibility and insight into vulnerabilities and security weaknesses that need to be addressed to

More information

ENGINEERING AND TECHNOLOGY MANAGEMENT

ENGINEERING AND TECHNOLOGY MANAGEMENT Engineering and Technology Management 1 ENGINEERING AND TECHNOLOGY MANAGEMENT Master of Science in Engineering Technology Management Tim Hardin, PhD Director Brenda L. Johnson, MS Assistant Director OSU

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2012 Office of Secretary Of Defense DATE: February 2011 BA 3: Advanced Development (ATD) COST ($ in Millions) FY 2010 FY 2011 Base OCO Total FY 2013 FY

More information

Forecasting Technology Insertion Concurrent with Design Refresh Planning for COTS-Based Electronic Systems

Forecasting Technology Insertion Concurrent with Design Refresh Planning for COTS-Based Electronic Systems Forecasting Technology Insertion Concurrent with Design Refresh Planning for COTS-Based Electronic Systems Peter Sandborn and Pameet Singh CALCE, Dept. of Mechanical Engineering, University of Maryland

More information

CSD Project Overview DHS SCIENCE AND TECHNOLOGY. Dr. Ann Cox. March 13, 2018

CSD Project Overview DHS SCIENCE AND TECHNOLOGY. Dr. Ann Cox. March 13, 2018 DHS SCIENCE AND TECHNOLOGY CSD Project Overview March 13, 2018 Dr. Ann Cox Program Manager Cyber Security Division Science and Technology Directorate CSD Mission & Strategy REQUIREMENTS CSD MISSION Develop

More information

Considerations for a NATO Space Policy PERSPECTIVES. Considerations for a NATO Space Policy

Considerations for a NATO Space Policy PERSPECTIVES. Considerations for a NATO Space Policy E S P I 12 PERSPECTIVES Considerations for a NATO Space Policy Thomas SINGLE, Major (USAF), Subject Matter Expert on Space Operations at the NATO Joint Air Power Competence Centre The Joint Air Power Competence

More information

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY DIGITAL STEGANOGRAPHY 2 Abstract Steganography derives from a Greek word and means covered writing. It is a sector of computer information security. Cryptography

More information

Overview of Web Mining Techniques and its Application towards Web

Overview of Web Mining Techniques and its Application towards Web Overview of Web Mining Techniques and its Application towards Web *Prof.Pooja Mehta Abstract The World Wide Web (WWW) acts as an interactive and popular way to transfer information. Due to the enormous

More information

Micro Simulations in ORA. Agenda

Micro Simulations in ORA. Agenda Micro Simulations in ORA Kenny Joseph Wei Wei The CASOS Center COS Program, School of Computer Science, Carnegie Mellon Summer Institute 2013 Center for Computational Analysis of Social and Organizational

More information

The Importance of Data Profiling

The Importance of Data Profiling The Importance of Data Profiling By Bud Walker and Joseph Vertido A Melissa Data Whitepaper Introduction Data profiling is a commonly used term in the discipline of data management, yet the perception

More information

Sustainable Security Operations

Sustainable Security Operations Sustainable Security Operations Optimize processes and tools to make the most of your team s time and talent The number and types of security incidents organizations face daily are steadily increasing,

More information

Managing Complex SAS Metadata Security Using Nested Groups to Organize Logical Roles

Managing Complex SAS Metadata Security Using Nested Groups to Organize Logical Roles Paper 1789-2018 Managing Complex SAS Metadata Security Using Nested Groups to Organize Logical Roles ABSTRACT Stephen Overton, Overton Technologies SAS Metadata security can be complicated to setup and

More information

Context Based Shared Understanding for Situation Awareness

Context Based Shared Understanding for Situation Awareness Distribution Statement A: Approved for public release; distribution is unlimited. Context Based Shared Understanding for Situation Awareness June 9, 2004 David G. Cooper Lockheed Martin Advanced Technology

More information

Beyond Technical Interoperability

Beyond Technical Interoperability Beyond Technical Interoperability Net Centric Operations Context for the Interoperability & Net Centric Operations Track @ 2017 NDIA SE Conference October 2017 Jack Zavin Chair I/NCO Track jack.e.zavin.civ@mail.mil

More information

A Critical Systems Thinking Perspective on Data Warehouse Stakeholders

A Critical Systems Thinking Perspective on Data Warehouse Stakeholders A Critical Systems Thinking Perspective on Data Warehouse Stakeholders Roelien Goede School of Information Technology, North-West University Vanderbijlpark, 1900, South Africa ABSTRACT Strategic decision

More information