of four technical functions Asset Identification, Infrastructure Model and Control, Threat.pdf
- 1、本文档共10页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
of four technical functions Asset Identification, Infrastructure Model and Control, Threat
Network Mission Assurance
Michael F. Junod, Patrick A. Muckelbauer, PhD, Todd C. Hughes, PhD, Julius M. Etzl, and James E. Denny
Lockheed Martin Advanced Technology Laboratories
Camden, NJ 08102
{mjunod,pmuckelb,thughes,jetzl,jdenny}@
Abstract
The doctrine of Network Mission
Assurance (NMA) evaluates the value of
information assurance and the risk of
computer threats based upon their impact on
the organizational functions supported by the
network. The NMA framework is comprised
of four technical functions: Asset
Identification, Infrastructure Model and
Control, Threat Analysis and Prediction, and
Response Coordination. Our research in
support of the NMA investigates technical
solutions for trust-based resource control,
reflective and reconfigurable network
services, autonomic network defense, and
cyber-attack representation. We contend that
NMA unifies the purpose and function of
separate information assurance programs into
a holistic, network-centric solution.
1. Introduction
This document describes the Network
Mission Assurance (NMA) doctrine of
Lockheed Martin Advanced Technology
Laboratories (ATL). This doctrine is used as a
guide to focus our information assurance
efforts in different research areas and ensure
these efforts can work together in a dynamic
distributed network environment and
effectively leverage and incorporate point
security solutions into a robust information
assurance architecture.
It is our belief that one cannot simply
back-fit existing security point solutions onto
existing architectures and expect to have an
improved security infrastructure. In fact, this
can result in a less secure architecture that
requires a great deal of manual effort in
maintenance and monitoring.
2Point security products (e.g., vulnerability
scanners, intrusion detection systems,
firewalls) often operate in isolation. In
contrast, according to NMA, security
solutions should not only be integrated with,
but orchestrated among, the components of a
network infrastruct
您可能关注的文档
- Meal&Restaurants.ppt
- Meal_Plan_Brochure_2010-2011.pdf
- Measure mucertainty.pdf
- Measurement of Charm and Beauty Photoproduction at HERA using D μ Correlations.pdf
- Measurement of Branching Fractions and Charge Asymmetries for Exclusive B Decays to Charmon.pdf
- Measurement of charm fragmentation ratios and fractions in photoproduction at HERA.pdf
- Measurement of D+- production and the charm contribution to F_2 in deep inelastic scatterin.pdf
- Measuring V_ub in Inclusive B Decays to Charm.pdf
- meat science.pdf
- Meat protein.pdf
文档评论(0)