University of Southampton Research Repository
ePrints Soton
Copyright © and Moral Rights for this thesis are retained by the author and/or other
copyright owners. A copy can be downloaded for personal non-commercial
research or study, without prior permission or charge. This thesis cannot be
reproduced or quoted extensively from without first obtaining permission in writing
from the copyright holder/s. The content must not be changed in any way or sold
commercially in any format or medium without the formal permission of the
copyright holders.
When referring to this work, full bibliographic details including the author, title,
awarding institution and date of the thesis must be given e.g.
AUTHOR (year of submission) "Full thesis title", University of Southampton, name
of the University School or Department, PhD Thesis, pagination
http://eprints.soton.ac.uk
Bridging the Air Gap: An Information Assurance Perspective
Bridging the Air Gap: An
Information Assurance
Perspective
Christopher John Richardson
BEng CEng MIfL QTS
Ministry of Defence
Defence College of CIS
Blandford Forum
27 August 2012
Engineering Doctorate
Bridging the Air Gap is a Ministry of Defence (MoD)
sponsored research into the assurance of Cross Domain
Solutions(CDS); to discover and examine the possible impact
and exposure implications of establishing, operating and
managing highly classified systems that are operationally
required to multilaterally, multilevel interface with lower
classified domains, coalition networks and possibly the
Internet. Information Assurance (IA) is the key to trusting,
maintaining and developing Defence Cyber Operations and
Information Exploitation capabilities. MoD’s Network
Enabled Capability (NEC) has intrinsic and often complex
interdependencies, information interactions and knowledge
transactions which can be chaotic, unsafe, insecure and
untrusted. To comprehend, structure, make safe, secure and
risk manage the NEC’s enterprise architecture, its integrity
and dependability requires educated IA practitioners and an
assured, cultured aware user community.
Page
Bridging the Air Gap: An Information Assurance Perspective
Copyright
Crown Copyright 2012
Published by the Defence College of Communications and Information Systems
No part of this publication may be reproduced, stored in a retrieval system or transmitted by
any means (this includes photocopying, electronic, mechanical or otherwise) without the
permission of the copyright owner.
Disclaimer
This report has been written by Christopher John Richardson, MoD sponsored Research
Engineer on the EPSRC Engineering Doctorate Degree Course, University of Southampton,
2007– 2012. This particular paper is a redacted version of the original UK Restricted Thesis.
The views expressed in this thesis, together with any recommendations, are those of the author
and not necessarily those of the Defence College of Communication and Information Systems or
any of its staff. This report therefore has no official standing as a Ministry of Defence document
and must not be quoted as such. Further, such views should not be considered as constituting an
official endorsement of factual accuracy, opinion, conclusion or recommendation of the UK
Ministry of Defence or any other department of Her Britannic Majesty’s Government of the
United Kingdom.
Engineering Doctorate
Page i
Bridging the Air Gap: An Information Assurance Perspective
Degree of Doctor of Philosophy in Engineering
Title:
Bridging the Air Gap: An Information Assurance Perspective
Christopher John Richardson
Research Student:
Email:
[email protected]
Research
Group/School:
Electronics and Computer Science
Sponsor:
Ministry of Defence
Industrial Mentors:
Mr Adrian Price and Mr Nigel Rich
Academic
Supervisor:
Dr. Peter R. Wilson
Engineering Doctorate
Page ii
Bridging the Air Gap: An Information Assurance Perspective
Research Engineer
Christopher John Richardson
Research Engineer
School of Electronics and Computer Science
University of Southampton
Southampton
SO17 1BJ
Telephone: 01202 966670
Email:
[email protected]
Industrial Sponsor
Adrian Price
Head of Information Security Policy
Directorate of Defence Security
Ministry of Defence
Whitehall
London SW1A 2HB
Telephone: 020 7218 3746
Email:
[email protected]
Industrial Supervisor
Nigel Rich
Head of Department
ICT Faculty, Old School Building
Defence College of Communications and Information
Systems
Blandford Forum
Dorset DT11 8RH
Telephone: 01258 482272
Email:
[email protected]
Academic Supervisor
Dr Peter R. Wilson
School of Electronics and Computer Science
University of Southampton
Southampton SO17 1BJ
Telephone: 023 8059 4162
Email:
[email protected]
Engineering Doctorate
Page iii
Bridging the Air Gap: An Information Assurance Perspective
Thesis Abstract
Name of university
UNIVERSITY OF SOUTHAMPTON
Abstract
ABSTRACT
Name of Faculty
DEPT OF ELECTRONICS & COMPUTER
SCIENCE
Discipline
INFORMATION ASSURANCE & SECURITY
Degree for which thesis is submitted
DOCTOR OF PHILOSOPHY IN
ENGINEERING (EngD)
Title of thesis
BRIDGING THE GAP: AN INFORMATION
ASSURANCE PERSPECTIVE
Full name of author
by CHRISTOPHER JOHN RICHARDSON
The military has 5 domains of operations: Land, Sea, Air, Space and now Cyber. This 5th
Domain is a heterogeneous network (of networks) of Communication and Information
Systems (CIS) which were designed and accredited to meet Netcentric capability
requirements; to be robust, secure and functional to the organisation’s needs. Those
needs have changed.
In the globalised economy and across the Battlespace,
organisations now need to share information. Keeping our secrets, secret has been the
watchwords of Information Security and the accreditation process; whilst sharing them
securely across coalition, geo-physically dispersed networks has become the cyber
security dilemma.
The diversity of Advanced Persistent Threats, the contagion of Cyber Power and
insecurity of coalition Interoperability has generated a plethora of vulnerabilities to the
Cyber Domain. Necessity (fiscal and time-constraints) has created security gaps in
deployed CIS architectures through their interconnections. This federated environment
for superior decision making and shared situational awareness requires that Bridging
the (new capability) Gaps needs to be more than just improving security
(Confidentiality, Integrity and Availability) mechanisms to the technical system
interfaces. The solution needs a new approach to creating and understanding a trusted,
Engineering Doctorate
Page iv
Bridging the Air Gap: An Information Assurance Perspective
social-technical CIS environment and how these (sensitive) information assets should
be managed, stored and transmitted.
Information Assurance (IA) offers a cohesive architecture for coalition system (of
systems) interoperability; the identification of strategies, skills and business processes
required for effective information operations, management and exploitation.
IA
provides trusted, risk managed social-technical (Enterprise) infrastructures which are
safe, resilient, dependable and secure. This thesis redefines IA architecture and creates
models that recognise the integrated, complex issues within technical to organisational
interoperability and the assurance that the right information is delivered to the right
people at the right time in a trustworthy environment and identifies the need for IA
practitioners and a necessary IA education for all Cyber Warriors.
Engineering Doctorate
Page v
Bridging the Air Gap: An Information Assurance Perspective
Academic Thesis: Declaration of Authorship
I, Christopher John Richardson, declare that this thesis and the work
presented in it are my own and has been generated by me as the result of my
own original research.
Bridging the Air Gap:
An Information Assurance Perspective
I confirm that:
1. This work was done wholly or mainly while in candidature for a research
degree at this University;
2. Where any part of this thesis has previously been submitted for a degree or
any other qualification at this University or any other institution, this has
been clearly stated;
3. Where I have consulted the published work of others, this is always clearly
attributed;
4. Where I have quoted from the work of others, the source is always given.
With the exception of such quotations, this thesis is entirely my own work;
5. I have acknowledged all main sources of help;
6. Where the thesis is based on work done by myself jointly with others, I have
made clear exactly what was done by others and what I have contributed
myself;
7. Either none of this work has been published before submission, or parts of
this work have been published as:
Engineering Doctorate
Page vi
Bridging the Air Gap: An Information Assurance Perspective
Richardson, C. J. (2007). Security: a necessary compromise? NATO
Conference, Bletchley Park, 26 June 2007. Telindus.
Richardson, C. J. (2008). Bridging an IA Capability Gap. Realising Network
Enabled Capability (RNEC’08), NECTICE, Leeds, UK, 13 October 2008. NECTISE
Loughbourgh University.
Richardson, C. J. (2009). A Holistic Approach to Effective Information
Assurance Education. Military Information Assurance and Security
Symposium, MoD Abbey Wood, 16 April 2009. Cobham Technical Services.
Richardson, C. J. (2011). Cyberspace: The 5th Domain. Cyber Security 2011,
Brussels, Beliguim, 31 May- 1 June 2011. IQPC.
Richardson, C. J. (2011). Information Assurance: Holistic and Human Centric.
iGRC TD2 Presentation, Birkbeck, University of London Symposium, 15
December 2011. Bournemouth University
Richardson, C. J. (2012, June 5). The Assurance of Socio-Technical Enterprise
Operations. MSc Information Assurance Module 2. London, UK.
Signed:
…………………………………………………………………………………………………………..
Date: 4th July 2012
Engineering Doctorate
Page vii
Bridging the Air Gap: An Information Assurance Perspective
Acknowledgement
In loving memory of Shirley Richardson (May 1937- June 2010), my mother who
saw me through my life, but didn’t manage to see this Thesis completed.
This is my opportunity to say Thank You...
My inspiration has always been the challenge of the unknown, finding the limits of my
understanding and then pushing the barrier outwards. For that I thank Adrian Price
and Dr Stuart Wray for opening the door to Information Security and its Assurance.
Both had a totally different but authoritative perspective to this vast, complex domain
of knowledge and understanding. I also must thank my colleagues at the Ministry of
Defence (MoD) Defence College of Communications and Information Systems (DCCIS)
who have supported my work, analysis and evaluations, my line manager and Director,
Nigel Rich.
Thanks to my fellow researchers and friends Paul McCreeth and Dr Michael Jones who
have shared the pleasures of discovery and hardships of necessary selfishness in the
starting and completion of research degrees. A special appreciation to my friend and
fellow lecturer Alexander Wilson as his considerable insight to Traffic Engineering and
Network Simulation has given balance and some reality to the research. He’s an
enthusiastic engineer and an innovative artist that has made the impossible, possible.
Furthermore, I thank the support and encouragement from the research scientist at the
Defence Science and Technology Agency (DSTL); the project engineers at the Defence
Equipment and Support (DE&S); the Directorate of Security and Safety, MoD’s Chief
Engineering Doctorate
Page viii
Bridging the Air Gap: An Information Assurance Perspective
Information Office and The Defence Working Groups that have entertain and listen to
my opinions and observations which provoked insights to the complexities of this
research; and the National School of Government, in particular the listening and advice
from Sharon Wiltshire.
A special thank you to Dr Peter Wilson, my long suffering Academic Supervisor at the
University of Southampton whose encouragement and leadership was always been
implicit and timely; a wise man who knew the time when to inject and when to leave
alone; to Dr Neil Richardson, FESM Assistant Dean and Head of Industry Doctoral
Training Centre (IDTC) and his hard working assistant Sally Hawthorne who kept me
informed on everything and the staff of the School of Electronics and Computer Science
(ECS) at Southampton University, where many have contributed time and giving a
helping hand to my work. To the Southampton University’s School of Management who
broaden my strategic vision and most of the taught elements of the Engineering
Doctorate and to the Engineering and Physical Sciences Research Council (EPSRC) and
the Ministry of Defence who financially sponsored my thesis and research engineering
activities.
My personal thanks go to my family and friends. To my three wonderful children,
Helen, Fiona and Alexander whose support and kindness I have needed on many a
tiring weekend. To my life-long friend Regina Elliott who open my mind to other
alternative interpretations of real and virtual space. Over the past years I have lost
many precious moments as thoughts, energies and time were devoted to the pursuit
and rigours of this doctorate’s academic goal and research. It has been a discovery and
an awaking to the constant determinant that Bridging the Air Gap has no foreseeable
final resolution and pursuing the goals formulates further, more intricate, problems,
however at some point a stake needed to be driven home and a Thesis written.
Engineering Doctorate
Page ix
Bridging the Air Gap: An Information Assurance Perspective
Contents
Copyright ........................................................................................................................................ i
Disclaimer....................................................................................................................................... i
Thesis Abstract ............................................................................................................................. iv
Academic Thesis: Declaration of Authorship .............................................................................. vi
Acknowledgement ..................................................................................................................... viii
Table of Figures ........................................................................................................................... xii
Thesis Tables .............................................................................................................................. xiv
Abbreviations ........................................................................................................................... xvv
CHAPTER 1
Bridging the Gap: An Information Perspective ............................................................................. 1
1.1
A New World .................................................................................................................... 5
Coalition Collaboration .................................................................................................... 7
1.2 The Research Approach ........................................................................................................15
Purpose…………………………………………………………………………………………………………………… 15
The Culture .....................................................................................................................18
The Threat ......................................................................................................................24
Environment...................................................................................................................32
Capability........................................................................................................................41
Convergence ..................................................................................................................45
CHAPTER 2
The Assured Position of Information ..........................................................................................48
2.1
The Cyber Landscape: Understanding the Need to Share .............................................51
The FUD Contagion ........................................................................................................63
2.2
Shared Situational Awareness........................................................................................67
2.3
Assurance: From Machine to Organisation ...................................................................69
Assuring Layers of Interoperability ................................................................................70
2.4
Positioning Information Assurance at the Heart of Cyber Operations ..........................88
The Cyber Defence Jigsaw ..............................................................................................95
The Strategic IA Model .................................................................................................101
Human Factors of Assurance .......................................................................................104
Engineering Doctorate
Page x
Bridging the Air Gap: An Information Assurance Perspective
CHAPTER 3
Modelling the Assurance Component ...................................................................................... 110
3.1
Assured Knowledge Transfer ....................................................................................... 113
Organisation’s Inherent Inabilities .............................................................................. 117
The 3-Layers of Understanding ................................................................................... 120
Information Vision ....................................................................................................... 123
3.2
The I-Stack Model ........................................................................................................ 131
The Socio-Technical Centre of Gravity ........................................................................ 133
The Policies and Practice Framework .......................................................................... 138
3.4 Creating a Reference Model for IA ..................................................................................... 152
CHAPTER 4
Bridging Gaps in Education and the Profession ....................................................................... 154
4.1 Bridging the Professional Gaps........................................................................................... 158
4.2
Federated Education ................................................................................................... 175
The Right Skills ............................................................................................................. 175
4.3 Building an Information Assurance Competency Framework............................................ 190
CHAPTER 5
Thesis Conclusion – Managing the Holistic Paradigms ............................................................ 195
5.1 Business Solutions to the Bridging the Gap ....................................................................... 200
Strategic Reprise .......................................................................................................... 203
Reprise of the Cross Domain ....................................................................................... 206
5.2 Assuring the Human-Cyber Interexchange ........................................................................ 207
Reprise of the IA Models ............................................................................................. 208
5.3 The Future Direction and Studies of IA .............................................................................. 212
Reprise Contributions .................................................................................................. 213
5.4 IA Bridges ............................................................................................................................ 215
Future Work ................................................................................................................ 216
Summary ..................................................................................................................... 217
References ................................................................................................................................ xviii
Engineering Doctorate
Page xi
Bridging the Air Gap: An Information Assurance Perspective
Table of Figures
Figure 1: Netcentric Operations and Military Mobility (Benedict, 2011) ................................3
Figure 2: The LISI Interoperability Maturity Model (2004) ....................................................... 10
Figure 3: The Military Information Lattice (Richardson C. J., 2011) ....................................... 12
Figure 4: Discovering the Cause and Effects of Bridging the Gaps .......................................... 16
Figure 5: Network Centric Operations Layers of Interoperability (Källqvist, 2008) ....... 19
Figure 6: Network Centric Warfare Metric Framework (Tolk, 2003) .................................... 20
Figure 7: Strategic Asset of Assurance to the Enterprise (Borland, 2008)........................... 30
Figure 8: Human Centricity of Information Assurance................................................................. 31
Figure 9: Network and Information Enabled Situational Awareness ..................................... 42
Figure 10: GIG Incremental phased approach for the IA Component ................................... 44
Figure 11: The layers of Cyberspace (US PAM 525-7-8, 2010) ................................................. 50
Figure 12: DARPA’s National Cyber Range (Shatchman, 2010)................................................ 51
Figure 13: Sailing the Cyber Sea (Stavridis & Parker, 2012) ...................................................... 52
Figure 14: Assurance of Information Operations (Richardson C. J., 2008b)........................ 54
Figure 15: Elements of the Information Domain (Richardson C. J., 2009b)......................... 55
Figure 16: Gaining Information Superiority in the Information Environment................... 58
Figure 17: Stacking and interconnecting the KID-CIP loops in a Coalition Network ....... 59
Figure 18: Unmanned Aircraft Systems Control Segment Architecture (DoD, 2010) ..... 60
Figure 19: Persistent Threats and Emerging Missions (Richardson, C.J., 2010) ................ 65
Figure 20 Real and Virtual Communities to Maslow’s Hierarchy ............................................ 68
Figure 21: Composite Model of Interoperability (Richardson, C.J., 2010)............................ 74
Figure 22: A timeline of Computing and Cyber Insecurity (Richardson C. J., 2011)......... 77
Figure 23: The Plethora of Attack Vectors to Cyberspace (Richardson C. J., 2008b) ....... 82
Figure 24: OECD framework relating individual competencies (OECD, 2005) .................. 85
Figure 25: Fundamental principles by overlapping domains .................................................. 86
Figure 26: Strategic Positioning of Information Assurance in the Business Process....... 88
Figure 27 Strategic Goal of Information Assurance (Richardson C. J., 2008b) ................... 90
Figure 28: The Social Informatics Venn .............................................................................................. 91
Figure 29: The Ogdoadic Concept Map of the Computational Paradigm .............................. 92
Figure 30: A Framework of Social Information Systems (Ohta & Yamamoto, 1995) ...... 93
Figure 31: The Alignment of the Information Assurance across the CIS Domain ............. 96
Figure 32: The HCI of Assurance and Potential Threats ........................................................... 100
Figure 33: Cyber Trust and Crime Prevention-Web of Components ................................... 106
Figure 34: The Composite Strategic Information Assurance Model .................................... 108
Engineering Doctorate
Page xii
Bridging the Air Gap: An Information Assurance Perspective
Figure 35: Information Pyramid Reference Model to Socio-Technical Enterprises ...... 112
Figure 36: The Common Approach to the US Federal Enterprise Architecture............... 114
Figure 37: The Enabling Architecture of the Socio-Technical Enterprise ........................ 115
Figure 38: System Security Failings: Insecurity in the Enterprise and its operations .. 117
Figure 39: The Assured Space – Structured, Dependable, Secure and Trusted ............... 118
Figure 40: Mapping the Defensive Components of a Socio-Technical Enterprise ....... 119
Figure 41: The Contextual Continuum of Real and Virtual Space ......................................... 120
Figure 42: Enterprise Architecture Business Drivers ................................................................. 123
Figure 43: Information Value Chain for government, (Gresham & Andrulis, 2002) ...... 127
Figure 44: Superior Decision Making Information Framework ............................................. 129
Figure 45: The Governance of a Socio-Technical Enterprise ................................................... 130
Figure 46: Components of Enterprise Information Architecture (EIA) .............................. 132
Figure 47: The Information Stack and the Joint Functional Concept ................................... 133
Figure 48: The Influence of Assurance to the MoD S's Information Strategy ................... 134
Figure 49: The Strategic Information Asset Seven Ring Concept Model............................. 136
Figure 50: EBO Steps to creating the Centre of Gravity, (Vego, 2006)................................. 137
Figure 51: IA Policies and Practices ................................................................................................... 139
Figure 52: The Information Assurance Diamond Model ........................................................... 141
Figure 53: Building the IA Contextual Model Quadrants ........................................................... 142
Figure 54: An IA Perspective to the Human-Cyber Interexchange........................................ 144
Figure 55: The IA Model Quadrant ..................................................................................................... 144
Figure 56: The Cyclic Nature of the IA Model Quadrant ............................................................ 145
Figure 57: Assured Information Dependability of the Socio-Technical Enterprise ....... 147
Figure 58: Security Attributes to the IA Model .............................................................................. 148
Figure 59: The Sphere of Protection to the Socio-Technical Enterprise ............................. 149
Figure 60: Trust is the new ROI for the Socio-Technical Enterprise .................................... 151
Figure 61: Matching the Quadrant model to the Layers of Cyberspace .............................. 152
Figure 62: The Information Assurance Cuboid Model................................................................ 153
Figure 63: Force Field Diagram for the Assured Information Operations ......................... 156
Figure 64: The SWOT of Human Blissfulness in Cyber Communities .................................. 159
Figure 65: IBM view on UK’s information asset threats ............................................................ 166
Figure 66: The Constituents of a Society .......................................................................................... 169
Figure 67: The Strategic Positioning of Security ........................................................................... 170
Figure 68: JSP 822: The Defence System Approach to Training (2012) ............................. 173
Figure 69: Information Security Management............................................................................... 177
Figure 70: Encapsulating the Assurance of Information ........................................................... 178
Engineering Doctorate
Page xiii
Bridging the Air Gap: An Information Assurance Perspective
Figure 71: Education facilitating Understanding ......................................................................... 179
Figure 72: The Continuum of Understanding (Shedroff, 1999) ............................................. 180
Figure 73: The Proposed Modular CPD Roadmap ....................................................................... 184
Figure 74: Proposed Federated Master of Science (MSc) in Information Assurance ... 185
Figure 75: An Alternative Schedule for a Federated MSc in Information Assurance .... 186
Figure 76: A detailed sematic of the first proposed IA MSc Semester................................. 188
Figure 77 A detailed sematic of the second proposed IA MSc Semester ............................ 189
Figure 78: UK Government IA Framework ..................................................................................... 192
Figure 79: Ignorance of Network Behaviour, Management, Operations and Security . 194
Figure 80: The cost of doing business in military cyberspace ................................................ 197
Figure 81: The Socio-Technical System of Man and Machine ................................................. 201
Figure 82: Current MoD System Access Schema .......................................................................... 206
Thesis Tables
Table 1: Security issues and non-compliance......................................................................... 27
Table 2: IO Computer Network Management ......................................................................... 57
Table 3: Stability Operations – Joint Operating Concept Capability (DoD, 2006) .... 69
Table 4: IA Resiliency Maturity Model ................................................................................... 102
Table 5: Abridged CESG Information Assurance Maturity Model ............................... 103
Table 6: The Extended Enterprise Information Assurance Maturity Model ........... 109
Table 7: Business Drivers and Benefits of Enterprise Architecture .......................... 122
Table 8: Attributes of Information Quality (Wang R. Y., 2005a) .................................. 128
Table 9: IA Resilience Attributes .............................................................................................. 146
Table 10: ISPD Levels of Competencies ................................................................................. 182
Table 11: Competcy Levels of an IA Practitioner ............................................................... 193
Table 12: Compliance of the Research Primary Aims ...................................................... 199
Table 13: IA Methods to Build Bridges ................................................................................... 215
Table 14: Possible Future Work to this Thesis ................................................................... 216
Engineering Doctorate
Page xiv
Bridging the Air Gap: An Information Assurance Perspective
ABBREVIATIONS
C2
C4II
CBM
CDS
CIIA
CII
CIP
CIPE-V2R
CIS
CNA
CND
CNE
CNM
CNO
COI
CoNSIS
COP
COTS
CPNI
CSA
DAD
DAIA
DBSy
DCCIS
DCF
DCPD
DEC
DEC(CCII)
DIAN
DII
DLOD
DMZ
DoD
DSA
DSTL
EBAO
EEFI
ES
ESII
GIG
GII
GOSCC
HUMINT
Command and Control
Command, Control, Communications, Computing, Intelligence and
Information
Command and Battle Management
Cross-Domain Solution
Cyber, Identity and Information Assurance
Critical Information Infrastructure
Cognitive, Information and Physical
Cogitation, Information, Physical Environment – Virtual, Visual, Real
Communication and Information Systems
Computer Network Attack / Cyber Network Attack
Computer Network Defence / Cyber Network Defence
Computer Network Exploitation / Cyber Network Exploitation
Computer Network Management / Cyber Network Management
Computer Network Operations / Cyber Network Operations
Community of Interest / Communities of Interest
Coalition Network for Secure Information Sharing
Common Operational Picture
Commercial off the Shelf
Centre for the Protection of National Infrastructure
Cyber Situational Awareness
Disclosure, Abuse and Denial
Defence Assured Information Architecture
Domain Based Security
Defence College for Communication and Information Systems
Defence Conceptual Frameworks
Direct, Collect, Process, Disseminate
Director of Equipment Capability
DEC Command & Control and Information Infrastructure
Defence Information Assurance Notice
Defence Information Infrastructure
Defence Line of Development
Demilitarized Zone
(US) Department of Defense
Defence Security Architecture
Defence Science and Technology Laboratory
Effects Based Approach to Operations
Essential elements of friendly information
Electronic Surveillance
Enabling Secure Information Infrastructure
Global Information Grid
Global Information Infrastructure
Global Operations Security and Control Centre
Human Intelligence
Engineering Doctorate
Page xv
Bridging the Air Gap: An Information Assurance Perspective
I2
Information and Intelligence
IA
IER
IIS
IM
INFOSEC
IO
IS
ISTAR
ITIL
IX
JCDX
JDP
JP
JSP
JWICS
JWP
KID
KT
MIB
MIP
MNIS
MOD
NEC
NCW
NIDS
NII
NSA
OODA
OPSEC
ORAC
PJHQ
PRIME
RMA
SCADA
SDM
SFIA
SIPRNet
SOA
STE
UCDMO
Information Assurance
Information Exchange Requirements
Internet Information Services
Information Management
Information Security
Information Operations
Information Services
Intelligence, Surveillance, Target Acquisition and Reconnaissance
Information Technology Infrastructure Library
Information Exploitation
Joint Cross Domain Exchange
Joint Doctrine Publication
Joint Publication
Joint Service Publication
Joint Worldwide Intelligence Communications System
Joint Warfare Publication
Knowledge, Information & Data
Knowledge Transfer
Management Information Base
Multilateral Interoperability Programme
Multinational Information Sharing
Ministry of Defence
Network Enabled Capability
Network-Centric Warfare
Network-based Intrusion Detection System
Network Infrastructure and Integration
(US) National Security Agency
Observe, Orient, Decide, and Act
Operations Security
Opportunities, Risk Assurance, Architecture and Complexities
Permanent Joint Headquarters
Privacy and Identity Management for Europe
Revolution in Military Affairs
Supervisory Control And Data Acquisition
Superior Decision Making
Skills for the Information Age
Secret Internet Protocol Router Network
Service Orientated Architecture
Socio-Technical Enterprise
Unified Cross Domain Management Office
Engineering Doctorate
Page xvi
Bridging the Air Gap: An Information Assurance Perspective
Engineering Doctorate
Page xvii
Bridging the Air Gap: An Information Assurance Perspective
CHAPTER 1
Bridging the Gap: An Information Perspective
The responsibility will fall on young officers to build trust across the ranks to improve
information sharing. In this age, I don’t care how technologically or operationally
brilliant you are; if you cannot build trust [across various multiple participants], you
might as well go home.
Marine Corps Gen. James N. Mattis
Commander of U.S. Joint Forces Command
In an age, where having accurate and timely Information makes the difference to
superior decision making (Khatri & Ng, 2000; Bradley, Pridmore, & Byrd, 2006) and
where Cyberspace has transformed how these decisions make immediate,
instantaneous impact on the global market place (Coyle, 1999), affecting many
communities of interests; it has become imperative to get the right information to the
right person at the right time. This imperative makes all the difference as the process of
sharing trusted information has far greater influence than mere communication (Katz
& Lazarsfeld, 2006).
Getting it right; through a process of gaining trust and managing risks, providing safe
and secure information that can flow across resilient and protected systems and where
the information assets are both dependable and timely should be, and within this thesis
will be argued as the aim and scope of Information Assurance (IA). Through providing
some solutions to the problems of interoperability and secure cyber communication,
this thesis will redefine the Art and Science of IA.
Engineering Doctorate
Page 1
Bridging the Air Gap: An Information Assurance Perspective
Moreover, this thesis will provide an argued solution to its fundamental question:Can Information Assurance provide sufficient Trust and Risk Reduction to
allow information processed, stored and communication within highly
sensitive (often critical) networks, with their own discrete security domains
(including encryption mechanisms), which are often Air-gapped (physically
and electronically isolated) to interact safely and securely, particularly
across many interoperable networks and including the possibility of
interfacing with the Internet.
Substantiate the need to better define Information Assurance (making it more distinct
and effective than its current scope which is heavily dependent upon its roots within
Information Security); innovate an IA Architecture that is based on the developed this
thesis goals’ of assurance and not just on the dimensions of security; provide an eight
dimensional model to better understand the need for tolerance and trust across many
different interoperable networks and the maintenance of cross-domain solutions for
system (and system of systems) dependability; create a professional framework to
direct what IA skills we need today and define the necessary IA education that is
needed for the 21st Century Cyber workplace and ultimately argue how we should best
employ Information Assurance for Governments, Enterprises and the Military; to use it
more effectively and reliably.
Information Assurance has become one of the most important studies in Computer
Science, Information Technology and Cyber Knowledge Transfer and probably will
have a significant social and cultural impact to our globalised knowledge economy
(Drahos & Braithwaite, 2002). Without an assured process between two
interconnecting systems, trust can soon diminish, whilst risks will grow and the need to
share through its layers of interoperability will rapidly fall back to a defensive need to
know operation and the enterprise cyber operations will once again rely on more
critical (inefficient and unresponsive) stove-piped networks and their isolating security
domains and curtaining policies. An Assured environment is not risk free, but it
promotes the interoperability of services and communication channels between
communities of interest (COI) whilst actively reducing and managing risk through
education, professional best practices, Ignorance Management, Shared Situational
Awareness (SSA), controlled Information Exploitation (IX). Information Assurance can
provide a comprehensive cyber defence strategy; dependable Information Operations
(IO), resilient Infrastructure Architectures and networks and above all, through
Business (Enterprise and IA) Architecture, a Trusted environment. In the hierarchy of
Engineering Doctorate
Page 2
Bridging the Air Gap: An Information Assurance Perspective
human needs (Maslow, 1943; Huitt, 2007): water, food and shelter, law and order are
surely still the most important things to us all; but the transformation toward
increasing dependence on Information Technologies (Powell & Dent-Micallef, 1997)
and the continuance of digital interconnections, the network effects, have these
information systems and technologies becoming pervasive and essential to us all. It is
the control of this Cyberspace that has become a strategic priority to states and nonstate actors. As our Information and its infrastructures have become national assets,
they also constitute a tier-1 national security risk that requires appropriate
management controls and defences (Cabinet Office, 2011a).
There is an unprecedented reliance on information infrastructure as Governments,
Enterprises and the Military find that their transformation to Information driven
operations, increased operational transparency and exploitation have generated
complex risks and a considerable reduction in their ability to control the information
flows. The sense of necessity, comfort, wonder and curiosity within the virtual world is
a real paradigm where informed cyber actors and agents have increased their
transformation skills as they digitally create, adjust, innovate, exploit, survey,
manipulate, subvert or sabotage cyber domains. This poses varied and complex
assurance issues to managing Cyberspace.
Figure 1: Netcentric Operations and Military Mobility (Benedict, 2011)
Bridging the Gap is a holistic investigation to see whether there might be practical
technical or human factor solutions that assures interconnection of highly classified
Engineering Doctorate
Page 3
Bridging the Air Gap: An Information Assurance Perspective
domains to the information rich environment that the Internet offers. Without access to
timely and effective use of information our decisions become jaded, inappropriate or
suspect. We need our information to be accurate, trusted and not compromised, lost,
leaked, disseminated, unauthorised publication or corrupted.
“Our reliance on cyberspace stands in stark contrast to the inadequacy of our
cyber security,”
DoD Strategy for Operating in Cyberspace, 2011
This Ministry of Defence (MoD) sponsored research will determine how we achieve
acceptable assurance and limit the risk of establishing, operating and managing a highly
classified system interfacing to cross domains and ultimately the Internet. The Network
Enabled Capability (NEC) and its ISTARs community has intrinsic, often complex
interdependencies, where information interactions and knowledge transactions needs
to cross many domains. The NEC doctrine of Information Superiority predicates the
need for information security and its assurance to provide accredited, safe, secure,
robust and trusted sources. The foundation lies with better networks that provide
better information sharing which leads to better decision; actions and effects. The
benefit is operation efficiency and superior military capability (MoD, 2011). The
military’s robust, secure and extensive information domains are not what is generally
associated with the ubiquitous, open access Internet and its hosted web-based services
but rather a bespoke environment under full control of its owners or coalition
partnership. However, it is the mating, mash up and interconnection of any network
that needs to be investigated, because the boundary between military computer
network operations (CNO) and others have become blurred, removed or created
without authority. Recognising that Information and Knowledge in its various forms,
media, databases, reports, services, interpretation and usage have become one of the
most important assets to our business, but do we really comprehend this?
Analysis suggests that the only way to really secure a military system is to isolate it.
Disconnect the system from other networks, in particular the Internet and its
associated risks to Computer Network Attacks (CNA) and Computer Network
Exploitation (CNE) as well as to other elements of the information domain (see figure
3). From a security perspective the Internet is unorganised, chaotic, unsafe, insecure,
untrustworthy environment of viruses, worms, exploited vulnerabilities, denial-ofservice attacks, cyber power, cybercrime and cyber war but it can also be an assured
world of creativity, innovation, commerce and social cohesion.
Engineering Doctorate
Page 4
Bridging the Air Gap: An Information Assurance Perspective
1.1 A New World
The Council of the European Union (2010) has made Information Assurance one of its
14 main policies and it has become a key component of the US Comprehensive National
Cybersecurity Initiative (The US National Security Council, 2008) and the subsequent
International Strategy for Cyberspace (The US National Security Council, 2011). This
thesis will, in part, need to consider the impact of IA to the cyber environment
(Cyberspace) and in particular to current security policies and domain isolation.
Through IA, we need to find an effective approach and possible Cross-Domain Solutions
(CDS) between the “Need to Know” (keeping our secrets safe and available only to a
closed authorised community) and the “Need to Share” (allowing information to used
and accessed by global communities of interest); hence the thesis will demonstrate
how, when and most importantly, why we need to Bridge the Air Gaps: by developing
and employing the need for trust and risk management, education and skilled
practitioners, tolerant organised structures with resilient architecture, dependable and
safe procedures and appropriate use of security and protective countermeasures: in
effect by applying the proposed IA definition, models and frameworks. The Council
defines Information Assurance in the field of communication and information systems is
the confidence that such systems will protect the information they handle and will
function as they need to, when they need to, under the control of legitimate users. Effective
IA shall ensure appropriate levels of confidentiality, integrity, availability, nonrepudiation and authenticity. IA shall be based on a risk management process. This
definition derives authority from many similar declarations in national policies (CESG,
2003), Security Taxonomy (Savola, 2007) and IA Glossaries (Committee on National
Security Systems, 2010). However, all these IA definitions rest upon the 3 tenets of
Information Security: Confidentiality, Integrity and Availability (CIA). This thesis will
argue that these foundation tenets, the CIA and the 5 other dimensions of security:
Non-repudiation, Authentication, Access Control, Privacy and Communication Security
(ITU-T X.805, 2005) are themselves only one of 8-Dimensions of Information Assurance
(as proposed in Chapter 6) that is required to fully understand, address and assure the
holistic issues of cyberspace, its environment, capabilities and culture.
Information in Cyberspace has a complex paradigm; the need for a trusting, dynamic
“Need to Share” (Alberts D. S., Garstka, Hayes, & Signori, 2001) opposed to the secure
but distrusting, restrictive “The Need to Know” (Denning, 1976) which is further
complicated by anonymity and the “Need to Hide” (Buda, Choi, Graveman, & Kubic,
2001). The common operating environment has become a need to protect information
Engineering Doctorate
Page 5
Bridging the Air Gap: An Information Assurance Perspective
across security domains so that Enterprises survive the interoperability of increasing
networks of networks and the systems of systems that form the information
infrastructures across cyberspace. This environment is expanding, evolving, constantly
exploited and is becoming both an economic asset and liability that has been described
as a new mindset to security practitioners (Task Force on National Security in the
Information Age, 2002).
The intelligence community (G2) has longed deliberated the importance of sharing
information and to keeping secrets, secret (Frigns, 2004; Liles & Liles, 2009).
Information Services (IS), Knowledge Transfer (KT), Superior Decision Making (SDM)
and holistic Shared Situational Awareness (SSA) and Cyber Situational Awareness
(CSA) are becoming an ever more important component to businesses, their
intelligence communities as well as transformational Government policing and
warfighting (Kelly O. L., 2008; Bailey, 2010; Bieniek, 2011). Moreover, the increasing
dependencies on cyber governance, assured e-commerce and social computing is
making information a critical asset for nations, enterprises and online communities, the
military and to individuals. The Need to Share (Dawes, Cresswell, & Pardo, 2009) and
also the Need to Belong1 (Baumeister & Leary, 1995) requires an assured skilled and
educated workforce to manage, maintain and service the cyber environment and the
cultures it supports. Within the military (and many enterprises) we need a framework
to culturally shift our mindset from 20th Century security practices to cross-domain
assurance which will provide a comprehensive, dependable, resilient and trustworthy
architecture that is capable and tolerant to withstand and survive the emerging,
interoperable, evolving cyber environment. This culture shift, however, presents the
Military, as well as Governments and Commercial Enterprises, with a number of
complex challenges to solve (Anderson & Rainie, 2010; Sommer & Brown, 2011).
A challenge and another fundamental question raised by this Thesis is: How do we
provide Assurance when we do not control the asset we want to secure and protect?
There is a considerable array of threats, attack methods and injected software
instruction approaches to our networks and to our information assets (processed,
stored or communicated) that provide new challenges every day (McCumber, 1991).
Harvard Professor Joseph Nye described this cyberspace security challenge at the
1
Existing evidence supports (Baumeister & Leary, 1995) the hypothesis that the need to
belong is an innate, powerful, fundamental, and extremely pervasive motivation to affiliate with
others and be socially accepted.
Engineering Doctorate
Page 6
Bridging the Air Gap: An Information Assurance Perspective
opening of the Munich Security Conference, 2011, where he remarked that: “The threat
is real but national governments had only just now started to tackle the issue.” Cornelia
Habig (2011) reported that this further reinforced the need to address complex
security and assurance challenges. “In the EU, but also on the national level, the
responsibilities in terms of cybercrime issues are immensely fragmented…Every two
seconds, there are new cyber-crime incidents, and every four seconds, there is an attack on
the network of the German administration,” was the worrying criticism expressed by
German Federal Minister of the Interior; Thomas de Maizière. The conference remarks
demonstrated a collective concern of Governments and the Military towards the
potential damage that an unpoliced cyberspace could do national and international
interests. The threats are real; many of the defences are inadequate.
Coalition Collaboration
Collaboration is defined as: “The act of working together with others to achieve a goal”
The UK’s MoD Comprehensive Approach (Joint Discussion Note 4/05, 2006), its own
and NATO’s Network Enabled Capability (NEC) and the US Joint Force Command’s
Effects Based Operational Approach (EBOA) have all proposed the need for an agile,
robust
interoperable
“Netcentric”
network
for
Joint
Actions
and
coalition
communications. This desire and operational imperative to interconnect modern and
legacy systems that allows coalition forces to benefit from extensive and responsive
Information Exploitation (IX), Knowledge Transfer and digital encapsulation of the
Operational theatre, providing commanders an accurate, trustworthy Cyber picture and
Cyber Situational Awareness, “knowing what’s going on” (Knight, 2001), thereby
facilitating Superior Decisions. These doctrines also call for the projection of
Cyberpower, conduct of Cyberwar and Information Operations (IO). Whereas, a key UK
NEC component2 is the assurance and protection of its 4 Domains: (1) Networks, (2)
Information and (3) People operating in a (4) Joint Actions Environment (MoD, 2005).
The US Committee on National Security Systems (CNSS, 2006) defined this Joint
Actions’ Communication and Information Systems (CIS) environment as a “CrossDomain Solution” (CDS) as “any information assurance solution that provides the ability
to access or transfer information between two or more security domains.”
2
The MoD’s Joint Services Publication (JSP 777) provides a clear expression of what the UK
means by NEC in order to engender a much wider and more common understanding of its tenets
not only within the UK's Ministry of Defence and Armed Forces, but also across Government,
within Defence Industry and Academia, and with allies and coalition partners.
Engineering Doctorate
Page 7
Bridging the Air Gap: An Information Assurance Perspective
Interoperability has become a key network driver for transforming governments
(Cabinet Office, 2005), businesses and other institutions; the use of Cyberspace (its
capability) to communicate and securely transact with peers, other enterprises (B2B)
and the global audience of active users has far reaching opportunities and
development. However, these interacting activities require system availability,
resilience, tolerance, dependability, security and above all an ability to create trust. As
such the Cross Domain Solution has three main assurance categories:
The need to allow Access Solutions; (allow users to request /pull information
resources in multiple multi-lateral and multi-layered domains). Access Control,
Authentication and System Integrity
The need to provide Cross Domain Transfer Solutions; (enabling secure and
accurate movement, copy, and deletion of information from one domain to
another and ensuring system dependability and resilience.)
To need to have Accredited Solutions; (Providing structured, safe, secure and
trusted CDS for Information Operations and Exploitation).
The information assured CDS domain will need to be structured, resilient, dependable,
safe, secure, protected, risk managed. Above all we need User Communities to become
SMART and capable of pulling cyber resources. According to the US DOD it now
requires that Information Operations (IO) be regarded as a military core competency,
“on par with air, ground, maritime, and special operations” (DoD, 2003, p. 4). The ability
to control the information environment, including interrelated physical, informational,
and cognitive dimensions, is now seen as vital to national security (DoD JP 3-13, 2006)
and the Department recognise that Cyberspace is a cognitive dimension, in which
“people think, perceive, visualize, and decide,” that is seen as most important (DoD JP 313, 2006, pp. 1-2). This directive places Information as a Strategic Asset and recent
military documentation emphasized the significant need for dependable and
interoperable information infrastructures, the net-centricity of military cyberspace as
described by Joint Publication 3–13, Information Operations and Joint Publication 3–24,
Counterinsurgency Operations describe that there is: “The ability to be “persuasive in
peace, decisive in war, preeminent in any form of conflict” (DoD, 2000, p. 1).
Sara King’s (King, 2010) discussion paper “Military Social Influences in the Global
Information Environment” identified that:- According to Scales (2006) and others (Boyd,
2007; Darley, 2007) this new era of “psycho-cultural battle” - otherwise termed a “war of
ideas” (Murphy, 2010, p. 90) or a battle for “hearts and minds” (Claessen, 2007, p. 97) is already underway in Iraq and Afghanistan. Modern battle is likely to be more about
winning public opinion than about seizing contested geophysical terrain. The modern
Engineering Doctorate
Page 8
Bridging the Air Gap: An Information Assurance Perspective
battlefield is likely to be in the information environment. King’s observation that modern
wars are more to do with manipulating human factors rather than destruction of assets
is an important paradigm for 21st Century Netcentric Warfare. Military Information
operations are moving away from the targeting of munitions to the targeting of opinion,
thoughts and cultural change. This theme is further explored and analysed with the
Human-Computer Interface that have evolved within the layers of interoperability. In
particular the developing the need to share, allowing participation and collaboration at
all levels, educating and training users to exploit assured information, to know where
the assets are located and configured, to be able to translate, transform and nonrepudiate and to trust the asset in making decisions.
Information Exploitation is essential to future governance in what is now strategically
developed the Diplomatic, Intelligence, Information & Interests, Military and Economic
(DI3ME) domain. Cyberspace is the DOD’s Netcentric domain and it has been described
as: “the extent to which a system or group has at its center the complex connection of
people with common interests via communications and computer networks.” Dave
Chesebrough, 2006. Although this description places both Information Technology and
People as essential elements for the deployment and exploitation of Netcentricity; it
doesn’t encapsulate the full extent and nature of Cyberspace. Chapters 2 and 3 will
develop the Cyber Environment and in particular its creation as the 5th Military Domain
of Operations. However, Chesebrough (2006) did further identify 4 components that
made the Network domain; these where:
1. A system of lines or channels that cross or interconnect: a network of railroads.
2. A complex, interconnected group or system: an espionage network.
3. An extended group of people with similar interests or concerns who interact and
remain in informal contact for mutual assistance or support [a social or
professional network]
4. In Computer Science, a system of computers interconnected by telephone wires or
other means in order to share information. Also called [the] net.
The Network Effect of these definitions, when combined, becomes one complex domain
which the DoD defines as the Global Information Grid (GIG). The interconnection of
theatres of operations, technologies and people formulate the Cross-Domain Problem
where deployed systems are required to link digitally to others and the networks need
to become interoperable to share data. The Information Exchange creates degrees of
complexity as people with common interest interact with technology to create a
desired common awareness.
Engineering Doctorate
Page 9
Bridging the Air Gap: An Information Assurance Perspective
Information Exchange
Levels of
Interoperability
Cross-Domain Sharing
Level-4
Advanced Collaboration
Enterprise
Interactive COP and eventtriggered database replication
Interactive manipulations
Shared data & Applications
Shared Databases
Level-3
Sophisticated
Collaboration Common
Operational Picture
Geospatial imaginary
Heterogeneous
Product Exchange
Domain
Shared Data,
Separate Applications
Level-2
Functional
Photo & Videos, digital maps &
overlays
Minimal common functions
Separate data &applications
Homogeneous Product
Exchange
Level -1
FM voice, tactical data links, text
files, IM & e-mails
Manual Gateway
Impress, Diskettes, tape, hard copy
exchange
Computing
Environment
Connected
Electronic Connection
Separate data &
applications
Level – 0
Isolated
Not Connected / Air
Gapped
Figure 2: The LISI Interoperability Maturity Model (2004)
Information Exchange through interoperability within the military (NATO’s Network
Enhanced Capability and the DoD GIG) has millions of computing devices linked in
classified networks becoming ever more reliant on cyberspace for its command and
control, logistics, information and intelligence operations, targeting and munitions
(Fire) as well as personal management and business operations.
Resolving the
assurance issues of interoperability has become a major component to finding a crossdomain solution. The goal of military CIS interoperability is to achieve the advance
collaboration at the Enterprise Level. This, as Figure 2 illustrates, is the uppermost of
DoD’s 5 Levels of the Information System Interoperability Maturity Model with its focus
on the increasing levels of sophistication between system of systems interoperability.
Although technical interoperability is essential, it is not sufficient to ensure effective
operations. There must be a suitable focus on procedural and organizational elements,
and decision makers at all levels must understand each other’s capabilities and
constraints. Training and education, experience and exercises, cooperative planning, and
skilled liaison at all levels of the joint force will not only overcome the barriers of
organizational culture and differing priorities, but will teach members of the joint team to
appreciate the full range of Service capabilities available to them.
(DoD, 2000)
Engineering Doctorate
Page 10
Bridging the Air Gap: An Information Assurance Perspective
As quoted, the years of experience in Bosnia, Iraq and Afghanistan has taught the
coalition partners; Interoperability between military systems, be them owned by any
one nation or federated across communities of interest have generated many complex
problems. Interoperability is more than a legacy issue or a technical interface problem,
its concerns the harmonisation of organisations, alignment of policies and procedures,
cultural changes, federated leadership and an understanding of how system of systems
operate and evolve. Cross-Domain Solutions are the application of Information
Assurance to the challenges of interoperability. IA has to address the many levels
involved in the harmonisation and alignment of Organisation, Systems and Networks,
properly define and architect the requirement of the Enterprise, build in system
resilience and tolerance to intrusion making the solutions both safe and dependable.
The systems have to gracefully decline when under attack and appropriate business
continuity and disaster recovery must be prepared and be ready to be deploy at a
moment notice. Information Assurance will be required and applied to systems that
previously did not interact and often have constraints within their own operations or
from the onset with new systems that are designed to interact. This is an important
first step; however, there will be systems that as of yet have not been conceived or are
required to interoperate, so the IA architecture must anticipate future considerations
and be able to cope with uncertainties..
A holistic perspective is that Reality is layered with a virtual world, as illustrated in
Figure 3, which now has 5 domains: Land, Sea, Air, Space and Cyber. The cost of doing
business in the first 4 domain represent an escalation of equipment costs, training and
accessibility, in the 5th domain cost is negligible, anybody can become a cyber-warrior.
The military 5-layered model(figure 2) is supported by the geographical location
(location will be a key component to Access Control, knowing where the user should be
is an determining element of authentication) and the physical interconnectivity and
interoperability of ubiquitous edge devices. This man-made physical operating
environment is constantly changing and needs to be resilient and transnational. We
should not consider Cyberspace or the Cyber environment has being virtual or a cloud –
Cyberspace exists in physical devices within DNS, Service Orientated Architectures
(SOA) and distributive databases forming a local interface to real world of packet
routers, telephony and inter-operating networks of networks. Behind these devices are
the logical layers that provide software-enabled functions with emergent logical
connections and often producing unforeseen outcomes; thereby introducing
vulnerabilities, risk and business impact (Castonguay, 2011).
Engineering Doctorate
Page 11
Bridging the Air Gap: An Information Assurance Perspective
The Cost of doing Business
Land
Sea
Air
Space
Cyber
Persona
Ubiquitous Communications
Information Infrastructures
Network of Networks
Figure 3: The Military Information Lattice (Richardson C. J., 2011)
The MoD’s domain security architecture insists through its accreditation process that
highly sensitive secure systems remain physically isolated, the Air Gap. Unfortunately,
today’s enterprises, transformational government departments and the defence
environment online communities’ sensitive business information is often the same
information that needs to be passed beyond the trusted perimeter. We need to extend
the trust to cross domains, make our sessions safe and secure; essentially we need to
assure our knowledge transfer environment to multiple parties within our
communities of interest (COI).
Understandingly, Security needs to be positioned
strategically in the enterprises. This is a real world issue; the communication paradigm
is becoming more dependent upon the safe and secure, processes of virtual machines,
their trustworthiness and the availability of information infrastructures being critical
to operational success. The development of the Effects Based Approach to Operations
(EBAOs), Cyber Situational Awareness (CSA) and NEC domains (Networks, Information
and People) is fraught with complexities and an increasing concern for dependable,
safe and integral systems that can be defended against orchestrated cyber-attacks.
Information Assurance (IA) is the key to trusting, maintaining and developing Defence
Communication and Information Systems (CIS) capabilities. Furthermore, Information
Assurance research has to also focus on a capability gap in education. Enterprises
Engineering Doctorate
Page 12
Bridging the Air Gap: An Information Assurance Perspective
required us to develop good, educated IA practitioners and change the online user
culture to a more assured, cyber-culturally aware environment. To Framework the IA
profession will allow continuous specialized training to contextual and conceptualise
the ever present risks and demand to assure systems and provide a career structure for
practitioners in this important aspect of Engineering and Computer Science. Bridging
the professional capability gap of qualifying and sustaining IA practitioners is a real
requirement.
Until recently the defensive computer network defence (CND) posture has been the
developing a security doctrine to monitor, detect, respond to unauthorized computer
activity and attempts to mitigate risk through countermeasures and security devices
(Wilson C. , 2006; Stallings, 2006a; CESG, 2006g; MacIntosh, Reid, & Tyler, 2011) using
policies and procedures that protected the information by creating compliant,
accredited security domains with limited access, restricted user privileges often
firewalled behind encryption. These security silos afforded protection through policies
& procedures, vetting & restriction of users and the use of IT devices and the security
architect traded operability with security producing air gapped networks where often a
user had 8 or more DTEs to access 8 different networks (Bethea, 2003). This security
technique was exemplified by the McCumber Model in 2004. However, it isn’t CND that
troubles the minds of strategic planners, moreover the ability to strike back. It is the
implacable effects of fear, uncertainty and doubt (FUD) over cyber security that has
fuelled this new direction of military cyber offense and the impalpable complexity of
cyber activities and the perceived inability to defend that reinforces the military
strategic idiom, that the best defence is offense (Mazanec, 2009; Lin, 2009; Hopkins,
2011). Government bodies are clearly at variance, agitated and concerned about the
development of cybercrime and unattributed hostile intent vectored through
cyberspace. This globally agile, evolving, expansive and exploited cyber domain has
little (nearly non-effective) international policing, fewer effective laws and a great deal
of anonymity, chaos and inherent systemic risks (Davì, 2010). The threats of
cybercrime, cyber terrorism, cyber war inflicting damage and destruction (Cyber
Weapons of Mass Destruction) upon indefensible, open networks are attracting
diplomatic, political and military responses to militarise cyberspace; to actively develop
and build cyber weapons (e.g. Stuxnet, Duqu, botnets, etc), to expand offensive cyber
operations to implicitly threaten states and/or to regulate and actively stop malicious
cyber threats or face retaliatory consequences. Conceivably, states can build server
farms of numerous racked processors running thousands of virtual machines to exploit
a “zero day vulnerability” which turn infest and herd many millions of devices
Engineering Doctorate
Page 13
Bridging the Air Gap: An Information Assurance Perspective
connected to the internet in order to conduct mass denial of services, generate Zombie
launch sites for malware or assumption of control over SCADA and Command & Control
(C2) systems. The Cyber Pearl Harbor scenario, crippling critical information
infrastructures, is seen by many (successive US Sec. of Def. John Hamre, 1997; Richard
Clarke, 2010 and Leon Panetta 2011) as a very real threat to the State, world economic
and social order. In this Cyberpower struggle for allocating scarce funding to offence
and defence, IA has to compete against and recognise the very persuasive and militant
body who want to build asymmetric cyber weapons to deter (or attack) potential
attackers.
The counter argument to 20th Century Deterrence is knowing how to use Information
Assurance in the 21st Century. The greater part of the 20th Century was dominated by the
threats of war, World Wars and Nuclear Deterrence. Deterrence is that you possess both
the capability and the will to either retaliate or initiate a first pre-emptive strike to
thwart an eminent attack (Powell R. , 1990) and consequently some of today’s military
thinkers have developed a cyber-strategy to deploy and use offensive cyber weapons as
a method of deterring potential cyber assaults and providing a means to retaliate in the
5th Dimension – Cyberspace. Revisiting, Professor Nye’s remarks (Habig, 2011), he
could have further informed his audience with “offensive internet weapons have been
introduced as a deterrent but the national governments have not quite a clue how to use
them.” The use of virtual weapons as a deterrent in a virtual space can have
unintentional consequences (Beard, 2009; Sterner E. , 2011) and emergent properties
not readily envisaged by the software engineer or by these cyber warriors (Zimet, et al.,
2009; Rid & McBurney, 2012). The consequences become more complex as they will
affect the many layers of interoperability and wanting to become target selective
produces intangibles within an evolving and chaotic network of networks (Schneier B. ,
2008; Alperovitch, 2011; Crosston, 2011).
What is required is better Information Assurance, rather than MAD (mutual assured
destruction or senseless, foolish, deranged) Cyber Offensive Weapons. The pressing
global problem of cyber insecurity and system interoperability is how to develop
resilience, trust and dependability to allow interacting information infrastructures and
cyber activities to be safe and secure, to have system of systems whose information
infrastructures are tolerant (fault and Intrusion tolerant) and risk managed, where the
decision making cycle has assured information delivered to the right people.
Engineering Doctorate
Page 14
Bridging the Air Gap: An Information Assurance Perspective
1.2 The Research Approach
Cyberspace, and the technologies that enable it, allow people of every nationality, race,
faith and point of view to communicate, cooperate, and prosper like never before... By its
self, the Internet will not usher in a new era of international cooperation. That work is up
to us, its beneficiaries. Together, we can work together to build a future for cyberspace
that is open, interoperable, secure and reliable. This is the future we seek, and we invite all
nations, and peoples, to join us in that effort. President Obama, 2011
Most people working in cyber security recognize that the interconnections and
complexities of our economy can have a huge effect on the destructiveness of cyberattacks. They refer casually to "network effects," "spill over effects" or "knock-on effects."
Yet there is little understanding of how such effects actually work, what conditions are
necessary to create them, or how to quantify their consequences.
US Cyber Consequences Unit, Dept. of Homeland Security
Purpose
Government classified networks have created in many cases information silos that
protect their data sources but fail to inform the greater needs of the communities of
interest. The current security given to the UK Government by CESG and its parent
organisation GCHQ is that sensitive data (impact level 4 upwards) should be adequately
protected using firewalls and other security devices and that networks that are secret
and top secret should be isolated. These air gapped networks with their security
domains impose very restrictive practices to the movement and communication of
information and deny sharing and Information Exploitation. In the world where the
timely use information is the asset that needs to be encouraged, the need to share
across these domains often outweighs the necessity to keep our information secure.
This research aims is to find a balance between protection and availability of
information (its information security) and the need to Exploit Information that is also
trusted and dependable. This new environment creates the need for trusted crossdomain solutions and the development of Information Assurance offers such a
possibility.
As illustrated in figure 4, the research approach follows 6 main themes:
Engineering Doctorate
Page 15
Bridging the Air Gap: An Information Assurance Perspective
Figure 4: Discovering the Cause and Effects of Bridging the Gaps
In bridging the gap, this thesis addresses the following primary aims:
To provide an Information Assurance Capability that will facilitate Cross –
Domain Solutions. This capability will need a framework that formulates the
assurance implications of interoperability within cyberspace, human factors,
protection of networks and secure data content, alignment of enterprise
architecture, any organisation culture changes, information exploitation,
management and service dependability from bridging the air gap between
highly classified networks and possible interaction with lower classified
networks and the Internet and how it might be done. The investigation will also
consider when those bridges might be considered an acceptable risk.
Establish and develop an information assurance framework and appropriate
models to meet operational interoperability requirements; whereby the study
shall analysis various contextual and conceptual considerations of aligning and
harmonising domain internetworking, thereby offering an assured crossdomain solution to military CIS interoperability
.
Exploring six main topics within the layered environments and thereby framing
the Cyber Landscape through modelling IA concepts. Analysing dependable,
resilient convergence of technologies and networks and developing a CyberAssured Culture through Education; Promoting Transferable Skills &
Engineering Doctorate
Page 16
Bridging the Air Gap: An Information Assurance Perspective
Professionalism will provide a new capability for Information Assurance. IA will
demonstrate how to provide solutions to system interoperability; operational
benefits; operational security and new community learning outcomes.
Illustrate the value of this research approach to the network-centric security
problems of NEC (and the Global Information Environment) and highlighting
the real human-centric assurance issues to the various layers, domains and
environments of an interoperable Cross-Domain Solution and provide a
discussion on how the qualitative experience of this research and individual
perceptions can be analysed and developed.
To identify, formulate and exhibit this approach and model implementation
demonstrating it as a worthwhile Doctoral investigation. The thesis will be a
successful project managed research programme with achievable, realistic
outcomes within well-defined goals and agreed deliverable products.
Engineering Objectives
The four prime Engineering Objectives:
EO1 - Develop IA Models that will demonstrate a holistic understanding of
Information Assurance and Cross Domain Solutions required to bridge:
Physical, Virtual and Human Air Gaps. The models shall review a wider context
of IA to Interoperability as well as specific analysis to the military context of
cyberspace; its strategic, operational and tactical cyber environment.
EO2 - Determine a contextual framework and model(s) of Information
Assurance to provide Enterprise Architecture and strategic cultural change
awareness; to make a structured, safe, dependable, secure, protected, risked
managed and trusted approach to assure interoperability of networks; the
secure continuum of information; increasing trust of people, operations and
systems and the reliability of the Cyber picture of the Joint Action environment.
EO3 - Determine an Architect view of the existing contexts, concepts, logical,
system, technologies and management that will formulate a more inclusive
Information Assurance Framework to the Cross Domain problem. Conceptually
framework and model any assured solutions that illustrates the need for
Holistic System Situational Awareness, System Analysis, Engineering, and
Simulation to develop core skills for IA Practitioners and a revised Information
Assurance Architecture (IA2).
EO4 - Provide innovative and original research that will provide sufficient new
grounding to Science within the confines of an Engineering Doctoral thesis
investigating the problems of bridging air gaps. Demonstrating independent
working and the critical awareness of relevant sources, illustrating where
appropriate the literature searches, retrieval and synthesis and analysis of
findings in relation to the desired aims.
Engineering Doctorate
Page 17
Bridging the Air Gap: An Information Assurance Perspective
The Culture
The 5-day Research Methods and Implementation course run by Southampton
University for first year PhD and EngD students provided an invaluable insight of
research mechanisms, methodologies and procedures required for academic rigour and
organising the research process. The various readings and assignments over the 2-year
taught element of the Engineering Doctorate emphasised the need for qualitative and
quantitative research such as Bloom’s Taxonomy (see figure 27) and the adaptations of
methodologies to suit the particular line of discovery, objective achievements and
measurement (Parmet, 2008). Clearly an appropriate research methodology had to be
adopted to underpin this Thesis and its intention to provide a genuine contribution to
the state of knowledge in Information Security and its Assurance, in particular an
assured Bridging of the Air Gap.
An adaptive approach to the research methodology using the herringbone model (see
figure 4) was used rather than choosing a specific methodology such as those proposed
by Peter Checkland’s Soft System Methodology (Checkland, 1981) or Peter Senge’s
System Thinking (Senge P. , 1990; Senge, Kleiner, Roberts, Ross, & Smith, 1994). This
might at first make further epistemological complexities to this very complex issue;
however the agile use of the herringbone allowed the tailoring of some formalized
approaches allowing a greater insight and interpretation of the Hypothesis and helped
span a number of key component issues that in themselves where worthy research
topics (Connell, Lynch, & Waring, 2000). A Qualitative method evolved during the initial
research and examination of current literature, Defence research (DoD, MoD, NATO and
DSTL) and current operational difficulties both in Iraq theatre (Op Telic3) and
Afghanistan theatre (Op Herrick4). An examination of the current State of Art of
Information Assurance and the Interoperability Framework has identified that the
current structure of Assurance is both restrictive and intolerant to the problems it
needs to define, explore and resolve. The strategic communication and information
3
Operation TELIC is the codename under which all British operations of the 2003 Invasion of Iraq
and post invasion peace keeping and redevelopment.
4
Operation HERRICK is the codename under which all British operations in the War in
Afghanistan have been conducted since 2002. It consists of the British contribution to the NATO-led
International Security Assistance Force (ISAF) and support to the US-led Operation Enduring
Freedom (OEF).
Engineering Doctorate
Page 18
Bridging the Air Gap: An Information Assurance Perspective
flow issues occurring in present operations (2002-2012) within Afghanistan and in
particular with the coalition secret network - the Afghanistan Mission Network (AMN)
– postulate a new motivation to change the rules for network interoperability.
Finding a cross-domain solution is not just a quest to find an appropriate technological
interface to meet the stringent demands of military communication security
(Confidentiality, Integrity and Availability) but to change the concept of Information
Assurance as a product of
security
into
science
worthy
its
of
own
the
recognition that the UK, the
European Commission and
the USA has bestowed upon
it. By developing a strategic
position for IA, this thesis
will create a strategic fit
that
can
Information
develop
Assurance
across the organisation as
well as developing methods
and techniques to deploy
technologies that align and
harmonise with the military
thinking of the layer of
interoperability (Khalilzad
Figure 5: Network Centric Operations Layers of
Interoperability (Källqvist, 2008)
& White, 1999; Tolk &
Muguira,
2003).
current
definitions
The
of
Information Assurance have not presently evolved sufficiently or conclusively from its
roots in Information Security; the time has come for it to do so!
Military Commanders using Network Centric Warfare (NCW) and NATO’s NEC with
their interoperable networks of networks are increasing concerned with networking
people, organizations, institutions, services, nations, etc., even though its functionality
relies on information delivered via the technical networks (Tolk A. , 2003). NATO’s
own Reference Model for Interoperability is embedded in its Command & Control
Technical Architecture (NC3TA) where it measures the effectiveness through four
Engineering Doctorate
Page 19
Bridging the Air Gap: An Information Assurance Perspective
quality criteria: Data Quality, Information Quality; Knowledge Quality and Awareness
Quality.
Figure 6: Network Centric Warfare Metric Framework (Tolk, 2003)
The Quality of these Information Services (Knowledge/Awareness of Actions;
Semantic/Information Interoperability and Data/Object Model Interoperability)
measures the performance of using the data, information and knowledge for the
operation to improve the results, mission effectiveness and overall system/operation
agility. It is the degrees of organic information and how it was shared that provides the
quality of coalition awareness and decisions. Information Assurance has to deliver this
quality across the layers of interoperability. Further investigation of the current
literature (Classified and Unclassified) and the necessary qualitative research
formulated the need to pragmatically model the situational awareness of the complex
issues involved and to determine the quality of interactions as illustrated in Figure 6.
To quantify the nature of the security issues formulate and contain the degree of
Information “Share-ability”, their semantic complexities and interrelationships requires
a detailed and yet broad understanding of these issues, engineering constraints,
common criteria evaluation and the development of Information as an asset in the
Revolution of Military Affairs (RMA) and net-centric operations.
Engineering Doctorate
Page 20
Bridging the Air Gap: An Information Assurance Perspective
Creating a holistic assurance picture using pragmatic modelling and adapting
qualitative and interpretive methods have enabled a systematic convergence of this
study’s research. The plethora of changes in Computer Science, Information Technology
(IT), Communication and Information Systems (CIS) has transformed and will probably
continue to transform military operations as well as of those of Government and
Enterprises. The benefits of these changes can be exploited by our operational agility,
the sharing and exploitation of information providing the communities of interest (COI)
a Shared Situational Awareness (SSA). However, with urgent operational requests from
military theatres and the needs of information to cross security domains of many
networks has produced a plethora of potential vulnerabilities, risk and emergent
properties that are often overlooked, unrecognised or negated for operational
necessities.
The Transformational Government Agenda (Cabinet Office, 2005) outlines the need for
a culture change to the development, dependability and deployment of UK
Communication and Information Systems. This new agenda requires Government
systems to become secure, robust and interoperable. As such, the new Enterprise
System Architecture needs to articulate, describe and frame the coalition network of
networks that supports an interoperable System of Systems infrastructure that is
inclusive of information services, management, and its assurance as well as being
tolerant to incidents. Within the MoD this has been recognised as the capability
relationship between deployed traditional defence information (legacy) systems and
procured modern information technologies that should transform defences Systems
into an inclusive interoperable environment of Network Enabled Capability (MoD,
2006) of Information Technology (IT), Information Services (IS) Information
Management (IM), Information Exploitation (IX) and their Information Assurance.
Traditional Military CIS combat platforms and system acquisitions have very high costs,
extremely long lead times (Committee of Public Accounts, 2011) but are developed
ruggedised, hardened, secured, and tested to ensure the highest level of performance,
confidentiality,
integrity
and
availability;
thereby
meeting
compliance
and
accreditation standards for Information Security (MoD, 2010).
Military systems are proprietary and communicate securely with little effect on
performance but their development processes does require considerable configuration
management and documentation processes that are maintained throughout the system
life cycle. The system security compliance is captured in the Risk Management and
Accreditation Document Set (RMADS). As military systems became more software
Engineering Doctorate
Page 21
Bridging the Air Gap: An Information Assurance Perspective
intensive in computing devices, infrastructure and communications, procurement and
integration have incurred increased costs to meet legal and regulatory demands
designed to ensure openness and fiscal responsibility. Moreover, their system
complexity, operational and environment requirements to meet mission-critical
battlefield requirements of high reliability; ease of maintenance and built-in safety
systems require much more than quality assurance (Perlo-Freeman, Cooper, Ismail,
Sköns, & Solmirano, 2011). However, the lack appropriate Information Assurance
methodologies in their design and ineffective maintenance of the RMADS especially
when compared with more mature, hardware-intensive engineering (e.g. avionic
systems, network rail, air traffic control systems) and development processes have
caused considerable system life cost uplifts and urgent operational re-engineering
resulting in a number reviews of MOD Asset Management (MOD, 2007; Dunn & Moore,
2011; Committee of Public Accounts, 2011)
The Cross Domain Solution generates risk, fear, uncertainty and doubts across many
high-level data custodians who explicitly believe that authorities want the data
protected as offered by accredited security domain, air gapped from other networks;
not allowing for interoperability across different secured information infrastructure
domains. There is little trust, assurance or appropriate risk appetite in the system
engineering, traffic engineering, system compliance and accreditation. However, they
recognise the demand for more Social computer engineering investigations, risk
management, security operational capability and extending practitioners’ knowledge to
allow for improved interoperability of classified systems within the UK; with MoD’s
systems; inter-HMG departments; with coalition partners; with NATO; with NonGovernment Organisations (NGO’s); in particular with highly classified cyber domains
such as Secret, Top Secret and above. NEC Interoperability itself has produced a layer
effect upon network centric operations as illustrated earlier in Figure 4. These layers
direct Information Assurance to align the organisational and technical interoperability
across each layer and thereby establishing a coherent and inclusive framework that
addresses the layer interfaces. In defining these interfaces, it is crucial to note that the
information asset is not regarded as integral to the physical technical infrastructure nor
tightly coupled to applications. The direction of this research is therefore to
contextualise the concepts, doctrine, policies, technologies, procedures and education
that may allow converging organisational and technical interoperability of classified
military networks and Information Infrastructures in both multi-level (vertical) and
multi-lateral (horizontal) operations providing cross domain solutions to different
classified security (Physical and Logical) domains; thereby Bridging the Air Gaps.
Engineering Doctorate
Page 22
Bridging the Air Gap: An Information Assurance Perspective
Thesis Hypothesis
“Can Information Assurance provide sufficient Trust and Risk Reduction to allow
information processed, stored and communication within highly sensitive (often critical)
networks, with their own discrete security domains (including encryption mechanisms),
which are often Air-gapped (physically and electronically isolated) to interact safely and
securely, particularly across many interoperable networks and including the possibility of
interfacing with the Internet.”
The hypothesis is that a controlled, obeisance, human-centric information assurance
framework stacked on a trusted, robust, data train can provide a secure, cross-domain
knowledge transfer environment thereby removing the need for network and other air
gaps. That such a assured framework can encapsulate the Human-Computer / HumanCyber Interfaces as information flows (Processed, Stored and Transmitted) across the
five layers of Cyberspace (EO1 and EO2). Such an Assured Environment has to provide
a safe, secure, accurate operation and be sensitive to the situational awareness of
decision makers and operational commanders as well as the security of this country’s
secrets. Moreover, it has to satisfy security and protection policies of the Information
Assets across the complexities of Information and Knowledge exchange and inform the
holistic nature of this assured cyber environment to its communities of interests by
educated assurance practitioners (EO3 and EO4). The assured capabilities of the NetCentric environment require more effort to context-dependent research and modelling
IA inferences and impact. The interpretive perspective and quantitative methods of
Enterprise Architecture (EA) can provide better understanding towards cyberorientated 21st Century Defence Information Architecture, its Systems Engineering,
Assurance and Human Factors. A special sub-set of EA could be Information Assurance
Architecture (IA2) which will need to provide an appropriate infrastructure for cyberdomains to support single service, purple, NATO and coalition operations and missions
and any NGO corresponding actions within a contextual references (who, when, why,
etc.). Furthermore is has to be based on the information exchange (flows) requirements
of the mission. The architecture should be a layered approach to existing and future
systems where classified data is structured, processed safely and securely in trusted
domains to provide appropriate knowledge transfer and understanding to enable the
NEC Benefits Chain and Cyber Situational Awareness. The Research Direction of this
Assurance Community and its CDS has begun to move away from technological
solutions to managerial and organizational issues through Qualitative Research
methodologies (Kaplan & Maxwell, 1994; Kaplan, Truex, Wastell, Wood-Harper, &
DeGross, 2004).
Engineering Doctorate
Page 23
Bridging the Air Gap: An Information Assurance Perspective
The Threat
“Over the last decade the threat to national security and prosperity from cyber-attacks
has increased exponentially. Over the decades ahead this trend is likely to continue to
increase in scale and sophistication, with enormous implications for the nature of modern
conflict. We need to be prepared as a country to meet this growing challenge, building on
the advanced capabilities we already have,” Strategic Defence and Security Review, 2010
The Ministry of Defence through its Strategic Defence and Security Review, (MoD,
2010) its Comprehensive Approach Doctrine, JDN 4/05 (MoD, 2006); Information
Strategy (MoD, 2009) and its Network Enabled Capability, JSP 777 (MoD, 2006) has
identified that it needs to protect, integrate, manage and exploit its information
structures to enable commanders to make proportionate and appropriate superior
decision through shared situational awareness. At present policies, regulations and
accreditation prohibit certain network operations and electronic data transfer from
multiple secure domains, thereby reducing interoperability and limiting information
away from task-orientated communities of interest that exploit collaborative processes in
a single Information Domain (MoD, 2005).
The Government wants and needs to: “Close the gap between the requirements of a
modern digital economy and the rapidly growing risks associated with cyber space... that
MOD will become significantly more focussed (to its) approach to cyber, by ensuring the
resilience of our vital networks and by placing cyber at the heart of defence operations,
doctrine and training. We (HMG) will also work to develop, test and validate the use of
cyber capabilities as a potentially more effective and affordable way of achieving our
national security objectives; address shortcomings in the critical cyber infrastructure
upon which the UK as a whole depends, both to tackle immediate weaknesses in security
and to ensure that we maintain access to a trusted industrial base,” Strategic Defence and
Security Review, 2010
At present, the Ministry of Defence does not have a coherent Cyber Security
Architecture and no Information Assurance Architecture underpinning its systems of
systems approach and tolerant operations. Possible NATO and DoD IA2 are aligned to
security mechanisms and accreditation rather than system operability, dependability
and intrusion tolerance. The current MoD Communications and Information
Infrastructures have been built up in an ad-hoc manner through the acquisition and
deployment of individual systems, each establishing its own security domain through
the accreditation and the purple spotting technical approval system to join tactical,
Engineering Doctorate
Page 24
Bridging the Air Gap: An Information Assurance Perspective
operational, enterprise and strategic networks. The ISTARs platforms and future
Defence Communication and Information Infrastructures must address the needs of
technical and operational requirements for better decision making through shared
situational awareness with an exploitive information domain that can maintain the
assurance of the right information to the right people, at the right time. Many military
systems are highly secretive in purpose, design, capabilities, operations and
deployment. The economic, expansive, evolutionary and sometimes explosive
convergence and accessibility to quantity and quality of data, information and
knowledge transfer to the user and potential threat actors is creating a transparent,
vulnerable world at an alarming rate to Governments and their Defence Departments.
This globalised transparency5 of open access; open source is counter intuitive to
accredited structured, safe, secure and trusted systems.
This study wasn’t going to be easy; a positive outcome of the research has a high
operational impact on the future conduct of Operational Exploitation of Information
and Knowledge crossing many classified security domains6 (Campen, Dearth, &
Goodden, 1996; Hughes, 2002; Pollock, 2002; Fenz & Ekelhart, 2009). How and where
can the Air Gap be bridged is a current operational necessity for information
exploitation across coalition networks. However, the hypothesis of Bridging the Air Gap
is currently in direct conflict with a number of key Defence Communication Doctrine,
Policies and Security Procedures. No Government Communication and Information
System (CIS) can be operated without prior Accreditation (CESG, 2005; Cabinet Office,
2010b; MoD, 2010) The UK’s Technical Authority for Information Assurance; the
Government’s Communications Headquarters (GCHQ) is amendment that the Air Gap is
both necessary and enforceable by accreditation. This provides a stark, negative barrier
to the hypothesis. The contrast of secure, accredited military systems is the often
quoted insecure and unsafe commercial off-the-shelf (COTS) information systems.
5
Transparency can seriously degrade several principles of war, most significantly mass,
manoeuvre, and surprise; e.g. it can provide a threat actor near-real time, accurate battlespace
visibility of a State’s military posture at both the strategic and theatre levels.
6
Defence uses network with a different security domain and security classification in isolated
closed user groups and network topology. All Top Secret networks are built and securely
maintained separately from other networks, e.g.: JOCs, SLI, NIPRNet, SIPRNet are all
independent and isolated networks (Air Gapped).
Engineering Doctorate
Page 25
Bridging the Air Gap: An Information Assurance Perspective
Security is often easily financially offset by these COTS which have been developed,
marketed, and upgraded within a 2-year life cycle (Al-Kuwaiti, Kyriakopoulos, &
Hussein, 2009; Anderson & Rainie, 2010). These systems are often not ruggedised, nor
robust enough for tactical military operations, with some COTS exhibiting too great a
risk than those which would be acceptable for used by public safety or national security
organizations. The economic security challenge today (Paquet & Saxe, 2005) is to
produce agile, robust COTS systems that are responsive to the Enterprise whilst being
secure, and seen to be secure, to satisfy regulations, policies, laws (in particular those
concerning data protection and privacy) and accurate reporting (Akdeniz, Walker, &
Wall, 2000; Allor, 2007; Colwill, 2010). The Enterprises’ profit-and-loss statements are
the bedrock of commercial decisions on information system life cycle designs (Hanseth,
2002; Howard & Lipner, 2005). Getting the “Greatest Bang for the Buck” with just-in-
time component delivery, acceptance of degraded system performance, reduced
operational response rates, and increased repair times are considered financially
acceptable if the equipment will do the job. Software (and to a lesser extended
firmware and some hardware) have been rushed through factory testing or untested
beta version released are launched on unsuspecting customers and field testing is
forced actual operational environments and consequently user enterprise bottom lines.
In the recent past, it was common practice for COTS systems been shipped under
licence, without access to source code? These flawed software or implementation
operational glitches were either corrected with software patches or left in the field
until new software version was developed (Schneier B. , 2008). Furthermore, it is quite
common to find that same code was third party developed, often with an overseas subcontractor, with minimal documentation, flow charts or configuration management
(Furnell & Thomson, 2009). Consequently, security is often seen as a bolt-on extra by
Enterprises and high assurance software the exclusive reserve for military and some
government projects willing to pay a premium. Table 1 illustrates some of the current
security issues in the marketplace.
The introduction and adoption by industry of new technologies such as wireless, voice
over Internet protocol (VOIP), and radio frequency identification devices (RFID) are
rapid, with little design concern for security and privacy. Introduction of this
technology in the commercial market is based on user acceptability, legal
consequences, and bottom-line cost analysis, not on considerations of information
safety, potential loss of life, or national security policy.
Engineering Doctorate
Page 26
Bridging the Air Gap: An Information Assurance Perspective
Security Issues
System Security non-compliance
Security hinders operation
Agile operations, working flexibility, collaboration and
mobility provide opportunities but increased risks and
exposure with little understanding of Assurance and Risk
Management.
Communication channel are
diverse, their security products
are obsolete.
The main problems across new media channels and devices
include data leakage, archive failures, spam, malware and
policy non-compliance.
Inter-enterprise collaboration is
not working because of security
barriers
The need for greater collaboration is a top business,
government and defence priority, interoperability is
restricted by security domain architectures.
Poor Security Maintenance and
Policies are not enforced
Many enterprises rely on unsupported tools to conduct
business and there is increasing user inability to find
expertise to solve issues.
Incomplete or immature
protection services and security
mechanisms
Organizations generally rely on stovepipe solutions that
monitor one or two information channels whilst their
communication strategies use multiple media channels.
External threats are perceived to
be the greatest impact on business
Business impact and consequential continuity planning is
more exposed to system vulnerabilities, insider user faults
and social engineering. Most systems are intolerant to
intruders and malicious users.
Data protection is a legal
compliance issue.
A Enterprise security focus has been on protecting
organizations against malicious and inappropriate content
rather than data protection
Table 1: Security issues and non-compliance
In spite of these potential problems with commercial systems, their advantages—rapid
deployment of state-of-the-art technology, consequent higher performance and far
lower cost (higher volume cost reductions)—make them extremely attractive. Thus,
over the past decade, Defence Acquisition Reform has been focused on developing
processes to achieve both the high-performance and low-cost benefits that come from
using commercial technology while still assuming the necessary mission objectives of
high reliability, rugged environmental capability, and particularly security through
compliance and accreditation.
Engineering Doctorate
Page 27
Bridging the Air Gap: An Information Assurance Perspective
The challenge for the transformed, assured military is to use information technologies
to build a highly adaptive, high performance, and interoperable system infrastructure
that is resilient, degrades slowly under attack, and reconstitutes itself in a secure mode
while under attack. To accomplish this challenge, this transformed military needs a
better understanding of the life cycle vulnerabilities of information technologies. At the
same time, as strategies for defence in the post-modern era are developed,
consideration must be given to changing warfare system requirements to meet
changing enemy threat scenarios so we understand how new threats affect system
designs and vulnerabilities. As communication channels multiply, organizations are still
relying on the same old methodologies and stovepipe solutions to secure
communications. The resulting in either stymied mobility and collaboration or insecure
communication, neither of which is acceptable to the MoD. Enterprises wanting to
increase collaboration but keep Information content under control have had to take a
step back to address a wider communication challenge: these organizations need to
continue confronting the imminent CDS problems and ensure that today’s security
technology choices don’t complicate the assurance of tomorrow’s communications.
Making decisions based on the information to hand has been a matter of professional
judgement. Are the sources known, is the information believed to be accurate and
dependable, is it timely or dated, is it complete and do we trust it? The elements of
Fear, Uncertainty and Doubt (FUD) will manifest unless we do something about it!
Information Assurance (IA) is both a Science and an Art of removing the FUD contagion
by managing the risks and providing a high degree of trust.
An important issue was to remove the desire to analyse the content and usage of
classified material in the operational theatre, to accept that there is a clear and present
need to bridge the air gaps. This restricted the research qualitative rather than
quantitative analysis of sensitive aspects of information management and exploitation
in the military environment. By not dwelling on topical, actual but highly sensitive
problems, has limited the research to generalist issues and the overall problems for
cross domain solutions, the directed research was to more contextual modelling
(Strang & Linnhoff-Popien, 2004; Bettini, et al., 2010) than construction of a final
engineered system or product. Researching Communication and Information Systems
has moved away from technological to managerial and organizational issues through
qualitative research methodologies (Kaplan & Maxwell, 1994; Kaplan, Truex, Wastell,
Wood-Harper, & DeGross, 2004). The interpretive perspective and quantitative method
provides context-dependent research into the holistic problems of Information
Assurance and Bridging the Air Gap.
Engineering Doctorate
Page 28
Bridging the Air Gap: An Information Assurance Perspective
The Need to Know Principle
The protection and security of Data, Information and Knowledge across the Internet, its
services and multiple domains, telecommunication networks, inter-connecting
corporate and government intra-networks, institutional networks, social networks and
military communication and information systems has been examined, reviewed,
articulated, sponsored and exploited by many different scholars, strategists, military
doctrines, business analysts and security practitioners. Long before 1911 the security
principle of “The Need to Know” was a key component to keeping secrets, secret and
those in “The Know” perceived to have gained more power, emotional Contempt
(Ekman, 1999) over those that were not (Hollander & Offerman, 1990).
The
introduction of the UK’s Official Secrets Act, 1911 was a legal mechanism that
reinforced morals of trust and loyalty through secrecy (Williams D. G., 1969). The
principle component of this legislation was the moral promise (honour and trust) from
employees not to divulge information or intelligence without express permission from
appropriate authorities (Frank & Eisen, 1982). The moral authority (Haidt & Joseph,
2007) underpins the principle of the “Need to Know” in military and intelligence
operations. This principle is pivotal on the idea that military personnel are only told
what is necessary, what they need to know and thereby what level of trust (Lewicki &
Wiethof, 2006a) was bestowed upon them to carry out their task. If they are
subsequently captured or for some reason (the fear to) betray the operation, they are
unable to divulge any other operational orders or secrets; willingly or unwillingly.
Essentially, Nations, Governments, Departments and Operations need to keep its
secrets, secret and are emotionally in fear of having these secrets exposed (Liebeskind,
1997; Schneier B. , 2000; Colwill, 2010).
Security of Information was proscribed by many policies and articulated by
McCumber’s Cube (McCumber, 1991; Price S. M., 2008) and the net-centricity of
Information Operations has focused early Assurance doctrines on Computer Network
Defence (Rathmell, 2003), physical security devices and technologies, policies,
procedures, access control and people vetting to provide protection to the data and
information flows (Alberts, Garstka, & Stein, 1999; DoD JP 3-13, 2006; MoD, 2006).
However, the Cross-Domain requirements of coalition decision-making and other
communities of interest imposes directives for the assurance of Information System
Interoperability as well as providing dependable and safe Knowledge Transfer
Operations across these numerous systems to create a shared situational awareness
(the Need to Share) and resilient and secure Information Exploitation. IA has become a
Engineering Doctorate
Page 29
Bridging the Air Gap: An Information Assurance Perspective
strategic issue to the modern enterprise, with purpose and capabilities, defining
assured environment and cultural awareness as illustrated in Figure 7.
Figure 7: Strategic Asset of Assurance to the Enterprise (Borland, 2008)
This enterprise focus of Information Assurance had many declaring it a State of Mind
(Boyce & Jennings, 2002; Stahl, 2005; Borland, 2008) to achieve business values
through Enterprise Architecture and conceptual view of security towards net-centricity
and increasing complexities of communication networking. IA Architecture (IA2) has
predominantly developed the security domains of Confidentiality, Integrity,
Availability, Non-Reputation, Access Control and Authentication (Willett, 2008) and
was promulgated without much research in linking IA (and its benefits) with human
psychology, education and situational awareness. The Umbrella of Secrecy has help
many military operations to succeed, however in a time of instant communications,
surveillance, computational analysis and image processing, military activities are often
observed and evaluated by opposing forces performing appropriate countermeasures,
very quickly. Being aware of this rapid transforming environment, the shared
situational awareness of what’s going on, and who is performing what task and what
agile responses are being played out, the modern field commanders in the Command,
Control, Communications, Computing, Intelligence and Information (C4II) Battlespace
has become reliant on accurate and timely information, he needs to know!
Engineering Doctorate
Page 30
Bridging the Air Gap: An Information Assurance Perspective
Figure 8: Human Centricity of Information Assurance
This raises the question of identifying and qualifying who needs to know. Furthermore
who needs to know what? Conversely, how does a user in need of information “Know
whom to ask”? These questions become a complex issue when you have millions of
isolated data storages to single systems, and potentially millions of systems
interconnected and having to become interoperable. The importance of being able to
discover, knowing who to ask for what and rationalise the appropriate information
could be resolved by semantic tagging or indexing the data structures (Allemang,
2010). However, are these techniques available across the whole interconnected
domains? What motivates the interest of communities to move towards information
sharing is the desire to improve the decision making process and achieving a shared
situational awareness, ensuring all members of the community are aware of the
enterprise content that has otherwise been trapped by official denial, power politics,
isolation and Air Gaps!. This new direction, as outlined and argued within this thesis,
will fundamentally change assurance architecture doctrine and processes away from
network defence and security mechanisms towards human factors and its centricity, as
illustrated in Figure 8, of education, learning and developing cognitive processes and
products that harmonised alignment and interoperability drawn from adaptive
unconscious (Wilson T. D., 2002a; Wray, 2011). The research models developed within
this thesis integrate and align components of IA against the layering of cyberspace, the
layers of interoperability and recent understanding of human psychology (expressed
by Ekard and Hiadt) and life-long learning.
Engineering Doctorate
Page 31
Bridging the Air Gap: An Information Assurance Perspective
Environment
The early 21st Century Cyber World is a many-to-many, globally connected; intrinsically
ICT dependent, information rich; culturally diverse, data-to-knowledge transforming
environment (Arquilla & Ronfeldt, 2000; Borg, 2005; Lane, Heus, & Mulcahy, 2008;
Omand, 2010; Obama, 2011). This virtual space of human thoughts interfacing socialtechnical networks, vast data processing, capture, store and forwarding cyber domains
predicates individualistic empowerment that quantum shift paradigms to open new
horizons of statehood; commerce; politics; entertainment and human relationships
(Schmidt, 2008; Powell, 2009; Sommer & Brown, 2011).
Where we are beginning to understand the neural networks and complexities of our
brain we have created a greater network, bridging human minds through virtual planes
(Zohar & Marshall, 1990; Cole, 2005; Krämer, 2008). The geopostion of nations
becomes less important as state boundaries are lost in cyberspace (Fisher, 2001; Exon,
2003; Kücklich, 2009), as we socially engineer new communication paths and
relationships (Jones & Rafaeli, 2000; Ghosh, 2004; Anderson & Rainie, 2010). The
pervasive nature of social-technical internetworking communities (Kolb, 2008) has
generated these new horizons in cyberspace; complexities of connectivity; ubiquitous
communications; the internet of things; the digital divide; cybercrime; Cyberwar; the
realisation of virtualisation and clouds; illusions of reality and new (virtual) freedoms;
innovations, digital creations, quantum computing, subterfuge, conflict, privacy, risk
and trustworthiness. These composite, conflicting, cognitive domains have become our
interconnected, bridged society (Jensen, Danziger, & Venkatesh, 2004; Proctor & Van
Zandt, 2008; BIS, 2009).
The Research Engineering to Bridging the Air Gap is a discovery of where to assure the
critical
infrastructural
social
technology
challenges
of
trust,
trusted
and
trustworthiness of the real and virtual planes of our societies and the Communication
and Information Systems (CIS) we use and in particular establishing a strategic assured
military acceptance to cross domain interoperability, robustness and dependability.
Cyberspace constitutes a pervasive, ubiquitous, survivable domain that is easily
accessible, affordable, exploitative, evolutionary and expansive. It has been defined as:
“The worldwide open IP-enabled network infrastructure for communications, commerce
and government,” (Nain, Donaghy, & Goodman, 2008). With the increased Internet
usage at homes and businesses there were more asymmetric attacks being generated
from malicious users, hackers, script kiddies and criminals (Saydjari, 2004). The US
Engineering Doctorate
Page 32
Bridging the Air Gap: An Information Assurance Perspective
Defense Advanced Research Projects Agency (DARPA) study (Weaver, Paxson,
Staniford, & Cunningham, 2003) categorised in 2003 five worm characteristics
(Propagation carriers and distribution mechanisms; target discovery; code activation;
payload and attacker motivation) and speculated that future worms could facilitate
human surveillance, commercial advantage, the management of distributed malware,
terrorist reconnaissance and the cyber-kinetic manipulation of system parameters to
SCADA and CII.
Modern electronic warfare is changing asymmetrically (Metz, 2000); changing radically
(Richards, 2010); there are revolutions in concepts of running military affairs (Toffler
& Toffler, 1980); an evolution of conducting network centric operations (Arquilla &
Ronfeldt, In Athena's Camp: Preparing for Conflict in the Information Age, 1997;
Alberts, Garstka, & Stein, 1999) doctrines to the conquest of cyberspace (Libicki M. C.,
2007) from Cyberspace to Cyberpower (Kuehl, 2009; Starr, 2009) to the formation of
USCYBERCOM and lately, formal recognition that there are now five domains of
Military, Political and Economic Affairs (Land, Sea, Air, Space and Cyberspace). The
Ministry of Defence’s Network Enabled Capability (MoD, 2006; MoD, 2009) and its
development from the US Netcentric7 models has developed intrinsic and often
complex transnational interdependencies, involving knowledge transfer, human factors
and information interactions across virtual and real planes.
People who have a communication agenda had, before the Internet, communicated
their message via a few media channels: an occasional letter to “The Times Editorial”; a
placard in a televised march; a stump speech in Hyde Park or a radio broadcast. Even
those channels are still prevalent in the UK’s democratic society; there is a considerable
movement to blogs, wikis, online forums, IRC’s and social networks (MySpace,
Facebook and Twitter) which introduce their topics to a larger, more globalised
audience. Now their voice, their thoughts, bias and ideas can have a global impact upon
willing and very receptive readers. This pervasive power of communication is widely
recognised (Orbe, 1998; Estrin, Culler, Pister, & Sukhatme, 2002; Castells, 2009) and
the relative ease of borderless access and anonymity constructs a security dilemma
77
Netcentric refers to the participation to a continuously evolving, complex community of people,
devices. Information and services interconnected by a communications network to optimize resource
management and provide superior information on events and conditions needed to empower decision
makers. Available at: https://www.ncoic.org/home (accessed 12 August 2010).
Engineering Doctorate
Page 33
Bridging the Air Gap: An Information Assurance Perspective
(Borg, 2005)that one person could potentially affect an entire nation’s security via a
cyberspace attack is seen as a Clear and Present Danger (Liang & Xiangsui, 2002; Jain,
2005; Harris, 2008; Marks, 2009). The two Chinese Colonels (Liang & Xiangsui, 2002)
advocated the idea that a less-capable foe can employ asymmetry warfare principles to
take on a military superior opponent. This aligns with Sun Tzu’s view that Stealth,
Deception and Indirect attacks should be used to overcome a stronger opponent in
battle. The US Department of Defense (DoD) Directive8 leverage their net-centric
capabilities with a technical cyberspace framework called the Global Information Grid
(GIG) incorporating an IP-based infrastructure linking sensor, surveillance and
reconnaissance (SSR) systems; Command and Control (C2) systems and weapon
platforms (fire systems) and associated services necessary to achieve Information
Superiority. The DoD vision has six programmes9 to facilitates the Grid with an agile,
robust, interoperable and collaborative command structure where users from
Enterprise, the intelligence sector and the armed forces all share knowledge on a
secure, dependable and global network that enables superior decision-making,
effective operations and network-centric transformation.
Consequently, the US
doctrine and principles of Network-Centric Warfare (NCW) has modified the doctrines
of many military institutions, NATO has adopted NNEC10 and Australia calls it the
Ubiquitous Command and Control (UC2).
NCW offers a military movement towards cohesive operations; where knowledge
transactions, Command & Control (C2) and coalition interoperability provides strategic,
operational and tactical Shared Situation Awareness (SSA) and to the planning,
execution and assessment of the comprehensive Effects Based Approach to Operations
(EBAO) and ultimately to the UK’s National Security. The tempo and increased rate of
change of operations within societies is a significant characteristic of the Global
environment we live and operate in, requiring coalitions, federated collaborative
partnerships and multinational user groups to exploit, contain and manage diverse,
8
Global Information Grid (GIG) Overarching Policy. DoD Directive NUMBER 8100; 19th September
2002.
9
Four programmes (Joint Tactical Radio Systems (JTRS); Transformational Satellite
Communication System (TSAT) deal with communication networks , transportation and delivery of
Data, Information and Knowledge, one with enterprise services and final one with Information
Assurance.
10
NATO Network Enabled Capability; http://www.nato.int/cps/en/natolive/topics_54644.htm
Engineering Doctorate
Page 34
Bridging the Air Gap: An Information Assurance Perspective
geographically dispersed elements of open, loose, closed or classified Government,
Military, Commercial, Criminal Investigation and Community operations. The
globalisation of political, economic, social-cultural, technological, environment and
legal (PESTEL) factors have contributed, manipulated and framed our physical world,
but institutions are finding it increasingly difficult to encompass and capture the
dynamic, evolutionary, chaotic, turbulent domain of cyberspace (Cerf, 2007). Vested
institutional bodies such as the UN; EU; ITU; ETSI; ANSI; police and law enforcement
agencies; intergovernmental policymaking bodies; homeland security and other NGOs
have been focused on outreach, general education and situational awareness although
there are some “also pursuing global collaboration, harmonization of statutory and
regulatory provisions, and the development of incident readiness and response programs”
(Nain, Donaghy, & Goodman, 2008).
Nunes (1995) stated: “Cyberspace no longer strictly refers to the fictional “matrix” in
William Gibson’s novel Neuromancer; it has now entered into common speech on and off
the Internet as shorthand for this conception of computer networks as a cybernetic space.
From a Baudrillardian perspective, this figuration of Internet as a kind of cybernetic
terrain works to undermine the symbolic distance between the metaphoric and the real. It
abandons “the real” for the hyperreal by presenting an increasingly real simulation of a
comprehensive and comprehendible world.” Taking Nunes (1995) to heart; to
understand risk and nature of Cyberspace we need to comprehend its transparency.
More effort is needed to deconstruct, in conjunction, both the Real and Virtual planes of
Cyberspace and its interface to society and individuals (Lessig, 2004). The biomedical
reflection of natural science to cyberspace of bugs, virals, worms, Trojans, biometrics,
agents, neural networking etc. provide physical views to the materiality of the real
world to the virtualisation of cyberspace. The science relates the outlook nature of the
Newtonian world as a veneer of day-to-day existence. Science exposes it as a kind of
mirage as it establishes and describes the various microscopic and macroscopic realms
driven by quantized complex forces. “It may very well be said that information is the
irreducible kernel from which everything else flows, hence the question why nature
appears quantized is simply a consequence of the fact that information itself is quantized
by necessity.” Zeilinger, 2002. Life sciences paint complexity as an outward simplistic
vision of humanity, plants and animals as an evolving, self-generating, self-organising
complex system of neural linking, DNA, cellular development and chemical interactions,
which are helpfully, hidden from our everyday view. The virtual planes of the Internet,
The Global Information Grid and Cyberspace are synonymous to this and its life blood
is the mixture of data, information and knowledge. ”Historically, much of fundamental
Engineering Doctorate
Page 35
Bridging the Air Gap: An Information Assurance Perspective
physics has been concerned with discovering the fundamental particles of nature and the
equations which describe their motions and interactions. It now appears that a different
programme may be equally important: to discover the ways that nature allows, and
prevents, information to be expressed and manipulated, rather than particles to move.”
Steane, 1998.
In effect, these natural science philosophies assert that matter, life, society, cultural
creations and the mind are illusions and that we have built cyberspace as a structured
mirrored reflection, a virtual illusion with its own complexities. Both the real (physical)
and virtual (digital) reality are composed of the same quantized binary bits of
information. As Jeremy Levine (Levine, 2010) stated: “Reality, regardless of its content,
is nothing more than the information it communicates.” It is then not so much what
visual image that we see, the true reality is “below the surface and behind the
communication”, which consists of underlying physical components, such as atoms,
genes, narrative elements and drives, as well as underlying “mechanisms” or rules,
which generate the surface structure of reality that are akin to the protocols, standards
and domains that have been created to implement the Black and White11 (Ones and
Zeroes) of cyberspace.
Sanes (2008) said “When we see only the surface, it is said that we are victims of a kind of
simulation confusion, taken in by false appearances.” He clarifies this falsehood as that of
(1) nature, which trick us because of our limited senses and knowledge; (2) selfdeceptions, the unconscious cover-ups that are described as forms of repression or
defence and (3) cover-ups, deliberately manipulated appearances and outright lies,
such as those attributed to hidden agenda, criminal activities, politics, con artists, and
by creation of deceptive simulations, entertainment and magic. The Information Age
(Toffler & Toffler, 1980) is reliant on interconnected, robust, interoperable systems of
systems, their information infrastructures and connecting communication networks requires
more automation, controlling software applications and cyberspace connectivity to manage
the increasingly complex interdependencies of the information services and the networks that
host them. The very nature of this complexity introduces vulnerabilities and simulation
confusions which inflate with our increasing reliance and dependency.
The GTISC
Professor of Practice, Howard Schmidt (2008) stated: “Our critical infrastructure systems
are fundamentally dependent on the Internet and IP-based technology, and there are
11
The Tao Security is an image of Black “Hatted” Hacker and Cracker manipulators and White
Knight (security practitioners) countermeasures.
Engineering Doctorate
Page 36
Bridging the Air Gap: An Information Assurance Perspective
interdependencies between them that our enemies will seek to exploit. Cyber warfare
completely evens the playing field as developing nations and large nations with a formidable
military presence can both launch equally damaging attacks over the Web.”
The need to maintain domain security is also essential to keep conflicts and intrusions
to a minimum and access to information on a “Need to Know” basis. However, this silo
culture but has become obsolete to the desires of exploitation and interoperability that
frames the 21st century Information Age and its “Need to Share” Culture. In part this
thesis conceptualises, contextualises and examines the necessary and highly influential
and important gap, and the bridge, between these two cultures. This challenging, and
alarming phenomenon of multifaceted risks, insecurities and ignorance needs to be
understood, managed and assured. What is acceptable to certain communities may be
seen as criminal in others, globalisation has created uncertainty (Cerf, 2007; Heller,
2009) where we are beginning to doubt the effectiveness of security and protection of
sensitive, private information assets and where we fear the consequences of being
terrorised, criminally exploited or socially subverted:In Cyberspace there is a contagion of Fear, Uncertainty and Doubt (FUD).
Richardson, C. J. 2011
However, Cyberspace offers a plethora of opportunities to the individuals,
communities, organisations and governments. The ITU (2007) stated that: “there has
been a steady expansion in digital opportunity, both in terms of more widespread access
to basic Information and Communication Technologies (ICTs) and the growth in highspeed access to ICTs, on both fixed line and mobile networks. Ever greater numbers of
people around the world are enjoying access to the benefits ICTs can bring. Already, the
number of people using ICTs around the world has doubled since the WSIS was first
proposed in 1998. By the start of 2008, there will be around three billion mobile phones
and more than one billion fixed lines around the world.” The Internet World Stats (2010)
indicates that “The Internet has reached 29% of the World’s population, some
1,966,514,816 users.” With this increasing online community come associated risks:
some risks are obvious, some intrinsic to the complexities of the environment, some are
natural and some are manufactured to suit a particular intent. Intentional activity to
harm, threaten and exploit vulnerabilities has spurn generations of increasing more
sophisticated cyber-warriors, whether legitimated (government sanctioned military,
intelligence, business, educational, social-cultural), terrorists, hackers, spies or
criminals (EU, 2005). Each has an agenda that might cultivate, educate, deny, subvert,
Engineering Doctorate
Page 37
Bridging the Air Gap: An Information Assurance Perspective
harm or exploit the array of services and assets presented by a cyber-portal (Bynum,
2004; Bishop, Engle, Peiser, Whalen, & Gates, 2008).
“Cybercrime cost the UK economy £27bn a year,” HM Government, 2010
There are many different types of attack vectors and the security threat to the
legitimate users has diverse intent and motivation. Cybercriminals (Schjolberg, 2005;
ITU, 2007 and EU, 2008) are committed attackers upon our information assets, having
a desire, want and wish to inflict damage, loss, modification, subversion, control, power
or other psychological or material reward. They seek to gain advantage, financial
benefit, secrets, political hacktivism12, intellectual property and digital rights by
conducting fraud, identity theft, social engineering and launching increasing devious
and effective malware. Their malware if often self-propagating, reusable, selfdefending, sometimes coordinated, able to use decentralised Command and Control
(C2) and is becoming worryingly more intelligent (Ilachinski, 1997; Alberts & Papp,
2001; DCDC, 2010). These viral and malicious software applications, worms and
Trojans have morphed rootkits, distributed denial of service attacks, Botnets,
Supervisory Control and Data Acquisition (SCADA) specific attack ware (e.g. Stuxnet)
and lately the “Storm” malware. However, the biggest insidious security risk to any
institution is the threat from the “insider”. The concepts and value of trust (Madsen,
1999; Sandhu, 2000; Day, 2004; Weckert, 2005; Goucher, 2009) is essential to society
and in cyberspace it’s the keystone to all activities (OECD, 1986; OECD 2002; Jøsang,
Keser and Dimitrakos, 2005). An environment that is assured by structure, safety,
security, trusted systems and vetted individuals is deemed trustworthy (Alexander,
Kimmel, & Burke, 2007).
Individuals, employees or contractors with valid user profiles, clearances, logins and
passwords operate with frequent, interactivity with the enterprise’s Communication
and Information Systems (CIS) and consequently can initiate the greatest harm and
explicit risk to the security (Confidentiality, Integrity and Availability) and asset of
those systems. As figure 34 illustrates, the implicit risk to any organisation is from
outside Computer Network Attacks (CNA) but there’s greater potential betrayal of a
12
Hacktivism is the fusion of hacking and activism; politics and technology. More specifically,
hacktivism is described as hacking for a political cause.
http://www.thehacktivist.com/whatishacktivism.pdf
Engineering Doctorate
Page 38
Bridging the Air Gap: An Information Assurance Perspective
loyal / trusted insider (denoted by Computer Network Exploitation – CNE); but it is
also the ignorance (denoted by Disclosure, Abuse and Denial, - DAD) and noncompliance of the user community (Lapke & Dhillon, 2005; Colwill, 2010). Failures to
meet security policies, poor awareness, lack of motivation to protect the assets,
laziness, lack of understanding of risk, privacy and sensitivity all contribute and if often
overlooked in many security risk assessments (Furnell & Thomson, 2009).
We need mechanisms, doctrines and policies to support the trustworthiness of our
Information Assets; Providing tested and compliant solutions, vetting, management and
education that help, support and police the user communities, identifying the evolving
threats, analyse and assess, defend, patch, recover, repair and control our operational
cyber domains. Fundamentally, we all need to understand Assurance and take
responsibility of our actions within cyberspace.
It’s a big ask. To understand
cyberspace and the evolving risks needs a national programme of Education, Training
and Awareness, a cultural shift from reliance on others to self-reliance and
accountability. Users need to take ownership (risk manage) and citizens need to
understand that this is a national threat (MoD, 2010).
It is our social nature that we need to gain trust and in doing so we make ourselves
more vulnerable (Nikander, 2001). To trust (Minsky, 2003) people, systems or
processes takes time, however to lose trusts can take just a moment, and any attempt to
regain that lost trust is fraught and inconclusive (Rogers, 1995). Trustworthiness
requires us to assure systems, against CNA, CNE and DAD threats, with their user
community. Information Assurance (IA) brings trustworthiness to the Enterprise; it
allows human trust (Schneider, 1998) to exist in cyberspace and its components and
provides a defence-in-depth (May, et al, 2006) to Information Operations (CNA, CNE)
and Information Insecurity (DAD). It is the key to bridging the communication data
train (Protocols, Transmission and Routing), through the information stack (IO/IX; IA,
IM; IS & IT) to trusting, maintaining and developing the UK’s Defence Information and
Knowledge Infrastructures; DEC CCII13; Enterprise and joint venture Knowledge
Management Transfer (KTM), C4ISTARS14 projects; Information Operations (JDP 3-80,
13
MoD’s DEC(CCII) is tasked to deliver optimised, integrated, timely Command and Battle Management (CBM) and
Global Information Infrastructure (GII) equipment capabilities that meet
UK stakeholder requirements within a
coherent, balanced and cost effective investment programme.
14
Current UK Command, Control, Communications, Computers, Information/Intelligence, Surveillance, Targeting
Acquisition and Reconnaissance (C4ISTAR) programmes are Collaborative System for Air Battlespace Management
Engineering Doctorate
Page 39
Bridging the Air Gap: An Information Assurance Perspective
2007); Electronic Warfare (EW); Computer Network Operations (CNO); The Global
Information Grid (GIG) and Communication Networks capabilities (Rawlinson, 2005
and MODIS, 2009). These various systems are often required to perform seamlessly
across multi-functional, federated, lateral, layered and partitioned Information and
Communication domains. As we interact with systems and they in turn interact with
others networks, the systems of systems become complex with their many interacting
components, hierarchical layers and multi-lateral domains. Professor Jensen describes
these systems as Complex “because it is impossible to reduce the overall behaviour of the
system to a set of properties characterising the individual components. Interaction is able
to produce properties at the collective level that simply are not present when the
components are considered individually,” Moffat, 2003
Essentially, modern military interoperability and system capability (Alberts and Hayes,
2006) requires bridging the domain air gaps of numerous classified systems within and
external to the defence environment. To comprehend, structure, make safe, secure and
ensure trustworthiness of these systems of systems, networks of enterprise
architecture, information infrastructures with their real-time system orientated
processes, applications (SOA) and software serviced engineering (SaaS); their integrity
and dependability requires educated IA practitioners and security architects that can
work in both the Horizontal15 and Vertical16 Domains (Hughes, 2001; Hayat, 2006 and
Anderson, 2009).
(CSABM) and NATO’s Air Command and Control System (NATO ACCS), the Joint Force Air Component HQ (JFACHQ), the
UK’s Tactical Air Control Centre (TACC), the Transportable JAPNMS Facility (TJF) and C4ISTAR capabilities being
developed for the UK Army’s Ground Based Air Defence (GBAD), WATCHKEEPER and Future Rapid Effects System
(FRES).
15
Horizontal Working Security Domain is defined as working between information domains at the same Protective
Marking (JSP 440, V3.8, 2010) but with different need to know criteria, e.g. UK SECRET and NATO SECRET.
16
Vertical Working Security Domain is defined as working between information domains at different Protective
Marking (JSP 440, V3.8, 2010), e.g. UK TOP SECRET and UK SECRET.
Engineering Doctorate
Page 40
Bridging the Air Gap: An Information Assurance Perspective
Capability
The Joint Force will operate in an environment that is increasingly complicated,
uncertain, and dynamic. Employment of asymmetric strategies by potential adversaries
and the proliferation of advanced weapons and information technologies will create
additional stresses on all elements of the force. Future operations will not only require
increasing joint integration, but must also better integrate other federal agencies, state
organizations, and coalition partners.
The current state of human and technical
connectivity and interoperability of the Joint Force, and the ability of the Joint Force to
exploit that connectivity and interoperability, are inadequate to achieve the levels of
operational effectiveness and efficiency necessary for success in the emerging operational
environment. Net-Centric Environment Joint Functional Concept (2005).
The Joint Functional Concept describes the Net-centric capabilities and attributes of the
US Military and Intelligence Communities through a model consisting of three areas:
a) The Technical Area (physical aspects such as infrastructure, network connectivity,
and environment).
b) The Information Area (the environment where information is created,
manipulated, and shared); and
c) The Knowledge Area (cognitive and social interaction capabilities and attributes
required to effectively function in the Net-Centric Environment);
The Net-Centric Environment Joint Functional Concept (NCE JFC) model was developed
to examine several important elements of the functional concept and their interrelations. Appropriate and accurate Information Sharing is created by the NCE JFC
through its Knowledge and Technical networking and coupled to the collection force
sensors (ISTARS) provides unit and shared situational awareness.
General Keith
Alexander, the head of DoD’s Cyber Command said “Defense needs a common sharable,
operating picture across its networks and to enable real-time response…situational
awareness across DOD’s networks is now often based on forensics generated after an
incident has occurred.” The NEC benefit chain (MoD, 2006; MoD, 2009) clearly defines
that better situational awareness (SA), as illustrated in Figure 9, will allow units to
interact, collaborate more effectively and bolster their ability to see and understand in
real time what’s happening across its networks. Moreover, as: “they know more about
what they need to know, where that information is likely to be found, and with what other
Engineering Doctorate
Page 41
Bridging the Air Gap: An Information Assurance Perspective
force elements their capabilities need to combine, and they are interacting and
collaborating in a policy, cultural, and technical environment suitable for that
interaction,” (DoD, 2005).
Figure 9: Network and Information Enabled Situational Awareness
The repeatability of this cyclic process further refines the SA, making a more coherent
view and deeper cognitive understanding. This will further examine in Chapter 6; The
IA Model and in particular modelling the entity relationships between the five Cyber
Layers, three Information States and the eight Assurance Components and their
attributes. The Net-Centric Environment Joint Functional Concept ultimate end state
would be: “Where there are ubiquitous sensor networks, perfect fusion tools, no
restrictions on bandwidth availability and high-resolution, real-time, 3-dimensional
visualization, where any collectable information in any force would be available to any
force element, and virtual collaboration environments would be indistinguishable in
terms of quality from physical “same room” collaborations.” (Alberts D. S., 2002).
“In some respects, sharing information is a leap of faith that the recipient will
treat the information properly, not abusing the implied trust.”
(Crocker, 2007)
The 4th Annual Unified Cross Domain Management Office (UCDMO) Conference, Boston
(2010), theme was “From the Core to the Edge - Information on Demand.” Where Netcentricity of military Cyber network capability and information infrastructures, the
“Core to the Edge” spanned the Strategic, Operational and Tactical purposes of the NEC:
The Global Information Infrastructures (GII), Critical Information Infrastructures (CII),
corporate Defence Information Infrastructures (DII) and the Battlespace Information
Engineering Doctorate
Page 42
Bridging the Air Gap: An Information Assurance Perspective
Infrastructures (BII). The Military cyberspace domain is a networked construct of
robust headquarters’ environments to the less advantaged, distant reaches of our
missions and tactical linkage.
Cross Domain capabilities are vital components in
today’s and tomorrow’s information sharing environments (Bailey, 2010). The NEC is
an environment of linked sensors, a lattice-work of communications and logistic
networks, command and control (C2), intelligence gathering and Fires17 networks gains
dominance.
Within the NEC: “Warfighters can achieve efficiencies in the full spectrum of operations
by sharing information in a common operating environment. This requires unity of effort
across organizational, national, technical and spatial boundaries as necessary,” (Crocker,
2007). Whereas, within the Cross-Domain Solution they are: “To foster seamless
information sharing throughout a diverse user community; across the widest variety of
domains.” (Jamka, 2009).
The UCDMO was initiated by the US DoD CIO and the DNI CIO to develop a roadmap for
the community and facilitate the development of a Cross Domain vision that includes all
the stakeholders and their stated mission. The Cross-Domain (CD) Community goals
are:
Ensure secure, robust and flexible CD capabilities are available and extensible
to share information among a wide range of mission partners;
Ensure that CD technological developments are timely, responsive and aligned
with transformational initiatives;
Ensure CD investments fill capability gaps, minimize redundant activities,
increase efficiency and support the timely migration to the CD Baseline.
In the US Joint Publication 3-09, Doctrine for Joint Fire Support, joint fires are “fires produced
during the employment of forces from two or more components in coordinated action toward a
common objective.” The military distinguishes between operational and tactical fires: (a) Operational
fires are lethal and non-lethal weapon effects that influence enemy operational forces, critical
functions, and key facilities to accomplish operational objectives in support of either an operation or a
campaign and (b) Tactical fires are lethal or non-lethal weapons effects that achieve tactical objectives
in direct support of a major operation.
17
Engineering Doctorate
Page 43
Bridging the Air Gap: An Information Assurance Perspective
Figure 10: GIG Incremental phased approach for the Information Assurance Component
The evolving, evolutionary nature of Cyberspace, its social-technical development to an
increasing function orientated user groups has driven military net-centricity and the
importance of information (its acquisition, protection, communication and persuasion).
The centrality of Information Operations, articulated by US Joint Force doctrine (DoD,
2000) declared it was the US Military’s goal to achieve dominance in the Information
domain – Cyberspace. The “Need to Know” Security Domain18 (Hughes, 2002; Farroha,
Whitfield, & Farroha, 2009) model has to evolve to the “Need to Share” Cross-Domain
Solutions, assuring that information sharing can accommodate real-time information
access and transfer between different communities, partners and security domains
(Kubic, 2009). The spirit of coalition sharing is the ability to give something and to gain
something. CDS long-term strategy is cooperation based on trust enabling reciprocity,
getting along with other communities of interest (Kollock & Smith, 1996; Axelrod,
1997; Abraham, 2005).
18
The Security Domain models provides a means for specifying program state and state
transitions, as well as security-related concepts such as subject, information flow, information
access, and covert channel vulnerabilities. The model supports formalization of a security policy
by providing a framework in which to specify the underlying security properties that represent
that policy.
Engineering Doctorate
Page 44
Bridging the Air Gap: An Information Assurance Perspective
Convergence
“What is inescapably clear, whatever we choose to believe, is that we are altering our
infosphere fundamentally...we are adding a whole new stratum of communication to the
social system. The emerging Third Wave infosphere makes that of the Second Wave era dominated by its mass media, the post office, and the telephone - seem hopelessly
primitive by contrast.
Toffler & Toffler, 1980
The Need to Share information has three fundamental enablers that can be identified as
follows:
1) Protocol Definition: specifying who can access what information under
which conditions and across what boundaries.
2) Protocol Enforcement: ensuring that information dissemination
conforms to an agreed IA policy.
3) Protocol Tolerance: ensuring that IA protocols are fault tolerant to the
5 IA pillars, Information Security, Information Dependability, Risk
Management, Trust and System Resilience
The State of Art of Information falls into a number of components, a strategic
positioning of IA, an operational role of IA and how IA can impact on the Enterprise in
both its processes and it ability to create a new culture of trustworthiness. This will be
investigated in Chapter 3. Moreover and in part Information Assurance can be seen as
an enabler to create organisation change through architecture, policies and education;
to better risk manage that change and its on-going operations with skilled practitioners
and to create two major paradigms, that of survivability (resilience, dependability and
safety) and Cross-Domain Solutions (Security, Protection and Trust Management). For
Critical Information Infrastructures there has become a greater need for resilient
systems, that are both fault and intruder tolerate, dependable, useable and safe for the
operations and its operators. The Cross Domain Solution provides access control;
information availability and authority to pull Information from one security domain to
another will require Transactional Information Protocols that are derived from a
combination of factors including mission, nationality, permissions, vetting and the
operational situation. Information systems that support the UK’s Network Enabled
Capability provide many differing varieties of intrinsic and often complex, interactions,
transactions and dependencies. Information is one of the most important assets of our
business but do we really comprehend this? Without the timely and effective use of
information our decisions become jaded, inappropriate or suspect. We need our
information to be accurate, trusted and not compromised, lost, leaked, disseminated,
Engineering Doctorate
Page 45
Bridging the Air Gap: An Information Assurance Perspective
unauthorised publication or corrupted. The NEC doctrine of Information Superiority
predicates the need for information security and its assurance, but little has been done
to finance a national strategy to bring the skilled individuals (we need) into this new
marketplace. How often is it heard in conversations what was perceived as a solution
has been discarded because of security, or the lack of it? Or that security has imposed
unacceptable additional costs to projects.
Security is deemed to be difficult, intrusive and a necessary evil to protect our
information, our assets, from the social engineered, hacked, virus invested, virtual
world of cyberspace. There is a culture that doesn’t want to understand security; it’s
too complex; they have no appetite for it, they see it as a horrible medicine to be
administered. Often question its values and see no apparent return of investment.
Fundamentally, security is a compromise to influences, power and agenda and may be
not fit for purpose (one compromise too many). Corporate executives have seen
security professional who don’t improve the situation as they further complicate or
cause a degree of disbelieve when they present doomsday scenarios or forecast future
major failings. Then there is a proliferation of guidance, policies and security
technologies to understand; the issues of management, architecture, assurance and
exploitation; and very little recognition of the skills, knowledge and education that is
needed to communicate comprehend and provide necessary assurances. The “Need to
Share” is the first of many bridges (Richardson C. J., 2008) that this Thesis will argue
towards creating a more holistic understandable and interoperable cyberspace that has
its infospheres19, infrastructures. Networks and Operations assured. Building IA
bridges across capability gaps in Corporate Strategies, their Information Process and
Storage, Communication internetworking and providing a framework to create well
educated professionals are all considered to support and develop this new IA science
well into the 21st Century.
Building the Bridges across the Capability and Educational Gaps in our knowledge and
understanding of Information Assurance and its effectiveness to help solve the complex
19
R.Z. Sheppard (1971), ”Rock Candy”, Time Magazine first introduced the notion of
“Infosphere” as he described: “In much the way that fish cannot conceptualize water or birds the
air, man barely understands his infosphere, that encircling layer of electronic and typographical
smog composed of clichés from journalism, entertainment, advertising and government.”
Engineering Doctorate
Page 46
Bridging the Air Gap: An Information Assurance Perspective
problems of (a) cross-domain security; (b) trusted system interoperability; (c) system
survivability and tolerance to faults and intrusion; (d) providing for a better skilled
based practitioners and educated cyber warriors; (e) develops the contextual and
conceptual science of IA, its architecture (IA2) and doctrine; and (f) it accomplishes the
aforementioned by creating 5 key IA models which are:
1) Composite Model of Interoperability (Figure 21, p74)
This 3-Dimensional model provides the alignment to harmonise business
processes
within
the
organisation’s
social-technical
(Enterprise)
architecture to the technical-organisational layers of interoperability.
2) The Assured Cyber Defence Architecture (Figure 40, p119)
This provides a coherent overview of IA Architecture as a methodology to
provide Cyber Network Defence and a platform for Shared Situational
Awareness and Superior Decision Making.
3) The Information Functional Concept Model (Figure 47, p133 )
The I-Stack Model provides a contextual overview of the Information flows
from the Data Layer to the Knowledge Layer demonstrating the HumanComputer interactive components of Information Exploitation and
Information Operations.
4) The Information Assurance Cuboid Model (Figure 52, p153)
5) The thesis has structured 8-Dimensions of Information Assurance and these
are mapped against the flow of information (Process, Storage and Transit)
and the military’s layers of Cyberspace (Geographical, Physical, Logical,
Persona and Cyber Persona).
6) The IA Skills Framework (Figure , p211)
The skills framework was derived from the UK’s National Information
Assurance Strategy (Cabinet Office, 2007) to develop the IA profession. It is
now incorporated in HMG’s Information Assurance Competency
Framework and been developed for the National Occupational Standard for
Information
Engineering Doctorate
Page 47
Bridging the Air Gap: An Information Assurance Perspective
CHAPTER 2:
The Assured Position of Information
The risks from Cyberspace (including the internet, wider telecommunications networks
and computer systems) have been identified in the National Security Risk Assessment as a
Tier One risk. This means that they are judged to be one of the highest priorities for UK
national security over the next five years, taking into accounts both likelihood and impact.
HMG Fact Sheet 18: Cyber Security, 2011
’I’m not convinced that lack of encryption is the primary problem [of vulnerability to
network attack]. The problem with the Internet is that it’s meant for communication
among non-friends.
Whitfield Diffie, 2010
Bridging the Air Gap20 (Bobbitt, 2000; Hurley, 2001; Morabito & Gatchel, 2001; Schou,
Kuehl, & Armistead, 2005; Richardson, 2007) encompass social-technical (Enterprise),
professional and Educational competencies and capabilities within the organisation
and their system (of systems) interconnection to other organisations. Bridging the
20
In Computer Network Operations the air gap is defined as a type of security where the
network infrastructure (domain) is physically secured by keeping it separate and isolated from
other domains and the Internet. While this provides security, it also electronically limits access
and interoperability of networks (and VPNs) by authorised users and coalition partners.
Engineering Doctorate
Page 48
Bridging the Air Gap: An Information Assurance Perspective
Domain Gap (linking one secure domain to another) is of operational necessity for
system interoperability (the Cross-Domain Solution)as is the Bridging the
Competencies Gap within the Information Assurance profession (Richardson, 2008);
they are, and have, both military (MoD, 2009) and national requirements (Cabinet
Office, 2007). There is a great political urgency as well as military and cultural need for
assured Cyber Situational Awareness21 and the contextual understanding (and
individual awareness) of the intrinsic properties of cyberspace (Barbatsis and Fegan,
1999). An important requirement for modern (and in particular military) information
infrastructures is meeting its definition as "a shared, evolving, open, standardized, and
heterogeneous installed base" (Hanseth, 2002) that allows for the interoperability of
classified domains and robust connectivity to other coalition partner’s information
domains. This need to share information across differently configured, classified and
owned networks is defining the new cyber landscape and creating a plethora of
security and data ownership problems.
The Defense Information Infrastructure (DII)” is a shared or interconnected system of
computers, communications, data applications, security, people, training, and other
support structures serving Department of Defense (DOD) local, national, and worldwide
information needs. The defense information infrastructure connects DOD mission support,
command and control, and intelligence computers through voice, telecommunications,
imagery, video, and multimedia services. It provides information processing and services
to subscribers over the Defense Information Systems Network and includes command and
control, tactical, intelligence, and commercial communications systems used to transmit
DOD information,” U.S. Department of Defense, Joint Doctrine Division, 2010. The
military development of Information Infrastructures within its own cyber environment
has created many security anomalies, accreditation and compliance problems. The
complexity and often insular nature of the military Information Domain has been
exacerbated by the need to keep the confidentiality and integrity of information within
many different layers of classifications and reader sensitivities, within the military
organisation, across departments and ministries and to coalition partners, NGOs and
corporate entities. Keeping our secrets, secret has been the watch words of military
21
Situational Awareness is the field of study concerned with perception of the surroundings and
derivative implications critical to decision makers in complex, dynamic areas such as military
command and security.
Engineering Doctorate
Page 49
Bridging the Air Gap: An Information Assurance Perspective
information security, but the need to share our classified information assets have now
become an operational necessity. The Information Domain is a three-part concept for
information sharing, independent of, and across information systems and security
domains that:
1) identifies information sharing participants as individual members,
2) contains shared information objects, and
3) provides a security policy that identifies the roles and privileges of the members
and the protections required for the information objects.
CNSS Instruction No. 4009, 2010
CNSS 4009 (3) generates the security need for the integrity of the data structures,
dependability & safety of the information and resilience of the systems & services that
support the Information flow; equally these interconnecting domains need to be risk
managed, secure, protected and above all, trusted.
Figure 11: The layers of Cyberspace (US PAM 525-7-8, 2010)
The Social Persona Layers couples human computer interfaces, virtual information
infrastructures and virtualised operating environments across multiple security
domains. In this human engineered cyber world we have an evolving, expanding and
emergent collaborative social-technical and pervasive world of the virtual and real
space. Wherein the virtual world we witness avatars representing us, software agents
conducting our business, digital signatures authenticating our digital work and
digitised imaginary distorting or obfuscating the persona (Powell, 2009).
Engineering Doctorate
Page 50
Bridging the Air Gap: An Information Assurance Perspective
2.1 The Cyber Landscape: Understanding the
Need to Share
The knowledge society requires people who can reach good decisions, cope with new
environments and spot new rules—human and physical—as the world changes.
Sir Douglas Hague, Beyond Universities: A New Republic of the Intellect, 1991
Figure 12: DARPA’s National Cyber Range (Shatchman, 2010)
Composite layered models will allow for future research in determining the utilisation
of ethics, standards, governance, policies, procedures and human behaviour across the
9 layers of interoperability. This represents a new approach to understanding the
interdependencies of identified attributes, Enterprise Architecture; Skills transfer and
Information Assurance. Furthermore investigating the 378 composite model’s cuboids
will create a new area of research utilising cyber ranges and synthetic system
experimentation. Chapter 1 introduced the “need to share” information and the CNSS
Instruction 4009 (2010) has defined and reinforces these requirements These
Information Domain elements requires data and networks structures, in-turn these
provide the Information Infrastructure (defined by Pironti, 2006) as “all of the people,
processes, procedures, tools, facilities, and technology which supports the creation, use,
transport, storage, and destruction of information” that has become integral to the
DoD’s Joint Doctrine (DoD, 2010).
Engineering Doctorate
Page 51
Bridging the Air Gap: An Information Assurance Perspective
The data networks viva intranets, ad-hoc networks, C2, C4I, ISTARS and SCADA
networks have become an organizational form for structuring human activities
supported by Information and Communication Technologies and manifestly by the
Internet - a communication pathway for non-friendly activities” (Diffie, 2010). System
capabilities such as IRC (Text Chat), interactive white-boarding, IP Voice, IP Video
Teleconferencing (VTC) and instant messaging have rapidly become popular in
Information Operations and have proven themselves invaluable to the military;
disaster relief agencies and critical infrastructure real-time C2 activities. The use of
these technologies goes beyond their original context of social networks (MySpace,
Facebook, MSN Live Messenger, etc.) that are associated with online collaboration
(Eovito, 2005). The emergence of social networking technologies and the evolution of
digital games have helped shape the new ways in which people are communicating,
collaborating, operating, and forming social constructs. In fact, recent research is
showing us that these technologies are shaping the way we think, work, and live
(Klopfer, Osterweil, Groff, & Haas, 2009).
Figure 13: Sailing the Cyber Sea (Stavridis & Parker, 2012)
Figure 13 illustrates a military cyber operations room and the rapid evolution and
deployment of Cyber Chat in operations across Defence Information Infrastructures.
The US Navy's 5th Fleet experienced the rapid deployment of Cyber Chat during
Operation “Iraqi Freedom” (2003) and the subsequent Operation “Enduring Freedom” in
Afghanistan where it became extensively used to support of the Navy’s interactivity
with military intelligence and supporting agencies. Initially, the US 5th Fleet began
Operation Iraqi Freedom with only one chat server, averaging 300 concurrent users. As
Engineering Doctorate
Page 52
Bridging the Air Gap: An Information Assurance Perspective
the operation intensified, they installed a second server, averaging now 800 concurrent
users and later implementing a total of four servers supporting over 2500 concurrent
users and they were not unique in evolving, exploiting and expanding its adaptation to
Military Cyber Operations (Armistead, 2004; Kuehl, 2009; Bieniek, 2011).
Whilst this synchronous, real-time uplift in ICT capability was essential, its rapid
proliferation across the navy became problematical; coalition partners’ Computer
Network Operations (CNO) found that they could not interoperate with the 5th Fleet
chat as they (5th fleet) were using the classified Secret US Only - Secure Internet
Protocol Routed Network (SIPRNet). Furthermore, in Operation Enduring Freedom a
dedicated coalition cross-domain chat solution was provided but many US personnel
found “Coalition Chat” distracting or inefficient as they had to collaborate twice; once
on SIPRNet and then a second time on the coalition CNO. Consequently, accessibility
and the interoperability problems were further compounded with multiple coalition
CNOs and other US CNOs trying to deliver the theatre Cyber Situational Awareness to
operational commanders with stove-piped solutions (Thomas, 2009a).
Engineers, scientists and scholars have addressed the contexts and entropy of
computer network operations, the creation of network of networks in a variety of
fields, including sociology, informatics, economics, local and national government,
criminology and international security and derived many theories around Information
(Shannon, 1948; Cover & Thomas, 2006; Gleick, 2011). Some recent academic research
is currently investigating and examining the similarities, differences, and connections
between network forms of organization across different academic disciplines
developing a new topology of inter-group networks and improvements to our
understanding of how human behaviour is coordinated through networks (Hejnova,
2010). Furthermore, these network concepts are now underpinned by Enterprise
Architecture and system of systems engineering (Yeung, 2002; Laudon & Laudon,
2007; Levine J. , 2010). To provide assurance to these systems requires a detailed look
at the complexities and theories that now surround Systems and Informatics.
Conceptually, the structure of the Information Domain is now a combination of (a) the
creation, communication, transference, storage and deletion of data and (b) the
cognitive use and understanding of knowledge and experience, it transference,
storage and production of shared situational awareness (McNeal, 2004).
Within the Information Domain we can identify three important components,
Information Operations, Information Exploitation and Information Storage. These
Engineering Doctorate
Page 53
Bridging the Air Gap: An Information Assurance Perspective
provide knowledge transfer and intelligent use of information to create the shared
situational awareness for commanders and decision-makers. The Assurance of these
components provides the trustworthiness of the flow of information, the security of the
service provision and the protection of the supporting systems (of systems) as
illustrated in figure 14.
Figure 14: Assurance of Information Operations (Richardson C. J., 2008b)
The intelligence, cognitive and knowledge transfer of this model is expanded, with
further details, in Chapter 5 which includes some more essential components of the
Information Stack (the I-Stack Model); the flow of information from the data terminals
to the Human-Computer Interfaces (HCI); Knowledge Transfer (KT) and the creation of
shared awareness. The tier relationship that bridges Assurance, Security and
Protection within the Information Domain has become a pervasive process in which we
now need to understand the influences each layer affect each other and what their
combined effects on business processes and operations are. This causative relationship
is further developed (and exploited) with the Information Assurance Model (see
chapter 6), as well as part of the computer network operations component of
Netcentric system as illustrated in Figure 15. Here, the Information Domain is a virtual,
non-physical domain that transverses the other 5 military operation domains (Land,
Sea, Air, Space and Cyber) and this concept separates it from the convention of
analysing it as just a Cyber Domain (McNeal, 2004; Metz, Garrett, & Hutton, 2006; Halle,
2009).
Engineering Doctorate
Page 54
Bridging the Air Gap: An Information Assurance Perspective
Information Operations
Information Operations have five core capabilities: (i) Psychological Operations, (ii)
Military Deception, (iii) Operational Security, (iv) Electronic Warfare and (v) Computer
Network Operations (MoD, 2010c). This thesis examines both Operational Security and
a further four principle components of Computer Network Operations: Computer
Network Attack (CNA); Computer Network Exploitation (CNE), Computer Network
Defence (CND) and Computer Network Management (CNM).
Cyberspace
IX
CNA
CNO
CNM
Enterprise
Information
Infrastructures
IM
CNE
Information
CND
Architecture
Assurance
Legend
CNO – Computer Network Operations
IX
Information Exploitation
IM
Information Management
CNA
Computer Network Attack
CND
Computer Network Defence
CNM
Computer Network Management
CNE
Computer Network Exploitation
Figure 15: Elements of the Information Domain (Richardson C. J., 2009b)
The Enterprise Architecture (DODAF and MODAF) element provides Operational
structures and views to the domain; whilst Cyberspace and Information Infrastructures
elements bridge the physical communication and data structures to the Cognitive space
of
Knowledge
Management
and
Situational
Awareness.
As
information
is
conventionally seen as asset of military power the military community needs to
understand the dynamism of these element interactions, within the information
Engineering Doctorate
Page 55
Bridging the Air Gap: An Information Assurance Perspective
domain. Knowing the impact of their interactions is an important step to creating an
assured domain. How we shape them, couple them; provide appropriate security
metrics that align to the business processes will help provide a more harmonised
assured cross-domain solution.
The “need to share” tactical information among single services, joint forces, coalition
partners, non-government organisation (NGOs) and other agencies is critical to the
providing a safe and successful operation. However, this need to share information is
often odds with the “Need to Hold” where the sensitivity of the Cognitive, Information
and Physical attacks, as illustrated in figure 46, across the Battlespace’s electromagnetic spectrum necessitates accredited heterogeneous channels amongst diverse
groups. These tightly regulated channels presents significant operational security
challenges often restricting business processes and operational expediency. Bridging
the Gaps requires successful negotiation of multilevel, interdependent and sometimes
conflicting agencies, their protocols, policies, accreditation and doctrines as well as the
interagency aims of governments. This is formally recognised by Joint Forces chain
command policies, but often is done more informally between pairs of agencies as
cultural and organisational norms. (Suri, et al., 2008; Feltovich, Bradshaw, & Bunch,
2009).
In 1969, NATO constituted the Committee on the Challenges of Modern Society22
(CCMS), which argued for, and promulgated the introduction of a non-military focus
within the Alliance to address increasing social-technical vulnerabilities from sources
beyond the traditional security framework and this committee has cooperated with the
US
Defence
Advanced
Research
Projects
Agency23
(DARPA)
to
improve
multidisciplinary information sharing, cyber security capabilities, crisis management,
interdependencies among critical infrastructure and technologies (NATO, 2002).
22
The Committee provides a unique forum for the sharing of knowledge and experiences on social,
health and environmental matters both in the civilian and military sectors among NATO and EAPC
Partner countries. The work of the Committee is carried out on a decentralised basis and participation
by nations to the pilot studies, projects, workshops and seminars, which are nationally funded, is
voluntary.
23
The DARPA’s mission is to maintain the technological superiority of the U.S. military and
prevent technological surprise from harming our national security by sponsoring revolutionary,
high-payoff research bridging the gap between fundamental discoveries and their military use.
Engineering Doctorate
Page 56
Bridging the Air Gap: An Information Assurance Perspective
The 9/11 atrocity and the continued increase of the global threat of cyber-terrorism
(NATO, 2007), the Estonia and Georgia cyber conflicts and information warfare has
transformed the military landscape for NATO and its member nations (NATO, 2008).
Their New Strategic Concepts presented at the Lisbon Summit (NATO, 2010) placed
cyber security at the forefront of NATO’s security challenges and created the new
Emerging Security Challenges Division (ESCD) to formulate Cyber Defence Strategies.
Within a year, NATO’s Defence Ministers had agreed the framework Concept on Cyber
Defence (Bieniek, 2011). NATO’s CIS is beginning to transform from “stove-piped” silo
platform-centric to federated network-centric force structures (Price, Beltz, &
McKinnon, 2006).
This transformation has made the reliance of the Information Infrastructures across all
5 domains an operational necessity and a robust cyberspace has become the most
prominent in operational planning (Alberts, Garstka, & Stein, 1999; Hobbins, 2005;
Bieniek, 2011). US Air force (USAF, 2008) demonstrates the IER creation of 3Dimensional Computer Network Operations within the physical confines of Cyberspace
and the Information Superiority platform provision for offensive capabilities of CNA
(Bayles, 2001; Berenger, 2006); and CNE (Armistead, 2004; Krekel, 2009); but also
ensure the CND (USN, 2010; CJCSI, 2011) of friendly decision cycles (Burris, 2010); and
the military usage of Computer Network Management (CNM), as listed in Table 2,
whose management activities include:
Network Management
Capacity Management
Incident Management
Availability Management
Problem Management
Service Level Management
Change Management
Continuity Management
Release Management
Financial Management
Configuration Management
Security Management
Table 2: IO Computer Network Management
The Military gains its Information Superiority in the Information Environment through
the use of Intelligence, Surveillance and Reconnaissance to provide sensory data for the
Joint Operational Picture (JOP). The Information Operations can use Knowledge,
Information and Data (KID) through its Cognitive, Information and Physical (CIP)
dimensions to provide Direct and Indirect attack mechanisms (CNA and CNE), derived
from its Superior Decision Making processes and the NEC benefit chain (Baber, Stanton,
Engineering Doctorate
Page 57
Bridging the Air Gap: An Information Assurance Perspective
Houghton, & Cassia, 2008), to target the opponent’s decision cycle (Alberts, Garstka, &
Stein, 1999; Berenger, 2006; Armistead, 2010).
This projection of Cyber Power
requires the Assured Friendly Information Stack (a defensive posture) to be also able to
project an offence posture in all 3 dimensions (Physical, Information and Cognitive) to
conduct Information Operations (IO) and C2 functions. This model becomes more
complex when the decision loops involves joint force actions across multiple coalition
KID-CIP stacks.
Figure 16: Gaining Information Superiority in the Information Environment (MoD, 2006)
Consider a scenario where the Commander has determined a target and asked for a
FIRES (operational use of munitions) response, the FIRES CNO would SMART-pull
information from Navy, Air or Army forces’ operational management and databases, as
illustrated in Figure 17, where there is a need to gather Knowledge, Information and
Data on such issues as theatre actors, weapon availability, target acquisition, impact
assessment and cost to delivery. In return these forces will need to have target
information, timing and a Shared Situational Awareness to order to provide the best
solution for the offensive action. As the ISTAR Joint Operational Picture generates new
data, all tasked forces will need updates, so these Real-Time processes become TimeSensitive with a need to be agile, reliable and accurate. The different aspects, actions
and actors of the CNO conducting the FIRES are now rarely discrete operations; instead
they interact and impact upon each other, generating a complex mesh of KID-CIP effects
and events, providing support and being supported. As more targets are generated,
Engineering Doctorate
Page 58
Bridging the Air Gap: An Information Assurance Perspective
these operations will manifest the operational tempo and scheduling. Consequently, as
operational resource struggle, complications may ensue within different decision cycles
and their respective Information Operations, deployed assets and actors.
Force A
Force B
Force C
•Navy IO
• Coaltion Force B
•Coalition Force C
•Air IO
•Coalition Force A
•Coalition Force C
•Land IO
•Coalition Force A
•Coalition Force B
Figure 17: Stacking and interconnecting the KID-CIP loops in a Coalition Network
(Richardson, C.J., 2011)
NATO’s Network Enabled Capability (NNEC) architects have expressed the importance
for military Information Exchange Requirements (IER) in the tactical environment
(Tolk, 2001; Mittrick, Richardson, & Kaste, 2008). They recognised that Warfighters
must share information across organisational, system and spatial boundaries to achieve
operational goals as illustrated in Figure 50. NNEC derives Battlespace Information
from critical and highly classified Intelligence, Surveillance, Target Acquisition, and
Reconnaissance (ISTAR) systems which are often desperate sourced, macroscopically
linking several multi-national battlefield functions together from reconnaissance
missions (Aircraft sorties, UAVs, Special Forces, etc.); unmanned sensors (Remote
CCTV, Spy Satellites, Electronic Surveillance Devices, etc.); human intelligence
networks; the Internet and the Global Positioning System (Tolk, 2003; Dorion & BouryBrisset, 2005; Tolk & Kunde, 2010).
IER Interoperability is the key attribute for coalition operations, it is not just the
physical connectivity between military forces and it’s their ability to share information,
it’s the harmonised contribution to a common operational picture, and building up of
shared situational awareness in order to collaborate and produce effective missions
(Alberts & Hayes, 2006; Suzić & Yi, 2008).
Engineering Doctorate
Page 59
Bridging the Air Gap: An Information Assurance Perspective
Figure 18: Unmanned Aircraft Systems Control Segment Architecture (DoD, 2010)
This agility (robustness, resilience, responsiveness, flexibility, innovation, and
adaptation) is the fundamental component of network centricity and the military
adoption and development of cyberspace. However the very nature of an assured, agile,
responsive ICT has become the security dilemma. The multiple, rich, multi-user, multinational orientated Cognitive, Information and Physical dimensions needs to be
protected in near real-time for military Intelligence and Information Operations. This
time-sensitive, assured cyber environment can be geographically dispersed as a
virtually spatial distributed environment which must also allow the transference of
routine and classified data in certain, if not most situations.
The military information exchange process is a prime example of the need to exchange
technical information which can be “sensitive but perishable cross the boundaries”
between various domains, e.g. the mission timetable would be highly sensitive until the
operation delivers (Army Research Laboratory, 2009). Ideally the message exchanges
should be automated such that the messages objects files can flow securely cross
boundaries with minimal human intervention; however is important that the
Information Exchange supports an appropriate degree of human oversight and
intervention. The sharing of Blue Force (Friendly Coalition Forces) tracking data (this
information concerns location nature and movement of friendly forces) requires an IER
system to precisely identify and tag the type of perishable tactical data that needs to be
shared among multiple cooperating organisation such as US forces; UK forces; NGOs,
Engineering Doctorate
Page 60
Bridging the Air Gap: An Information Assurance Perspective
local police, Intelligence communities, enforcement agencies and emergency response
units. The known location of friendly forces and non-combatants is critical to avoiding
potential fratricide situations and minimising civilian casualties, thus all participating
nations are therefore motivated to share such tracking information and are dependent
upon its integrity.
Assuring Information Superiority
Increasingly, military decision makers have to rely on information provided by
other actors within a highly dynamic and distributed Battlespace,”
(Keller, Carrigan, Atkinson, Clarkson, & Johnson, 2008).
The persistent problem of Blue Force interoperations is that each organisation has
regulations governing the kind of data that may be shared, and services offered, with
other members. Cross-domain information sharing policy requirements and associated
Service Level Agreements (SLAs) can be complex and require rich language (often open
to interpretation) to scope many different aspects of the data sets; its modes and
channels of communications; service provision as well as context in which the data will
be shared. Military organisations are specifically concerned with situations where the
inflexibility of IER contracts and insensitive applications of Information Management
(IM) policies may endanger life: e.g. when special operations group unexpectedly
moves into close proximity of another group; then this normally undisclosed activity
may temporary require disclosure to reduce the risk of friendly fire.
The Strategic Positioning of Security Model (Richardson, 2008) describes the
Assurance of Information Superiority as the exploitive emergence of tolerant, resilient
and trusted Human-Computer inter-exchanging systems and Knowledge Transfer. This
secure flow of Knowledge, Information and Data (KID) across platforms has become a
key component of modern warfare and the military decision cycle. NATO’s Network
Enabled Capability (NNEC) has irrevocably aligned member nations to coalition
interoperability with most activities operating under a single Information Domain
(NATO, 2007a) where they identified the need to develop information assurance in
NNEC CNO and deduce its implications across coalition environments and was required
to improve the accuracy, timeliness as well as both the spatial and temporal coverage of
mission decisions through synergistic employment of sensors, decision makers and
effectors within an assured information network
(McIntyre & Flemming, 2001).
Assuring the Information flow and services provides the platform for military decision
advantage.
Engineering Doctorate
Page 61
Bridging the Air Gap: An Information Assurance Perspective
Rear Admiral Bill Rowley, USN, (1995) wrote that “knowledge is the resource of the
future - land, natural resources, factories and workers are no longer the measure of a
country’s wealth because multinational businesses can easily obtain these things
anywhere in the world. It is the application of knowledge that now offers the competitive
advantage in the world economy. The Knowledge Worker is the true asset because of the
knowledge and abilities he or she possesses. In the twenty-first century at least 35 percent
of the workforce will be knowledge workers. They must have formal education, possess
specific knowledge and skills, have the ability to acquire and apply theoretical and
analytical knowledge, and continue to learn throughout their lives. They will work in
teams because no one person can know enough to do it all. Because they are the true
assets and are highly mobile, companies will work hard to keep them.” (Rowley, 1995).
The Knowledge workers in the US Director of National Intelligence (DNI) 2015 Vision
are clearly those who are mission focussed. The military concepts of Cross Domain
Solutions24 (Kennedy & Soligan, 2010) precipitate an array of Information Assurance
risks: risk of bias and erroneous intelligence, of users’ ability to fuse data and ideas into
operational concepts, or in adequate assessment of alternative interpretations, of faulty
and catastrophic decision-making (Burgoon, George, Adkins, Kruse, Biros, &
Nunamaker, 2007).
24
Wikipedia
describes
Cross-Domain
Solutions (CDS)
as
solutions
for information
assurance that provides the ability to manually or automatically access or transfer between two
or more differing security domains. They are integrated systems of hardware and software that
enable transfer of information among incompatible security domains or levels of classification.
Because modern military, intelligence, and law enforcement operations critically depend on a
timely sharing of information, and because of the cost and forethought required for more
rigorous approaches, CDS are often considered a “necessary evil”. CDS is distinct from the more
rigorous approaches, because it supports transfer that would otherwise be precluded by
established models of computer/network/data security (e.g. Bell-LaPadula and Clark-Wilson).
CDS development, assessment, and deployment are based on risk management. Sharing
information with CDS exposes the sharer to greater risk that his secrets may be unintentionally
revealed. Available at: http://en.wikipedia.org/wiki/Cross_Domain_Solutions (Accessed 20 March
2011).
Engineering Doctorate
Page 62
Bridging the Air Gap: An Information Assurance Perspective
The FUD Contagion
“The U.S. government, if confronted in a cyber-war today, would not come out on
top… If the nation went to war today, in a cyber-war, we would lose. We’re the
most vulnerable. We’re the most connected. We have the most to lose.” US Director
of Intelligence, Mike McConnell to the US Senate Committee, Feb 2010
There are real threats, vulnerabilities and Operational Impact with these risks, as they
will impose, constrain or damage operations (The FUD Contagion) if CDS
implementation is not accompanied by a deeper understanding, training and adopting
new tools (such as those envisaged by the next generation of emergency help services
to mitigate them. This paradigm shift in the nature of the military enterprises from the
“Need to Know” (Security Domain) to the “Need to Share” (Cross-Domain Solutions)
creates OPSEC problems. Increasingly, military and civilian organizations implementing
information
systems
are
discovering
a
greater
need
for
secure,
reliable
interconnections between existing systems than for systems that provide new
capabilities (Vietmeyer, 2004). Recent media articles for command25 options such as
National Cyber-guards, Cyber-militia, Cyber-Police and harking for social Cyberdefence force and more Cyber warriors can be construed as the previous century 3Dmentality and mobilisation that will fail to redress the very real need to control and
provide trust in this multi-lateral, multi-layered, multi-dimensional chaos. This new
space has opened new opportunities to the way we think, communicate, socialise,
emphasise and innovate (ISTAG, 2009). It’s a domain of chaos, complexity and
evolution of technology and exploitative of human desires, wants and needs (greed,
control and power) and where for many users there is Fear, Uncertainty and Doubt
(FUD). The many ways that we choose to interacts with globalize instant responses,
has both tangible and intangible actors who have their own agenda (Dalal, 2006);
where system and infrastructures activities react to our demands (or other controls)
and often vary greatly from individuals, enterprises and governments which makes it
an impossible place to police, legislate or even place and maintain rudimentary
controls. Cyberspace needs to have social trust as an enduring value to the conscious of
all its communities, an assurance that is global and empowered by practitioners and
users (Collins & Mansell, 2003).
The activation on 1 October 2009 of the US Cyber Command (USCYBERCOM) brought
together computer network attack (CNA) and computer network defense (CND) activities of the
US DoD Joint Functional Component Command for Network Warfare (JFCC-NW) and the Joint
Task Force for Global Network Operations (JTF-GNO) under the USCYBERCOM.
25
Engineering Doctorate
Page 63
Bridging the Air Gap: An Information Assurance Perspective
Operational issues through the Cyber operators’ lens have become abstract or process
orientated as: online game scenarios; e-commerce utilities; web paging; torrents, social
networking create their own perceived realities and where they might also find new
and vibrant virtual realities to distract or augment.
The real concepts of war, a
declaration to fight an adversary for political, economic or military supremacy, usually
involving nation states, population participation and the loss of lives, possessions,
prestige, wealth or influence is ingrained in our conscious, but Cyber War doesn’t
invoked the same FUD feeling within the social conscious, its abstraction obscures its
potential devastating effects. The continuing likelihood of inter-state conflict coupled to
the increasingly decline of state social cohesion, through Globalisation, suggests a
posterity of Information Warfare., Cyber hostilities, malicious viral attacks and an
increased global crime wave (Schwartau, 1996a; Boyd C. G., 1999; Anderson K. , 2005;
Kierkegaard, 2005; Knapp, 2009). Globally, many people don’t realise the true extent of
the controls that these virtual (soft) systems have over their lives or the near-future
repercussions of these virtual systems that generates and stores vast quantities of data
per millisecond; the risk impact of freely evolving knowledge transfers and social
networking are engineered to provide empowerment to the individuals who are not
aware of its consequences thereby providing possible manipulation or control by
individuals, corporations or States: gained, whether legally or not! Realisation and data
protection failure becomes media events that expose and sensationalise the impact of
malware to critical information infrastructures and the consequential losses that may
be exploited and cascaded into a society meltdown.
Cyber-attacks are menacing, but it’s the erosion of trust in the digital economy where
the true risk lies and the consistent, advance persistent threats may be generating a
societal backlash to the digital economy. These governmental, corporate and individual
failures further degrade trust and assurance as they focus on intolerances, fear,
uncertainty and doubt. The contagion is ignorance and the strategic objective should be
to inform communities, provide intelligence and shared situational awareness to
combat this ignorance. Experience say this should be expedited, especially by providing
more assurance practitioners; to educate CSA as illustrated in Figure 54 (this is further
developed in Chapter 7). It is essential, to culturally change our approach; to facilitate
enterprise vision and social online responsibilities to assure cyberspace, not to train
cyber warriors to war within it, but make everyone a cyber-citizen who wants to
embrace security for their own privacy (United Nations, 2004; Bauwens, 2005; Obama,
2009a).
Engineering Doctorate
Page 64
Bridging the Air Gap: An Information Assurance Perspective
Weapons of
Mass
Destruction
Failed States
Space
Cyber
Financial
Drugs
Climate
Change
Counter
Intelligence
Rogue States
Energy &
Natural
Resources
Crime
Terrorism
Insurgencies
Rising
Powers
Figure 19: Persistent Threats and Emerging Missions (Richardson, C.J., 2010)
“Over the last 20 years, the Intelligence Community has been challenged to keep pace with rapidly
evolving information technology. Although a less-than-agile acquisition and procurement system
has been part of the problem, the Intelligence Community is also undermined by its basic approach.
If we are to maintain a technology edge, we must adopt an enterprise wide, service-oriented
architecture that is interoperable with systems in other federal departments, and can share
information with non-traditional partners. A service-oriented architecture provides a proven
means to adapt new technologies while responding to changing user needs. By creating “software
as a service,” this architecture reduces system complexity and deployment risks through a shared
development style, uniform standards, and common interfaces. These services will enable a userdefined analytic environment through the use of composite applications – discrete services that can
be pulled from a central library and dropped into a user-defined workspace.” (McConnell, 2008).
Toffler’s (1980) RMA identified how to the conduct military operations in the 21stcentury with interoperable, federated coalition networks that would offer military
commanders unprecedented capacities for rapid, real-time, global exchange of
messages and complex information needed for success in the Battlespace, Information
That commercial off-the-shelf (COTS) based CIS and military deployment of Service-
Engineering Doctorate
Page 65
Bridging the Air Gap: An Information Assurance Perspective
Oriented Architecture (SOA) portends profound changes to CIS Human Computer Interexchange with the sheer volume, complexity and speed of information transmission
and communication diversity (McConnell, 2008). The Exploitation (IX), Information
Superiority and Cyber Situational Awareness (CSA) can be, in turn, exploited and attack
from Enemy CIS platforms from many different attack planes as illustrated by Figure
53. However, the Insider threat and CNE causes the most fear and uncertainty to
military operations (DoD, 2011).
The complex net-centricity of CDS, to provide assurance and negate FUD has created
many emergent properties (Norman & Lucas, 2000) and an unprecedented growth of
interdependent, chaotic flows of data, and ever increasing information and knowledge
transfers across system boundaries which has been described as Information Overload
(Johnson, 2006). This Overload has also permeated a greater lack of understanding of
the unintended, as well as intended capabilities (Fink, 2003; Tullao, 2003; Burris,
2010). Furthermore, Enterprise Integration, Net-Centric Information Enterprise and
Service Orientated Architecture (SOA) have produced enhanced capabilities of newly
adaptive tools and systems which coupled to Cross-Domain Solutions (CDS) pose
considerable opportunities as well as accompanying risk.
CDS is further complicated with Protective Marking of Information and their security
domains. The Bridging of these domains is an important aspect of the KID CrossDomain Solution and the speed and effectiveness of interoperable, dependable CNOs
will greatly contribute to the overall Information Superiority, providing the
commander both freedom of action and force projection. Information Assurance has to
create and maintain safe interoperability; structured dependability and security of its
enterprise architectures at different business impact levels: ensuring trusted
boundaries, accurate and integral information sharing and reliable flows across multilayered boundaries in dynamic multi-tiered, multi-regional coalition network
environments (Phillips, Ting, & Demurjian, 2002). The NNEC Enterprise perspective is
of system of systems engineering that requires comprehensive high level assurance to
system survivability and intrusion tolerance for wireless networks, tactical networks,
ad-hoc networking, network engineering and infrastructure management, as well as
the implications of using commercial-off-the-shelf equipment (NATO, 2007b).
Engineering Doctorate
Page 66
Bridging the Air Gap: An Information Assurance Perspective
2.2 Shared Situational Awareness
“While information assurance and information-based security is a difficult
problem within any given nation or infrastructure, the additional technological,
organizational and cultural dimensions within NATO make implementing NEC
security very complex. Nevertheless, progress toward a unified vision for
implementing a robust and flexible NEC Security solution is imperative” NATO,
2007
The contextual Battlespace domains of military operations are land, sea, air and outer
space;
the
5th
Battlespace
domain,
what
Gibson’s
Neuromancer
(1984)
ichnographically described as Cyberspace has over a very short time created many
new dimensions within it (Schoder, 1999; Jog, 2001; Kramer, Starr, Wentz, & Zimet,
2007), as it fuses, exploits and controls the other 4 Battlespaces (Corum, 2009; van den
Berg, 2010). That we need holistic initiatives to maintain, explore, expand, expose and
control Cyberspace (Alberts D. S., 1997; Armistead, 2004; Alberts & Hayes, 2006;
Libicki M. C., 2007) and its many Information Infrastructures that are prevalent,
evident and necessary to the National Defence (Cabinet Office, 2009b; MoD, 2010). We
also need to define what is Cyberspace and where it differs to the Information Domain,
which is pervasive across all 5 Battlespaces (Halle, 2009; Kuehl, 2009).
“In the twenty-first century, the Internet and other interconnected networks (cyberspace)
have become critical to human wellbeing and the political independence and territorial
integrity of nation states. The danger is that the world has become so interconnected and
the risks and threats so sophisticated and pervasive that they have grown exponentially in
comparison to the ability to counter them. There is now the capability for nation states or
rogue actors to significantly disrupt life and society in all countries; cybercrime and its
offspring, cyber conflict, threatens peaceful existence of mankind and the beneficial use of
cyberspace.” The World Federation of Scientists, 2009.
This century has created many new paradigms of human evolution (Schulur 2004;
Bauwens 2005 and Arquilla, 2008) as our societies migrate from an Industrial Age to
much the herald Information Age (Toffler, 1980); the need to revolutionize our
contextual and conceptual thoughts of society evolution and introducing control of this
virtual space can still be contextually placed on Maslow’s (1943) “Hierarchy of Needs”
as illustrated in Figure 55. People are curious, innovative and self-actualising in
Engineering Doctorate
Page 67
Bridging the Air Gap: An Information Assurance Perspective
cyberspace but now without much linkage to real citizenship of nation states and its
tax26 gathering agencies (Lukas, 2000; WFS, 2009).
Figure 20 Real and Virtual Communities to Maslow’s Hierarchy
26
According to the US Trade Commission the Internet Economy has become the largest industry
in the country who have stated that “The Internet is inherently susceptible to multiple and
discriminatory taxation in a way that commerce conducted in more traditional ways is not. With
approximately 30,000 taxing jurisdictions, compliance becomes a significant obstacle. Double
taxation would be inevitable because the borderless nature of the Internet makes taxation very
tricky.” Address to the ASome Policy Perspectives on the Taxation of Cyberspace, Palo Alto, CA.
November 1999.
Engineering Doctorate
Page 68
Bridging the Air Gap: An Information Assurance Perspective
2.3 Assurance: From Machine to Organisation
Creating an operational picture and shared situational awareness (SSA) of the
progression of the operation takes considerable skill, experience, training and
supportive tools. The engineering of the processes behind a military Information
Operation stems from its initial requirements (IERs) and availability of resources. Field
Commander wants to make firm C2 decisions based on all available facts to achieve
Battlespace Awareness (as tabulated in Table 4).
Command and Control
Battlespace Awareness
The ability to conduct collaborative, planning,
execution, and information sharing among US
civil-military agencies and coalition partners
from the operational to tactical levels.
The ability to achieve a persistent situational
awareness and shared understanding in a joint,
multi-agency, and multinational context in order
to know the operational environment and the
interrelationship among ourselves, our
adversaries, and the local population.
The ability to achieve multi-agency coherency
of action during planning, coordination, and
execution by creating a joint, and combined
when necessary, multiagency planning and
execution organization empowered to facilitate
integrated civil - military operation.
The ability to enhance rapid information
sharing with coalition members, multiagency
players, and non-governmental organizations
through information sharing technologies and
policies.
The ability to use an operational net assessment
to support stability operations and to reflect that
information in the integrated civil-military
common relevant operating picture.
The ability to provide persistent intelligence,
surveillance and reconnaissance that integrates all
intelligence capabilities, including human
intelligence assets, into the overall intelligence,
surveillance, and reconnaissance architecture.
The ability to field a command and control
system with reach back capability and
connectivity to facilitate other agency
participation.
Table 3: Stability Operations – Joint Operating Concept Capability (DoD, 2006)
From a CND perspective the Commander must be able to understand the causation of
his operations (DIME); to perceive the current situation (situation perception) using
his intelligence, recognition, surveillance and reconnaissance capabilities; assess the
impact of any attack and tracking; to predict any future attacks and their possible
vectors; determine the adversary’s behaviour and capabilities; be able to predict
plausible future assaults and be acquainted with the quality and trustworthiness of his
information flow and the ability of his adversary affecting his OODA loops. For the
Commander to achieve Battlespace Awareness he needs perception, comprehension
and projection of his assets, capabilities and vulnerabilities and those of his adversary.
In order to achieve this, he must manage his assets (Devices, Networks, Systems,
Engineering Doctorate
Page 69
Bridging the Air Gap: An Information Assurance Perspective
Software and Services – Machines) and mould his environment (People, Nationality,
Languages and Culture - Organisation). The physical Shared Situational Awareness
(SSA) picture is built up from many differently owned, operated and organised
(Protocols, Transmission and Presentation) sensory data apparatus, signal processing
and interception devices. These ISR system outputs are then synthesised and analysed
using appropriate tools which generate the Geo-Physical picture. Intelligence, previous
knowledge and other resources apply a logical framework to create a real-time picture.
However this interactivity, connectivity and operability of many different types
machines and joint force organisations has a recognised flawed, in that there is still a
gap between human analytical mental models (intuition, experience and lateral
thinking) and the automated capabilities of C8ISR.
Assuring Layers of Interoperability
In particular, the gap created with the interoperability of systems to other systems and
the networking the people and organisations that use them.
These layers of
interoperability expose assurance issues and explain why the interconnection of
physical devices through interface specifications, although an important enabler of
system of systems engineering hasn’t resolved the social-technical processes and
assurance components related to military operations where IO usage of Information
and Knowledge Transfer are equally as important as the Geo-Physical Data collected
from ISTARs and the interchanging of these information flows to the decision making
cycle and creation of the SSA. Creating a quantifiable quality assured SSA requires the
harmonisation and alignment of all layers of system interoperability, from the technical
issues upwards and the organisational/ enterprise issues downwards.
Assuring Cross-Domain Solutions for multi-layered, multi-functional, multi-national
(often geographical disperse) systems of systems is an international task, involving
many Enterprises, Government Agencies, Standards Bodies and Academia. The scale of
the problem has been recognised (NECSI, 2004; Alberts & Nissen, 2009), as well as
identifying many of the key components (from Technologies to Organizational
developments) that require research, development and implementation (Morris,
Levine, Meyers, Place, & Plakosh, 2004). These Systems of Systems display a number of
common characteristics that cause technical and organisational challenges; in that they:
Operated under different ownership and protocols
Are decentralised and geographical disperse
Engineering Doctorate
Page 70
Bridging the Air Gap: An Information Assurance Perspective
Are heterogeneous with little compliance and configuration management
Have unknown Scalability and Emergent Properties
Conform to different IERs and other diverse requirements
Have dynamic composition with unknown system interactions
Are in a state of change: continually evolving, expanding and been redeployed
Are inconsistent in Architecture and Functionality
Are eroding the Human-Computer Boundaries – complex interactivities and
controls
Are intolerant to system and intrusion failures
The usability of interoperable systems is reliant upon a robust architecture that is
coherent (having multiple interdependencies) across the interconnection of
Organisations, Services and Networks and supports cross-domain management of the
information flows from the physical data networks to Enterprise Knowledge Transfer,
Superior Decision Making and creation of a Shared Situational Awareness. International
Standards Organisation ISO-14258 (ISO, 1999) has stated that “Two systems are
considered as ‘integrated’ if there is a detailed standard format for all constituent
components.” Integrating systems has proved to be technically difficult especially the
large scale heterogeneous, geographically disperse architectures.
These autonomous systems have become federated with various degrees of coupling.
These systems are “tightly-coupled” when the network components and services are
dependent upon each other’s resources (and technically inseparable); whereas the
more common “loosely coupled” systems are bridged by communication channels that
allows for interoperability of data and services whilst maintaining their own local
(often unique) Business Process Operations. The Human-Computer and other
technological interfaces between the machines and the organisation is the social hybrid
system of a business Enterprise. Where the Humans (modelled as objects or resources)
in the enterprise have a different behaviour (e. g., learning and problem solving) from
machines (e.g., acting and reacting) and therefore need a different kind of information
(ISO, 1999). The Enterprises create a dynamic environment undergoing constant stress
and change owing to market conditions, operational requirements, fiscal controls,
technological advances, service applications and new transferred knowledge.
Many enterprises have devolved power to the individual away from hierarchical
organisational structures and C2 chain of command (unlike most military organisations
which rely on rank to influence command and control). This distributive control of
Engineering Doctorate
Page 71
Bridging the Air Gap: An Information Assurance Perspective
machine to organisation interactivity has evolved where the communities of interest
cooperate, communicate and share in both problem solving and action. This
cooperation requires greater cohesion such as building an Enterprise Architecture27,
ISO 15704, (see figure 63), integration of functions and services such creating Service
Orientated Architectures, ISO/IEC DTR 30102 and effective management and assurance
of Information flows: within the Enterprise and within the interoperability between
Enterprises, Operations and Systems.
Maintaining the layers Interoperability transforms the capability of communities of
interest to run business processes seamlessly across organizational and technical
boundaries. The ISO has defined a framework of 5 different layers of interoperability
(as Communities of Interest in their Political Context (the explicit and implicit reasons
for cooperation), the alignment of legislative requirements, constraints and
reconciliation producing Legal Interoperability; the alignment and harmonisation of
organisational interoperability which NATO NEC has formulated in its
NATO C3
Technical Architecture (NATO, 2003), the universal understanding of processes,
procedures, protocols and language providing Semantic interoperability and the
technical interoperability defining the syntax, integration, transmission and interfacing
computer network operations and its Information Infrastructures and Cyber networks.
These 5 layers achieve Enterprise interoperability by ensuring that the communities
understand how the business processes of different organizations can interconnect; by
developing standards to support these business processes efficiently; and by specifying the
semantics of messages exchanged between organizations to support these business
processes in a scalable way (Potgieser, 2012). The framework provides a useful
standard for these Enterprise Information Exchange Requirements. Interoperability
enables coalition IERs and the NEC benefit chain, presenting information in a consistent
manner across business boundaries and between systems regardless of technology,
application or platform. Aligning the Interoperable attributes provides Enterprises with
the ability to process, store and transfer, information across multiple domains, services
and technologies.
27
Enterprise Architecture (EA) is a comprehensive view of an enterprise. EA shows the primary
components of an enterprise and depicts how these components interact with or relate to each other.
EA typically encompasses an overview of the entire information system in an enterprise; including the
software, hardware, and information architectures. In this sense, EA is a meta-architecture. As
regards, EA contains different views of an enterprise, including, work, function, process, and
information, it is at the highest level in the architecture pyramid (Ostadzadeh & Shams, 2011)
Engineering Doctorate
Page 72
Bridging the Air Gap: An Information Assurance Perspective
The DoD through its Global Information Grid (GIG) architecture has formulated these
attributes (Procedure, Application, Infrastructure and Data) to create cross domain
interconnectivity and coalition operability to an unified approach. The DoD’s 5-Levels
of Information System Interoperability (LISI) model provides a dynamically
accommodating meta-level structure. The model reflects the nature of the crossdomain where the relation between technical and operational interoperability is
neither proportional nor linear (Chen, Doumeingts, & Vernadat, 2008).
It is possible that two commanders, who share the same command and control facilities,
in particular having the same C4ISR system support, make decisions that are
contradictive or sub-optimal. It is also possible that two commanders supported by C4ISR
systems that are not interoperable on the technical level are fighting very well together.
(Tolk & Muguira, 2003). This inability within the Defence realm to provide coherent
and optimised cross-domain solutions has cost billions of US dollars and there’s a
further increase in future expenditure to ensure interoperability brings specific
benefits and reducing the plethora of challenges currently beholding the technical and
operational perspectives.
The military have recognised that their CDS ability to
simulate and emulate disparate systems of systems, producing laboratories that create
synthetic environments of Red (CNA & CNE), Blue (CNM & CND), White (Digital
Analysis and Forensics) and Green (Command and Control) cyber facilities (such the
ranges created at DSTL and DCCIS) promote the current train as you fight philosophy
and improved CDS alignment. The expansion of individual activities to collaborative
working environments through System Simulation, Systems-in-the-Loop and Modelling
is an important step to understanding real and virtual (as per Figure 20) attributes that
effect the layers of interoperability and the Human-Computer Interfaces and how they
work within Enterprises. Bournemouth University, its 2018 Strategic Plans
incorporates the building of such a cluster of Cyber laboratories that will enables fusion
of research, education and practical /kinetic learning to investigate the social-technical
impact of CDS to large –scaled systems. The use of standards and enterprise
architecture as illustrated in figure 66 provided a Joint Action Concept of the Layers of
Coalition Interoperability (LCI) and formulated MoD’s Information Strategy linking EA,
Skills and IA as the main pillars of its Information Domain (MoD, 2009). The LCI
framework defines Enterprise Architecture as adaptive and innovative methodology for
interoperability (Smith D. B., 2005) as it identified architectural mechanisms that could
accommodate Enterprise changes with minimal impact as it deals with the various
layers of semantic interoperability in coalition operations.
Engineering Doctorate
Page 73
Bridging the Air Gap: An Information Assurance Perspective
The System of Systems Interoperability (SOSI) model developed by Software
Engineering Institute at Carnegie Mellon University (Morris, Levine, Meyers, Place, &
Plakosh, 2004) had addressed technical and operational interoperability of the DoD
and NATO layered models and further progressed the challenges of organizations
building and maintaining interoperable systems. SOSI introduces three types of
interoperability: (1) Programmatic, interoperability between different program offices.
(2) Constructive, interoperability between the organizations that are responsible for
the construction (and maintenance) of a system. (3) Operational, interoperability
between the systems. Taking the Zachman Enterprise the NCIOC model and the
additional SOSI concepts a matrix of the layers of interoperability across a business
process can be represented as illustrated in Figure 21.
Analytical Observations
Figure 21: Composite Model of Interoperability (Richardson, C.J., 2010)
The contents of interoperations is represented by the 2-dimensional Enterprise
Architectural matrix (abstract × perspective) produced by Zachman.
This matrix
defines what can take place in various levels of the Enterprise perspectives. The 3 rd
dimension enables the analyst to capture the structure and type of interoperation from
the NCIOC 9-levels. The cross-domain solutions can now be analysed as a Functioning
Enterprise within composite cuboids (P-S-D = Physical – Scope- Data, etc.) as
highlighted in the above model. There are 378 composite cuboids within the model;
Engineering Doctorate
Page 74
Bridging the Air Gap: An Information Assurance Perspective
each one can be used to define the contents of Enterprise interoperations. The
Alignment and Harmonisation of technical to operational issues is construed from
matching each Enterprise’s Composite Cuboid to their respective counter-parts within
the coalition.
Cyber Network Operations
Conventional architecture has developed Information Operations around Computer
Science and the employment of Computer Network Operations. In the 21st Century,
Computing is subservient to Cyber (networking of computing devices, routers switches,
firewalls and applications). Hence Figure 3 (earlier introduced in Chapter 1, p55) has a
new legend:
Legend
Proposed New Convention
CNO
Cyber Network Operations
CNA
Cyber Network Attacks
CNE
Cyber Network Exploitation
CNM
Cyber Network Management
CND
Cyber Network Defence
IX
Information Exploitation
IM
Information Management
Cyberspace can be structured by Enterprise Architecture and cyber network manage
(CNM) to exploit the Information assets (IX) for the business whilst been designed to
reduce vulnerabilities and prevent threats by adopting robust and resilient IA
architecture to develop appropriate defences (CND).
The Information Assurance
policies and practices will manage (IM) the Information Services across the deployed
systems and Information Infrastructures. Its trust and risk management will reduce the
threats from Cyber-attacks (CNA) and insider exploitation and privacy violations
(CNE). )ur systems require new software monitoring tools, more Network Management
integration, automated traffic analysis and building greater trust through our
Assurance Practitioners working and controlling security mechanisms across other
coalition networks. These practitioners (which we need more off) will also require
better education and increased transferable skills and this is examined in chapter 4
(Education and Profession).
We need competent, educated professionals to run our systems, secure the information
infrastructures; men who understand the complexities of interoperability from a
strategic, operational and tactical level, from the technical issues of data interfacing and
security devices to the more intricate problems of sensitive information flows and
Engineering Doctorate
Page 75
Bridging the Air Gap: An Information Assurance Perspective
organisational responsibilities. Cross-Domain Solutions needs new initiatives, finance
and better strategy to secure Cyberspace as stated in the revised US Comprehensive
National Cybersecurity Initiative (CNCI) (Obama, 2010). The CNCI was launched by
President George W. Bush in National Security Presidential Directive 54/Homeland
Security Presidential Directive 23 (NSPD-54/ HSPD-23) in January 2008 and stated that
it was a mutually reinforcing initiative:
To establish a front line of defense against today’s immediate threats by
creating or enhancing shared situational awareness of network vulnerabilities,
threats, and events within the Federal Government—and ultimately with state,
local, and tribal governments and private sector partners—and the ability to
act quickly to reduce our current vulnerabilities and prevent intrusions.
To defend against the full spectrum of threats by enhancing U.S.
counterintelligence capabilities and increasing the security of the supply chain
for key information technologies.
To strengthen the future cyber security environment by expanding cyber
education; coordinating and redirecting research and development efforts
across the Federal Government; and working to define and develop strategies
to deter hostile or malicious activity in cyberspace.
In 2007 the UK issued its National Information Assurance Strategy (Cabinet Office,
2007) to manage the risk involved in social-technical systems. Information Assurance
offers a panacea to the interoperability, providing a new methodology and better way
of ensuring safe operations of systems of systems and an its architecture provides an
understanding required culturally change our use of information, its processes, storage
and its transition from one domain to another .In managing the Enterprise risks, we
need to understand the advancement and agility of the threats (as illustrated in the
timeline in Figure 22).
The residue of countless scripted attacks, trojans, viruses, worms and the growth of
Advanced Persistent Threat Attacks (spear fishing and social engineering) with their
various APT attack vectors ( advanced evasion techniques - AETs) and zero-day attacks
(e.g. Flame, Stuxnet and Duqu) At present the cyber-defence countermeasures
(firewalls, IDS, Anti-virus, etc.) provide reasonable protection to most attacks, but these
systems are also regularly penetrated (externally and internally) and we have to resign
ourselves to the likelihood that our systems are compromised and we have intruders
(Abadi, 2000; Carr, 2005; Schiller, et al., 2007; Vidanage, 2009; Cabinet Office, 2011).
Engineering Doctorate
Page 76
Bridging the Air Gap: An Information Assurance Perspective
Figure 22: A timeline of Computing and Cyber Insecurity (Richardson C. J., 2011)
The strategic issues surrounding the need to defend our human-cyber interfaces, the
applications
and services,
the
systems,
networks
and our social-technical
infrastructures are investigated. To bridge the capability gap to creating robust and
resilient Communication and Information systems requires strategic (international)
initiatives to secure cyberspace. These initiatives should include:
A strategic doctrine for assured Information handling and storage
The effectively control the DIME usage of Cyber Power
The provision of trust and risk management across coalition interconnections –
cross domain solutions.
Enhanced operational capabilities to create cyber-shared situational awareness
and cyber defence.
The development of intrusion tolerant and prevention systems
Targeted funding of Cyber Defence Research and Development
Creation of an Information Assurance Profession with a Code of Practice
Provision of IA education and skills training
These initiatives are evolutionary and revolutionary in nature, stemming from the early
strategic military thinking of Network Centric Warfare and NATO’s Network Enabled
Capability (NNEC) and the technical advances in CPU capabilities, communication
media, storage & retrieval systems, data (and knowledge) mining, hosted services,
mash-ups, architecture and cloud computing allow for increased efficiencies,
complexities, emergent capabilities, revolutionising operations and how they are
conducted, resourced, financed, generated and expanded. Where processes enhanced
Engineering Doctorate
Page 77
Bridging the Air Gap: An Information Assurance Perspective
with techniques such as SaaS, SOA, Virtualisation, Geospatial identification and
Business Intelligence generate emergent behaviours with a plethora of new businesses,
Knowledge and Information exploitations. The holistic complexities and risk of
interoperability, managing, maintaining, and utilising these unified technologies and
system architectures contribute to an increasing chaotic Information Infrastructure of
an evolving cyberspace that presents many unpredictable obstacles to effective
operations and their assurance as well as exposing gaps in our knowledge and
understanding.
“A competency is more than just knowledge and skills. It involves the ability to meet
complex demands, by drawing on and mobilising psychosocial resources (including skills
and attitudes) in a particular context. For example, the ability to communicate effectively
is a competency that may draw on an individual’s knowledge of language, practical IT
skills and attitudes towards those with whom he or she is communicating,” OECD, 2005.
With our increasing national dependence of cyber domain operations, the competency
of our Cyber Defence Communities, Security Industries and Governing bodies such as
the UN’s International Telecommunication Union (ITU); US Department of Homeland
Defence; European Network and Information Security Agency (ENISA) and the UK’s
new National Crime Agency (NCA) is both tested and exposed. It is estimated that,
worldwide, more than one million people become victims of cybercrime every day
(Europa, 2012). These organisations need to demonstrate and provide national (and
international) leadership to combat advance persistent threats; attacks; cyber
(malicious) network exploitation and the inappropriate use of Cyber Power.
There is nothing more difficult to take in hand, more perilous to conduct, or more
uncertain in its success, than to take the lead in the introduction of a new order of things.
Because the innovator has for enemies all those who have done well under the old
conditions and lukewarm defenders in those who may do well under the new.
Machiavelli, The Prince
Machiavelli understood the apparatus of state power, but do our states understand the
uses, consequences and global effectiveness of Cyber Power (see annex 4). The Cyber
domain has new and emergent properties that we do not fully understand nor able to
produce a satisfactory risk assessment. Consequently these State Actors, Corporate
Executives and Academic leaders need to become more agile, engaged, educated and
coherent in their resolution to defend the Cyber Information Age and shape their
organisations to meet this tier-1 national security risk (Edwards, 2007). These same
Engineering Doctorate
Page 78
Bridging the Air Gap: An Information Assurance Perspective
communities of interest also need to generate greater awareness of how cyber risks are
causing fear, uncertainty and doubt (the FUD Contagion, p158) with their citizens,
workforce and militaries. The global population requirements for the Cyber
Information Age call for (a) better comprehension of cyberspace; (b) greater
understanding the consequences of interconnectivity; (c) recognising their own limited
knowledge and competencies and (d) have greater access to better information and
better education. Furthermore, with 68% of Europeans believing that online personal
information has not been kept secure by public bodies as demonstrated in figure 74
and 59% of EU citizens do not feel very or at all well informed about the risks of
cybercrime and that these needs have become matters of grave concern (European
Commission, 2012). This public perception of insecurity and lack of confidence with
authorities to provide adequate protection is often exploited by the media Most EU
citizens say they have seen or heard something about cybercrime in the last 12 months
(73%), and this is most likely to have been from television, (European Commission,
2012), as well as more insidious individuals, organisations and state actors.
This EU report also stated that:
12% of internet users across the EU have experienced online fraud, and 8% have
experienced identity theft. 13% have not been able to access online services
because of cyber-attacks. In addition:
More than a third (38%) say they have received a scam email, including
10% who say that this is something that has happened to them often;
15% of internet users say that they have accidentally encountered
material which promotes racial hatred or religious extremism.
Internet users express high levels of concern about cyber security:
89% agree that they avoid disclosing personal information online;
74% agree that the risk of becoming a victim of cybercrime has increased
in the past year;
72% agree that they are concerned that their online personal information
is not kept secure by websites;
66% agree that they are concerned that information is not kept secure by
public authorities.
The majority of internet users in the EU (61%) are concerned about experiencing identity
theft. Around half of internet users are concerned about: accidentally discovering child
pornography online (51%); online fraud (49%); and scam emails (48%). In addition, 43%
Engineering Doctorate
Page 79
Bridging the Air Gap: An Information Assurance Perspective
are concerned about not being able to access online services because of cyber-attacks, and
41% are concerned about accidentally encountering material which promotes racial
hatred or religious extremism. (European Commission, 2012).
Despite widespread media attention and warnings around Flame, Stuxnet, Duqu
viruses and other APT attacks; many EU CERT advice organizations relying on Critical
Information Infrastructures (CII), supervisory control and data acquisition (SCADA)
and other industrial control system (ICS) networks to be vigilant against conventional
network threats. These threats pose a far greater threat to Enterprise network security,
and include gaps in security infrastructure, social engineering exploits (Insider and
other actors), advanced evasion techniques and simple denial of service (DOS) attacks.
The social-technical cyber environment is constantly threatened from the growing
dangers of cyber-hooliganism, cyber-crime, cyber-terrorism and cyber-war. Corporate
Enterprise, especially those that own considerable CIS assets in our Critical Information
Infrastructures are beginning to understand that this digital environment facilitates
considerable scepticism, insecurity and distrust, particularly at their inability to defend
and secure digital assets (Kramer F. D., Starr, Wentz, & Zimet, 2007; Cabinet Office,
2010; Anderson & Rainie, 2010).
The Information Age has created a new paradigm for human competency evolution
with the globalisation of societies, communities of interests and enterprises through
the medium of the virtual space. The creation of the man-made Cyberspace domain has
many opportunities (exploitive and complex) for the UK’s and global Economy
(enterprise and products), Knowledge Transfer (artificial and real Intelligence,
Knowledge,
Experience
and
Wisdom),
Social
Informatics
and
Engineering
(communities and alternate societies) and Individual Competencies (skills, creation and
innovation) generating new ways we can exploit Knowledge, Information and Data
(KID) sources within existing systems and the emerging cyberspace with it diverse and
expanding applications and services.
Four distinct environmental drivers can be
identified that propels this paradigm, Expansion, Evolution, Expense and Exploitation.
Our cyber defence communities need to create and provide better strategic
understanding of the cyber environment across these networks of networks that:
evolve (new technologies, services and applications), expand (interconnections,
multiplexing, virtual domains and new deployments), exploit (data mining, business
intelligence and knowledge transfer) and expend (financial, technical and human
resources). The Cyber Domain needs better Assurance!
Engineering Doctorate
Page 80
Bridging the Air Gap: An Information Assurance Perspective
Cyber War, Cyber Crime
In understanding the Digital Domain, the thesis methodology identified the Threat
Domain (Threat Agenda, Attack Profiles and Security Compromises) as a key avenue of
discovery (Figure 24, page 78). Strategically the United Nations have created a Cyber
Security Alliance to address the Cyber Threat Agenda. Headquartered in Cyberjaya,
Malaysia, The International Multilateral Partnership Against Cyber Threats (IMPACT)
agency is administered through the International Telecommunication Union (ITU) and
was the first comprehensive global ITU public-private partnership (Governments,
Industry and Academia) against cyber threats. IMPACT addresses the ITU’s Global
Cybersecurity Agenda (GCA) which is the UN’s framework for international cooperation
to enhance global confidence and security in the information society (ITU, 2008)
“Cyber criminals are an ever present menace in every country connected to the Internet.
Organized crime has been on the rise because the Internet has proved a low risk, lucrative
business. This is due to the fact that loopholes in national and regional legislation still
remain, making it difficult to effectively track down criminals. The main problem is the
lack of international harmonization regarding cybercrime legislation. Investigation and
prosecution are difficult if the categorization of crimes differs from country to country.
Some efforts to address this challenge have been undertaken, and although very valuable,
they are still insufficient. The Internet is an international communication tool and
consequently, any solution to secure it must be sought at the global level.” (ITU, 2008)
There are a plethora of attack vectors to our fragile (and some say often defenceless)
critical Information infrastructure as illustrated Figure 23. These vectors range from a
Cyber Pearl Harbour attack (possible weapon of mass destruction), with total
meltdown of systems and societies heading towards anarchy; to Cyber Terrorism (antiestablishment motivated attacks); to organised Cyber Crime and its risk to ecommerce; to the insidious nature of cyber harassment and bullying (destroying
confidence and trust in our children): to the simple failures of ignorance and not been
aware of the threats within this domain of domains (Colonel Kelley, US Army, 2008).
These multi-layered, multilateral, multidimensional domains (Held and McGrew, 2010)
are often without boundaries, easily migrating and superimposing on each other,
influencing and determining different outcomes which requires complex analysis to
find any resolution in this chaos (Vitas, 2001; Gordon, 2007 and Majoris, 2010). The
ease of moving from one domain characterised by the lack understanding and the
vulnerabilities of a Botnet client; to the risks of all out Cyberwar or some terrorist
Engineering Doctorate
Page 81
Bridging the Air Gap: An Information Assurance Perspective
codifying some catastrophic event is just a mouse click, buts the effects are often global,
instant and often ruinous (Lewis, 2002 and Bracken, 2007).
Figure 23: The Plethora of Attack Vectors to Cyberspace (Richardson C. J., 2008b)
Figure 23 provides a framework to understanding the linkages between the different
threat profiles. These differences create components of the threat agenda within the
Thesis methodology and briefly discussed as follows:
The Cyber Pearl Habor is a State on State Cyber Attack, launched by a hostile state (or a
state sponsored organisation) who have the capability to wield a massive debilitating
cyber-attack that would effectively paralyze a country and constitutes a Clear and
Present Danger that potentially (according to the recent testimonial from US Secretary
of Defence, Leon Panetta at the Department of Defense (DOD) budget hearing held by
the Senate Appropriations Subcommittee on Defense) “shutting down financial systems,
releasing chemicals from chemical plants, releasing water from dams, shutting down
power systems that can affect the very survival of a nation,” (Mora, 2012).
The Catastrophic Cyber Event is an exploitable national disaster (such as Hurricane
Katrina) where people leave their systems unlocked owing to an immediate threat to
themselves or their families. A hostile State (or organisation) may then launch a
clandestine first strike upon the Critical Information Infrastructure to exacerbate the
situation to cause further economic and social damage. The military would also argue
Engineering Doctorate
Page 82
Bridging the Air Gap: An Information Assurance Perspective
that chemical, Biological, Radiological and Nuclear (CBRN) would also cause a
Catastrophic Cyber Event. US Senator Whitehouse described the consequences of
failure in protecting the US Critical Infrastructure could be catastrophic – “We all
recognize this as a profound threat to this country, to its future, to its economy, to its very
being,” (US Congress, 2012).
The concepts of Cyber War have made considerable impact on DIME strategic thinking.
The book Cyber War (Clarke & Knake, 2010) defines "cyber warfare" as "actions by a
nation-state to penetrate another nation's computers or networks for the purposes of
causing damage or disruption.” The Economist article entitled Cyberwar: It is time for
countries
to
start
talking
about
arms
control
on
the
internet
(2010)
describes cyberspace as "the fifth domain of warfare," and the US Deputy Secretary of
Defense, (Lynn, 2010) had stated that "as a doctrinal matter, the Pentagon has formally
recognized cyberspace as a new domain in warfare… [which] has become just as critical
to military operations as land, sea, air, and space. HMG has developed weapons to
counter the cyber threat and “will strike first to protect itself…We will defend ourselves in
every way we can, not only to deflect but to prevent attacks that we know are taking
place” according to the UK’s Foreign Secretary William Hague (Dunn T. N., 2011).
However, studies are incredulous to the possibility of successful deterrence against
cyber-attacks, in particular to the requirements for success: the existence of capability
(weapons), the credibility of the threat, and the ability to convey the threatening
message to the potential challenger (Lupovici, 2011).
Cyber Operations is about actively (or passively) operating in your adversary’s OODA
loop (as discussed in Chapter 3, p 149). NATO Cooperative Cyber Defence Centre of
Excellence (NATO CCD COE) stated that “Strategists must be aware that part of every
political and military conflict will take place on the internet” (Geers, 2008) and
conducting cyber network operations (CNO) facilitates espionage, cyber network
attacks (CNA) and cyber network exploitation (CNE) attacks to disrupt, compromise or
undermine the adversary’s decision cycles and Information Operations (Alberts &
Papp, 2001; Armistead, Information Operations Matters: Best Practices, 2010).
Cyber Terrorism and caused-based hackavist groups have become an increasing
international problem as the motivation, expertise, tools and techniques needed for
cyber-attacks have become more widely available. “Darknets, which enable users to
share content anonymously, are also likely to become more popular. Cloud computing will
enable terrorists to store and distribute material in a more robust way, which can then be
Engineering Doctorate
Page 83
Bridging the Air Gap: An Information Assurance Perspective
encrypted and configured to work with smartphones”. Al-Qa'ida has explicitly called for
"cyber-jihad” and Jonathan Evans, the UK’s MI5 Director has stated that the “Criminals
and rival states are using cyber terrorism on an 'industrial scale' to attack Britain's
Government and its biggest businesses, (revealing that) one company lost £800 Million
Sterling as a result of state-sponsored espionage. Terror groups (such as) al Qaida will
use hacking to steal secrets and damage systems,” (Robinson M. , 2012)
Cyber motivated by money and the lack of law enforcement “cybercrime has become
more profit-driven and is shifting away from Windows-based PCs to other operating
systems and platforms, including smart phones, tablet computers and mobile platforms in
general,” (Shinder, 2011) The cost of cybercrime to individuals, corporations,
governments and society in general will continue to climb. According to a 2011 study
by the UK’s Office of Cyber Security and Information Assurance (Holden, 2011), the
British economy lost £27 billion pounds sterling attributed to cyber-crime, with most of
that being shouldered by UK business.
Cyber Harassment, Cyber Bullying, Cyber-stalking and Cyber Grooming are the most
insidious of all the types of cyber-attacks, being highly targeted upon an individual
(often people with inexperience and/or mental or physical disabilities) in the
workplace, at schools or in the home. Online perpetrators, predators and stalkers often
pretend to be children or friends and start online conversations with their victims
through social sites. They may try to continue the relationship in personal
conversations on mobile phones (sometimes known as whispering), via private chat
rooms or produce negative, derogative and harmful images, videos and text across the
social sites such as YouTube, Facebook or Instant Messaging channels (Cyber Smart,
2009).
Cyber Intrusion and privacy is about the easy accessibility of data and information held
on systems about individuals. There is a lot of information on individuals that can be
gleamed / gathered unobtrusively from the Internet which could be used to the
individual’s disadvantage or for some criminal exploit or social engineering attack.
Often seen as passive attacks, these intrusions, ghosting and data mining activities build
up considerable intelligence on enterprises, their employees and personal lives.
Cyber Awareness attributes the lack of understanding, poor skills or the ignorance of
people operating applications, services and infrastructure devices in cyberspace.
Governments need to educate their citizens on the potential harm that cyberspace has,
Engineering Doctorate
Page 84
Bridging the Air Gap: An Information Assurance Perspective
as well as its benefits of social and e-commerce applications. The OECD (2005)
identified that a nation can gain a collective return from cyber awareness as illustrated
in figure 24.
Figure 24: OECD framework relating individual competencies (OECD, 2005)
Underpinning the attack profile components in figure 23 is the duplicity of benefits/
disbenefits (a benefit becoming an opportunity as well as a threat) to cyberspace that
was illustrated by the Cyber-Janus28 (capturing the nature of Janus) and coupling it to
the Black and White Hat communities of cybercrime and prevention. These Black Hat /
White Hat communities represents the two main perspective to cyberspace; the first
face presenting the ubiquitous nature of cyber-space and how it affects our lives in a
positive manner; the sharing environment of our work and workplace; the electronic
global commerce and its interconnections of communities and government; and then
the second face, the shady and shadow side of spamming, threats, hostilities, malware,
crime, terrorism and warfare. That Cyberspace represents information and knowledge
systems as strategic national assets and also has become a tier-1 strategic national
threat (Cabinet Office, 2010).
28
Janus of Roman Mythology was the god of doorways and time. Representing him in the 21st
Century as Cyber-Janus symbolizes change and transitions, the Good (White) and Evil (Black)
within the Cyber Domain, of one condition to another across many virtual domains.
Engineering Doctorate
Page 85
Bridging the Air Gap: An Information Assurance Perspective
Strategic Direction for Cyberspace
The internet is the digital global community and a coherent international strategy for is
use and security is essential. The emerging international landscape can be seen through
a European Union (EU) or United Nations (UN) perspective /lens where the physicality
and pervasiveness of cyberspace across the world’s societies has given this man-made
domain considerable depth (Technological, Social, Economic and Psychological) as
illustrated by the EU’s concepts in Figure 25. Surprisingly the EU study into the future
shaping of the Internet (European Commission, 2010) found that Technology wasn’t a
key driver and although Economic and Social issues had an impact, it was the
psychology of trust and at its the core was are the Information Assurance issues of
privacy, protection, security and reliability. The United Nations has sought to control
the Power of Cyberspace through its own technical authority. The UN’s International
Telegraph Union (ITU) is the only UN agency with partnerships between government
and industry and its activities towards cyber security has been to establish and follow a
set of fundamental rules formulated at by the WSIS and the 2006 ITU Plenipotentiary
Conference (ITU, 2006).
Figure 25: Fundamental principles by overlapping domains
(European Commission, 2010)
Engineering Doctorate
Page 86
Bridging the Air Gap: An Information Assurance Perspective
The ITU was tasked to build confidence and security in the use of Communication and
Information Systems, facilitate cooperation among public and private organisations,
and to foster education and training initiatives. Global leaders, communities and
institutions participating in the WSIS and its own member states representatives
further entrusted the ITU to take concrete steps towards curbing the threats and
vulnerabilities related to information society resulting in resolution 130. Whereby, the
ITU (ITU, 2006) was requested to give high priority to building confidence and security
in the use of information and communication technologies, and in Resolution 149 to
clarify definitions and terminology relating to building confidence and security in the
use of CIS. In order to raise awareness the ITU (ITU-D & ITU-T) has since organised a
succession of workshops to establish their framework of cyber security and critical
information infrastructure protection and these workshop’s purpose were defined as:
Identify changes faced by countries and develop frameworks for cyber security
and Critical Information infrastructures (CII), share experience and considered
the best practices.
Disseminate information on the ITU cyber security work program to assist
developing countries and the ITU-D study group question 22/1: securing
information and communication networks: Best practices for developing a culture
of cyber security.
Disseminate information on unrelated technical security standards activities
developing/being developed by standardisation organisations, and in particular
related to ITU at-T activities;
And review the roles of various actors (e.g. governments, service providers,
academia, city since, etc) in promoting a culture of cyber security.
(ITU, 2007)
At the national level, the ITU categorises it as a shared responsibility requiring
coordinated action related to the prevention, preparation, response, and recovery from
incidents on the part of government authorities, the private sector and citizens. At the
regional and international level, the ITU has sought cooperation and coordination with
relevant partners to formularise and implement national frameworks for cyber security
and critical information infrastructure protection through a comprehensive approach
(ITU, 2011). However, even this global cooperation has rooted misconceptions,
misgivings, resistance and denial.
Engineering Doctorate
Page 87
Bridging the Air Gap: An Information Assurance Perspective
The urgency to control emergent cyber technologies, to manage access to sensitive and
critical information infrastructures may be beyond the reach of the United Nations.
NATO, as a military organisation has now taken a more prominent role (although not
inclusive of many of the global players such as China, Russia, India and Brazil) in
creating the direction and purpose of Cyber Power. However the US and UK (and many
EU countries are beginning to) have made it their national priority. There are a
plethora of Cyber Strategy Initiatives been produced by authorities, but only the US
White House directives (Obama, The Comprehensive National Cybersecurity Initiative,
2010) have had the considerable financial resources to implement the strategies. The
UK Government has shown a willingness to develop a comprehensive cyber strategy
(Cabinet Office, 2010), it now needs to find the finance to fund its development and in
particular in the research of new assurance techniques, trust management and IA
Education to promote and sustain a new Assurance Culture.
2.4 Positioning Information Assurance at the
Heart of Cyber Operations
Figure 26: Strategic Positioning of Information Assurance in the Business Process
The strategic purpose of employing Information Assurance to the Enterprise’s Business
Process (in particular to the processes of Information Asset Management, IAM) is to
enable trusted transactions, storage (and retrieval) and CIS operations; harmonising
the issues of interoperability and aligning processes across infrastructural domains and
Engineering Doctorate
Page 88
Bridging the Air Gap: An Information Assurance Perspective
to ensure the protection of its intellectual and knowledge capital. Failure in
inappropriate usage, deployment or implementation of employing Information
Assurance Architectures (IA2) can result in serious financial loss, reputational damage
and stakeholder’s value to the Enterprise, as illustrated in figure 26. Four components
of the Thesis Methodology (Purpose, Environment, Capability and Culture) were based
on the Johnson and Scholes’ Exploring Corporate Strategy Model (Johnson, Scholes, &
Whittington, 2008). The positioning of Information Assurance at the heart of Cyber
(Information) Operations is this Thesis’s business model and in particular how assured
services, information and other assets flow between interoperating partners.
Understanding the needs of the User Community to seamessly transfer knowledge to
provide Situation Awareness (SA) and Superior Decision making requires recipicol
cognitation and understanding of the Information and Knowledge flows, content,
structure and timeliness. Cyberspace provides a 3-Dimensional bridge (Visual,
Innovation and Virtual) between the REAL and VIRTUAL Domains of Information flow,
acting as the continuum between these two domain and transforming operations from
a good to an assured state.
The desired future state of cyber operational security and the aspiration of most
security organisations is the maintainance of their systems in a good state, fault &
intrusion tolerant and resilient to purposeful attacks, natural events and fault
conditions (error, fault, failure). The positioning IA strategy is to transform the system
surviability ( organisational responsiveness, agility and continuity, robust system
architecture and tolerances, data dependability and operational / system safety) and its
ability to provide Human-cyber interexchange (tusted, risked managed, secure and
with appropriate protection) into
an Assured State.
The overriding purpose of
positioning IA (as illustrated in Figure 27) at the heart of strategic plans for
Information (Doctrines, Strategies and Operational policies) is to provide the
Enterprise (its social-technical environment) the capability to withstand fault
conditions whilst maintaining operational efficiency and value. Information Assurance
has to meet the expectations of the DIME communities of interest and the greater
global population that is becoming increasing reliant on cyberspace and the Internet of
Things. In part this Thesis is attempting to create a culture change through its argued
methodology, to adopt and develop its models.
The strategic position of Information Assurance and its Security Mechanisms within the
UK Government and in particular the MoD has been recognised by the National Security
Engineering Doctorate
Page 89
Bridging the Air Gap: An Information Assurance Perspective
Policy (2010). The Government data structures, Information stacks, the knowledge and
understandings that are exploited, the needs for, and keeping, qualified cyber
operatives and the ability to achieve cyber situational awareness have now been
recognised as Strategic Assets. These cyber structures and silos should be trusted and
made safe, secure and available and where the failure to protect these assets would
significantly impact on individual’s lives, society and government functionality within
the UK (CESG, 2007).
To qualify the significance of the Economic, Political and Military Values of the strategic
value of the Information Assets (that we hold and use) we need to understand the
benefits of the decision making process that enables Situational Awareness and the
impact it has to our future.
Purpose
IA
Environment
Capability and
Culture Change
• Assuring the Right Information, to
the Right People at the Right Time!
•The Need to Share across security
domains dependable, safe , secure,
and trusted Information
•Resilient
•Safe
•Protected
•Risked Managed
•Agile
•Dependable
•Secure
•Trusted
Robust, Agile, Tolerant and Dependable Systems
Figure 27 Strategic Goal of Information Assurance (Richardson C. J., 2008b)
We need to determine the impact of policies, doctrine and working environment,
securing the department’s strategic capability (offence, defence, resource and
competences) and the expectation of politicians and the general public. Toffler (1991)
expressed this as part of this Revolution in Military Affairs (RMA); however such a
revolution incurs Enterprise risk. Risk Assessment, Analysis, Management and
Exploitation should be directed, reassessed and processed throughout the revolving
and evolving delivery of strategic, operational and tactical change (the changing
Environment, Capability and Culture). Adapting the Johnson and Scholes (2008)
Strategic Position Model.
Engineering Doctorate
Page 90
Bridging the Air Gap: An Information Assurance Perspective
The Strategic Positioning of Information
Assurance within cyber policy and
doctrine can be derived from the many
attributes (Technology, Institutions and
Culture) of the interdisciplinary study of
Theory of
Socio-technical
Systems
Social Informatics29 (Kling, Rosenbaum,
& Sawyer, 2005).
Applying assurance
processes to design of information
exchange (policy, economic or social
context, education, media and electronic)
in society and to the system functions
Information
Systems
Theory
Theory of
Social
Systems
(management, administration, economic,
political and operational) of
information is used.
how
The key concept
Figure 28: The Social Informatics Venn
of Social Informatics is that the social
scientist view ICTs as a socio-technical network of artefacts, social contexts, and their
relationships (Markus & Robey, 1988; Orlikowski & Iacono, 2001).
The Social Informatics Venn (see Figure 28) combines the Information Systems
Theory30 where every system is composed of information, processes and stores
information, regardless of its media form (electronic files, quantum of light rays,
wireless etc.) to the Theory of Social Systems and Theory of Socio-Technical Systems.
This combination, incorporating system theory, information theory, quantum theory
and a system theoretic metaphysics has developed the System Matrix Notation which
reifies the concept of cyberspace as a tangible coherent space with a deep metaphysical
structure and the development of Ogdoadic Concept Map (or Glyph) of the
computational paradigm of systems and Cyberspace. The image of an ogdoadic system
comprising elements of Information, Interaction, External, Metric Space, Idiom, State
Space Internal and Experience as illustrated in Figure 29 has reposition segments in
each inward iteration with the four model elements - information, idiom, internal and
external - forming a conceptual foundation within which the inner squares arise
29
Social informatics is the interdisciplinary study of the design, uses and consequences of
information technologies that takes into account their interaction with institutional and cultural
contexts.
30
System Theory posits that everything is a system in the sense that the concept system can be
applied to everything in a meaningful and practical sense. Every thing is a system that is
composed of sub systems that interact to create that system and so too for each of these sub
systems down to some ground of being.
Engineering Doctorate
Page 91
Bridging the Air Gap: An Information Assurance Perspective
(Anandavala, 2005). Professor Toshizumi Ohta (1999) suggested that following from
Computational Theory (Carley & Prietula, 1994) that Social Informatics employs an
operational organization as a fundamental methodology. This is revisited with the
development of the Assurance Model in chapter 3.
The strategic alignment of the Ogdoadic Concept of Informatics to the Corporate
Strategy Model (Johnson, Scholes, & Whittington, 2008) encompasses Purpose,
Environment (external and internal), Capability (and idioms) and Culture. Moreover, an
important observation of Professor Ohta, as illustrated in Figure 30 that the autogenesis paradigm, a phenomenon with respect to human behaviour and social systems,
helps to describe the organizing mode in a society (Ohta T. , 1999b; Ohta, Kazunari, &
Isamu, 2001). Internet enabled actors can submit and receive multimedia, information
and knowledge in ever greater quantities, generating shared situational awareness and
cyber awareness. The methodology of operational organization provides visibility,
connectivity and the development of the Information Stack.
Figure 29: The Ogdoadic Concept Map of the Computational Paradigm
That the IA strategy model will require action (Processes, Resourcing, Practice, Changes
and Organising) and that there are Strategic Choices (Enterprise, Foreign, Evaluation,
Innovation and Departmental) will determine how expansive, economically,
evolutionary and exploitive the assets can be processed securely. However, with the
growing reliance of public sector organisations on information comes an increase in the
Engineering Doctorate
Page 92
Bridging the Air Gap: An Information Assurance Perspective
impact of the post-delivery failure of the operational information infrastructure and
elements of cyberspace. Information Assurance has to tackle many of the threat issues.
The first component of the Thesis Methodology and the Johnson & Scholes Model is the
concept of Strategic Purpose which encapsulates the organisations’ vision, mission,
governance and values. The roles and responsibilities of the corporate managers need
to align to new business processes and assurance of the information flows and this will
raise issues of corporate social responsibility and ethics, (Johnson, Scholes, &
Whittington, 2008) .
Figure 30: A Framework of Social Information Systems (Ohta & Yamamoto, 1995)
As an asset, information has 4 qualities:
•
Information is about something (e.g. a passenger timetable)
•
Information is seen as something (e.g. DNA or fingerprints)
•
Information is used for something (e.g. algorithms or instructions)
•
Information is placed in something (e.g. patterns or videos)
The flow of the military information assets across its 5 complex and inter-aligned
domains (Land, Sea, Air, Space and Cyberspace) has to be first class service. Without
the timely and effective use of information our commander’s decisions may be become
jaded, inappropriate or suspect. Consequently the IA purpose is that information has to
be clear, accurate, trusted and not compromised, lost, leaked, disseminated,
unauthorised, published or corrupted. In positioning IA, the strategic purpose is to:
provide an Information Assurance Capability that will facilitate Cross –Domain Solutions.
This capability will need a framework that formulates the assurance implications of
interoperability within cyberspace, human factors, protection of networks and secure
Engineering Doctorate
Page 93
Bridging the Air Gap: An Information Assurance Perspective
data content, alignment of enterprise architecture, any organisation culture changes,
information exploitation, management and service dependability from bridging the air
gap between highly classified networks and possible interaction with lower classified
networks and the Internet and how it might be done.
Information Assurance manages the risks to Government, Enterprise and Individual
information and its security component (its 3 tenets of Confidentiality, Integrity and
Availability- CIA) provides the necessary purpose and confidence that our information
systems will protect the data, information and knowledge that they handle and will
function as they need to, when they need to, under the control of legitimate users. This
confidence is becoming increasingly important and IA is an essential enabler of the
Transformational Government vision, as recognised by the UK National IA Strategy
(2007). The contextual strategic environment for the positioning of IA within the
organisation is under constant change owing to the complex Diplomatic (political),
Intelligence, Military and Economic (DIME) usage of Information around the socialtechnical changes of the Enterprise, its mission and its legal framework. Furthermore
has skills and awareness changes in the workforce, these will result in emergent
changes to the environment and its system domains. These inter-aligned domains have
a complex PESTEL31 context to a risky world of expansive utilization of the assets,
infrastructures and the many pervasive technologies and application. There is ever
increasing, explosive usage of Internet PESTEL activities and associated e-business
applications. The rate of change, its evolution has major impact on the structure and
new direction of the MoD (Strategic Defence and Security Review, 2010)
IA Capability has two main components:
1. System Survivability, and
2. Cross-Domain Solutions
The greater part of the strategic capability of Information Assurance has been
discussed within Chapter 3 and the cross-domain solutions for system interoperability.
One of the four Engineering Aims was to create a contextual framework for the
strategic positioning of Information Assurance that will provide an assured CIS
environment (see figure 89) and a capability to provide resilient and dependable
services across a secure and protected (critical) information infrastructures. These
31
PESTEL – Political, Economic, Social, Technological, Environmental (green) and Legal
Engineering Doctorate
Page 94
Bridging the Air Gap: An Information Assurance Perspective
capability requirements are discussed as elements of a Defence Jigsaw, which when
combined provide an integrated model for the strategic positioning of IA for System
Survivability and Cross Domain Solutions (System Interoperability). Culture change is
necessary, since the publication of the National Information Assurance Strategy
(Cabinet Office, 2007) there has been significant strategic drift and a failure to create
necessary changes. The National Security Policy Framework (Cabinet Office, 2011) has
produced a correction to this drift but the initiative is under resourced (there is
insufficient skilled practitioners working in the UK) and underfunded. The process of
cultural change is not a primary focus of this thesis; however its paradigm influences
every aspect of information assurance, from an historical, organisational, ethical and
psychological perspective. The impact of culture needs to assessed in any assured
environment and the Johnson and Scholes model provides a useful methodology to
examining and analysing the effects of cultural change using a Culture Web. By
analysing the factors in each Venn sector as illustrated the analysis can see what is
working, what isn't working, and what needs to be changed.
The Cyber Defence Jigsaw
The four methodical components (Purpose, Environment, Capability and Culture)
provide a firm foundation to build a conceptual Strategic Information Assurance model
and the established corporate cases that used the Johnson & Scholes contextual model
has created additional credibility and capability for the IA model’s development.
However, to make the positioning model more specific, manageable and utilitarian, the
conceptual model needs to encapsulate the social-technical issues of an assured CIS
environment.
Securing Cyberspace with technology and policies to provide Cross Domain Solutions
requires a practical development of the Information Assurance Model and
methodologies that will provide assurance both to the IX and IO components of the
Information Stack (as discussed in chapter 3). For the MoD, the Information Security
element of model also needs to meet the define roles and responsibilities of its Security
Officers and the accredited system security policy (JSP 440). The influence of the
Assurance components (Structured, Dependable, Secure and Trusted attributes) can be
mapped to the four elements of the CIS environment (Communities of Interest,
Systems, Networks and Facilities) as illustrated in Figure 31. The four anchoring pivots
(Data Security and Access Security Mechanisms, and the roles and System Security
Officer and Network Security Officer) of this assured model provide a chain of
Engineering Doctorate
Page 95
Bridging the Air Gap: An Information Assurance Perspective
responsibilities and activities across the 4 domains (System, Network, Facilities and
Communities of Interest). Over layering these 4 domains are the 8 components of
Information assurance (Architecture, Resilience, Dependability, Safety, Security,
Protection, Trust and Risk Management).
Figure 31: The Alignment of the Information Assurance across the CIS Domain
The alignment of the information assurance can be interpreted from the observation of
the four lines of interoperability. For example the interaction of Data across the System
Domain is managed by the System Security Officer who is responsible for the system
architecture (its compliance and accreditation), its resilience (the system tolerances
and continuity) to ensure data dependability and operational safety. This operation
manages the flow of data through the information stack (the Information Technologies
deployed, the supporting Information Infrastructure, the Services allocated, the
conformity and compliance Management procedures and practices and the exploitation
Engineering Doctorate
Page 96
Bridging the Air Gap: An Information Assurance Perspective
of the information for knowledge transfer and shared situational awareness. The logical
and risk conditions of the model needs to be tested within a cyber-range using
corporate simulations and exercised by some penetration and fault testing. The
conceptual component of this model is examined in chapter 3.
The Perceived Risk to the Assured CIS Domain
The Technological revolution that has radically changed the worlds of Communication,
information-processing, health and transportation has eroded borders, altered migration
and allowed individuals the world over to share information at a speed inconceivable two
decades ago.
United Nations, 2004
Another component of the Cyber Jigsaw is the perceived cyber risk (degrees of
expected and real Threats, Vulnerabilities and Impact to information systems and their
provided services and data storage) and its effect on Government, Business, Society and
the Military (Vatis, 2001; Whitman, 2004; and Jakobsson & Zulfikar, 2008) masks the
actual risk (Schneier, 2006, Robert, 2006 and Jaquith, 2007). Cyber threats and the risk
to information infrastructures cause Fears, Uncertainties and Doubts (FUD) in
Governments and the Online Communities. Until recently (Estonia, 2007 and Georgia,
2008), there have been few explicit public examples of network catastrophes or
national infrastructure exposures which can be easily attributed to Cyber War (Puran,
2003 and Baker, Waterman, and Ivanov, 2009). Analysis of cyber threats and cyber
security appears to over emphasise the smart (but limited) impact of Cyber War
(Paquet and Saxe, 2005) in attacking national (information) infrastructures (Jackson et
al, 2007 and Jaquith, 2007), describing most incidents as simple criminal activities that
intimidate citizens and e-commerce. Furthermore most nations are more robust and
resilient to these threats:
To understand the vulnerability of critical infrastructures to cyber-attack, we would need
for each target infrastructure a much more detailed assessment of redundancy, normal
rates of failure and response, the degree to which critical functions are accessible from
public networks and the level of human control, monitoring and intervention in critical
operations.
(Lewis, 2002)
However, in 2010 Western Governments and the United Nations have escalated the
potential damage to society of these Cyber Threats and have started to expose critical
Infrastructure damage, cyber war and cyber terrorism scenarios (President Obama,
2010 and Fowlie 2010). The US Defence Department has investigated about 250
‘‘serious, sophisticated’’ cyber intrusions into government networks and have concluded
Engineering Doctorate
Page 97
Bridging the Air Gap: An Information Assurance Perspective
that these threats were so severe that they now designating cyberspace as a fifth
domain of warfare. The US Attorney-General, Robert McClelland, said that ‘‘It’s very
difficult to identify the source of attacks; often they can be routed through other countries
or other players.’’ In April 2010, China Telecom briefly rerouted Internet traffic destined
to some highly sensitive US websites, effectively hijacking the Internet. This was
reported by the US-China Economic and Security Review Commission who stated that
the Chinese Telecom Company sent incorrect routing information destined for the
websites of the US Senate, the Office of the Secretary of Defence, NASA and the
Commerce Department, but they were not clear whether it was unintentional or had
intent. The US Defence Secretary Robert Gates warned that cyber-attacks posed a huge
future threat and urged more joined-up efforts between the US military and civilian
agencies (BBC, 2010).
The UK’s National Security Strategy (Cabinet Office, 2010) has stated that Cyber Attacks
to be one of the biggest security threats facing the nation and has categorised it as a
Tier 1 threat, paring international terrorism and major accidents. HMG’s Technical
Authority to Cyber Defence and Information Assurance, The UK’s Communications
Intelligence Agency GCHQ, indicated the scale of the problem to the National
Information Infrastructure (NII) when its Director, Iain Lobben, revealed “that each
month more than 20,000 “malicious” e-mails were sent to government networks, of which
1,000 were deliberately targeted at them.” Lewis (2002) argues that: The lines between
domestic and foreign, private and public, or police and military are blurring, and the
nature and requirements of national security are changing rapidly. The most important
implications of these changes for cyber security may well be that national policies must
adjust to growing interdependence among economies and emphasize the need for
cooperation among nations to defeat cyber threats. The World Summit on the
Information Society (WSIS 2003) recognized the real and significant threat posed by
inadequate confidence and security in the use of ICTs and the proliferation of cybercrime.
This universal recognition of the ubiquity of Information, its pervasiveness in society,
the failing to protect the privacy of this asset has led the UN to produce the Global
Cyber security Agenda (GCA) as a framework for international cooperation on cyber
security32.
32
The Vulnerability (and hence the risk) of the National Information
UN General Assembly has outlined elements for creating a global culture of cyber security
through several resolutions, including: resolution 64/L.8 (2009)’Creation of a Global Culture of
Cyber security’ (Second Committee) and Resolution 64/L.39 (2009) ‘Developments in the field
Engineering Doctorate
Page 98
Bridging the Air Gap: An Information Assurance Perspective
Infrastructures has increased with the ubiquitous computing environment; the internet
of things; cloud computing and mobile data mash ups that are constantly being exposed
and threaten with the plethora of daily online activities that have become automated.
The (embedded) microprocessor and Hybrid market is far greater than the PC market
and possible Cyber-attacks like chipping (King, et al, 2008 and Adee, 2008) in this space
are causing great concerns to businesses, critical infrastructure providers and
Governments. The UK’s Foreign Secretary William Hague said that, unless addressed,
this could threaten the UK’s “economic welfare”. The risk is greater where there has
been a vast growth and reliance to remote computer networks access, particularly by
the mobile phone networks and other wireless systems (WiFi, WiMax, LTE, etc.) and is
of particular concern to military authorities who have service NGO VPNs. Furthermore
with the malware such as the smart targeted Stuxnet Virus there is an increased
worldwide hacking vulnerability to industrial and infrastructure applications as
illustrated, especially those used for SCADA (Supervisory Control and Data
Acquisition). The global shift from proprietary networks to using the insecure open
access TCP/IP Internet based operations has over the past 25 years created extensive
avenues of inappropriate access. Information Assurance and network security; law
enforcement and cyber defences have to become more effective to ensure that critical
and national infrastructures are robust and resilient. Modern threats are more blended
attacks as figure 32 illustrates from its first wave hacking of individual PCs to mass
attacks on the mobiles and the internet of things. Assuring the Internet will be a long
and probably impossible process, but the first steps are being made and if more
national resources become available, just maybe we might start closing some doors.
Information Assurance is defined in HMG IA Standard No 2 Risk Management and
Accreditation of Information Systems (v 3.1 October 2008) as ‘the confidence that
information systems will protect the information they handle and will function as they
need to, when they need to, under the control of legitimate users’. The definition’s
language was derived from a CESG’s security perspective (the tenets of security are
Confidentiality, Integrity and Availability) rather from a more (a) purposeful and
holistic perspective of applying (b) trustworthy capabilities to Information Operations
and Information Asset Control, (c) creating a trusted environment to operate and
of information and telecommunications in the context of international security’ (First
Committee)
Engineering Doctorate
Page 99
Bridging the Air Gap: An Information Assurance Perspective
maintain the critical information infrastructures and the business processes that rely
upon these infrastructures and (d) to change the culture of the enterprise to become
more efficient, compliant and risk mitigating. Building the necessary architecture to
mitigate the risks to the vulnerabilities and potential threats to the Enterprise, its CIS
domains and Information Operations will require a number of integrated analytical and
evaluation processes.
Figure 32: The HCI of Assurance and Potential Threats (Richardson & Sinderberry, 2008)
The above figure 32 illustrates the enabling activities (Environment, People & Process
and ICT) that surround the management, control and usage of Enterprise Information
and the constant pressure on Assurance practitioners, employees and executives to
mitigate the threats and risk to the Enterprise. The figure illustrates the complexity of
the task involved in Assuring the Enterprise Information owing the numerous issues
highlighted that are often loosely coupled creating further emergent (and often
unknown) properties. Understanding what to align within the Assurance process is
critical to the success of its implementation. Any failure, omission or delay may result in
a vulnerability that can readily assaulted by CNA and CNE. The purpose of the strategic
IA model is to give direction, governance and maturity to the Enterprise, its board
members and employees. Its mission is to provide a structured; resilient; dependable;
safe; secure; protected; risk managed and trusted usage of its CIS domain.
Engineering Doctorate
Page 100
Bridging the Air Gap: An Information Assurance Perspective
The Strategic IA Model
"Information is a significant component of most organizations’ competitive strategy
either by the direct collection, management, and interpretation of business information or
the retention of information for day-to-day business processing. Some of the more obvious
results of IS failures include reputational damage, placing the organization at a
competitive disadvantage, and contractual noncompliance. These impacts should not be
underestimated."
The IIA Research Foundation
The military have many strategies, and those centred on Information Superiority and
Information Operations (IO) are fluid at best. Information Operations is essential for
the successful execution and efficiency of military (joint) operations. The US Military
have drafted a new Information Operations Doctrine which emphasises its pillars (the
domains that IO owns) and its core capabilities of electronic warfare, computer
network operations, psychological operations, military deception, and operations
security as illustrated in figure 99. The strategic importance of Information Assurance
is that these operations are conducted with trustworthy devices, technologies,
networks, infrastructures, systems, services, applications, data storage and retrieval,
architectures, policies, procedures and good practice. IA has complex and daunting
requirements to fulfil. The UK’s military domain security framework (MoD, 2010) has
structured Information Assurance to provide trustworthiness to (almost) all
components (except CIS Resilience and Document Security) of its CIS Security
Framework. Resiliency is the ability to avoid, minimize, withstand, and recover from
the effects of adversity, whether natural or manmade, under all circumstances of use
and consequently when it is applied to the Cyberspace, it becomes a constituent
component of Information Assurance. Critical Information Infrastructures (CII)
requires resilient and tolerant architectures which are trustworthy under operational
stress and assures high availability, continuous operations, and disaster recovery.
Information operations within the Government, Industry and Military sectors are
diverse and complex. These CII operations have independently expanded into loosely
couple arrangements (often with controls or strategic architecture) and evolved into
large systems of systems with many producing (and often unknown) emergent
properties; creating new vulnerabilities and attack vectors. Normally these integrating
operations have operated satisfactorily in loosely coupled arrangements. However, for
these operations to be resilient under stress, more than loosely coupled arrangements
are needed. The strategic positioning of Information Assurance will need to define the
engineering challenges of resilient, fault and intrusion tolerant socio-technical
Engineering Doctorate
Page 101
Bridging the Air Gap: An Information Assurance Perspective
Enterprises. Operational recovery time (a service objectives) to adverse effects among
the DIME sectors must be coordinated, interoperability of information sharing and
platform operations must be assured, distributed supervisory control protocols must
be in place, and operation sensing and monitoring must be embedded.
These
capabilities cannot be expected to evolve in a loosely coupled environment. They must
be holistically specified, architected, designed, implemented, and tested if they are to
operate with resilience under stress. A management, process, and engineering maturity
framework is necessary to advance the assurance of software security, business
continuity, system survivability, and system of system resiliency capabilities. From a
strategic IA point-of-view, HMG needs to impose a maturity framework for guiding CII
operations and interoperability. Such a framework should develop the future evolution
of our Critical Information Infrastructures along the lines of common management,
process, and engineering dimensions whose collective result would be a harmonious
operation and resilience even under stress among these systems. Assuring resilient CIS
domains under stress should be organized as a 5 level maturity model (as illustrated in
Table 4). The objective is to drive the business case of CII operations and produce an
enterprise commitment to achieve the goals of each level (2 to 5) and build upon them
as indicated:
Level 1
Level 2
Level 3
Level 4
Level 5
Ad Hoc- State of Affairs: Inability to advance and exhibiting evidence of apathy,
denial, management inaction, and lack of IA engineering know how
Enterprise Assurance Commitment Management- Goal: Demonstrate
commitment to Information Assurance through strategic management,
harmonised interoperability, internal processes, and defence in depth.
Enterprise Business Continuity Process Maturity- Goal: Demonstrate business
continuity assurance through compliance and configuration management,
accreditation, external standards and product engineering.
System Survivability Engineering- Goal: Demonstrate the achievement of system
survivability through the management of faults and failures, sustainability
processes, aligned CDS and IA best practices.
System of Systems Resiliency Engineering- Goal: Demonstrate the achievement
of cross-domain resiliency through the management of external interactions and
dependencies, the control of distributed supervisory processes, and the practice
of Next Generation, High Assurance software engineering.
Table 4: IA Resiliency Maturity Model
Information is both an asset and potential liability to its owners. HMG’s Information
Governance policies have established that (Government) Departmental Accounting
Officers (AOs), through their Senior Information Risk Owners (SIROs) and their
Information Asset Owners (IAOs) are to become accountable for the adequate
protection of their information (collected, processed and stored) within their
Engineering Doctorate
Page 102
Bridging the Air Gap: An Information Assurance Perspective
Departments. Consequently these AOs will need to introduce holistic Information
Assurance policies, procedures and practices that include effective Business Continuity
Plans, Information Risk Management (IRM), Security Information and Event
Management (SIEM) and a culture change programme of IA awareness, adaptation and
compliance. This introduction to IA and its compliance has been encapsulated in the
CESG Information Assurance Maturity Model (IAMM) as illustrated in table 5.
Process
Level 1 –
Initial
Level 2 –
Established
Level 3 –
Business
Enabling
Level 4 –
Quantitatively
Managed
Level 5 –
Optimised
Leadership
&
Governance
Board recognition that
information is a vital
business asset and IA is
an integral requirement
of corporate governance.
A programme of annual
information risk
awareness training is
instituted
A comprehensive
information risk policy is
in place.
Board members
understand and
accept their
responsibility for IA
implementation
Dept. personnel
undergo annual risk
awareness training
Board exercising
due diligence
to the effective
discharge of IA
Board monitors
progress towards
embedding IA policy
across the Dept.
A programme of
pre-appointment
training is instituted
for all staff
All CIS that are
critical to the
business have
been subject to
Accreditation
Accurate details of
training received by
all staff are collated
and reported
Residual risks are to
be tolerated and
quantified. The Main
Board is fully aware
of the total level of
risk involved.
Level 3 processes
are extended to
embrace all of the
Department’s IS.
Assured Department’s
Information and its
external stakeholder’s
key business asset are
fully embedded within
the Dept’s culture and
are subject to a regime
of continuous
improvement.
Risk exposure of the
Department is within
Its risk appetite
Effectiveness
Implementing Best Practice IA
Measures
Embedding IRM Culture
Within the Enterprise
IA
Awareness
Training, &
Education
Information
Risk
Management
ThroughLife IA
Measures
Assured
Information
Sharing
Compliance
Required to take a
coordinated and
systematic approach to
through-life IA measures.
The Accreditation
status of all existing
CIS is determined
and the information
risks are identified
within risk registers
The status of the
through-life IA
measures
employed across
the Department is
determined and
gaps are identified
Required to define and
manage how information
is shared across the
Department’s boundaries
Network
boundaries are
defined and policies
for sharing and
managing
information across
these boundaries
Established compliance
regime to confirm the
effectiveness of IRM
against mandated
(minimum) standards.
The Dept. has a
comprehensive
IRM compliance
regime.
Annual Reporting
They have an
External IA Review
Systematic,
through-life
processes are in
place to assure all
IS which are critical
to the Dept.’s
business.
A comprehensive
protective
monitoring regime
is implemented to
provide situational
awareness and
enable essential
information flows to
be maintained.
Critical IA Review
and internal audit
Recommendations
are actioned and
progress tracked.
Level 3 measures
are extended so that
incident mgt. moves
from being reactive
to proactive.
IA incident mgt.
processes are fully
assured by internal
audit. The Main
Board is aware of
the significant areas
of the Department’s
non-compliance
Incident and problem
management processes
adapt to new risks and
problems.
Network boundaries and
the associated
protective monitoring
regime is continually
improved to reduce the
departmental and
collective, shared
exposure to information
risk.
There are no critical or
significant IA audit
issues. Independent
assessment of the
Department’s approach
to IA shows that it is
aligned with the National
IA Strategy.
Table 5: Abridged CESG Information Assurance Maturity Model (Cabinet Office, 2010)
These AOs need to assure their arrangements sufficiently reveal any business impact
upon the on-going programmes in Transformational Government (Cabinet Office,
2005) and their Department’s information risk as directed under the HMG Security
Policy Framework (HMG SPF, 2010). CESG had also imposed an Information
Management Maturity Model (IMMM) to measure compliance by Department Chief
Information Officers (CIOs). However a number of the IMMM objectives have been
swept up by the current IAMM and the publication of Good Practices such as the MoD’s
JSP 747. Although the IAMM (Version 4.0) has a considerable list of Departmental
requirements and compliances, many of its practitioners will find evidence for upwards
grading with little oversight from its auditors, the National Audit Office. Consequently
Engineering Doctorate
Page 103
Bridging the Air Gap: An Information Assurance Perspective
the current maturity model is probably flawed, as it is a top down approach and juniors
always want to paint a positive picture to please their seniors (a very common problem
within the military where Captains are established as ITSOs in establishments with
many senior officers flaunting or ignoring best practice) and can be considered as
nothing more than a check list. Information assurance is everybody’s responsibility and
therefore a non-hierarchical approach must be used for its compliance.
One of the most significant transformations in the State of Art of Cyberspace has been
the blurring of the lines of demarcation across network boundaries in joint actions,
coalition partnership and the Internet of Things. Consequently these IA maturity
models need to evolve, but this requires agile movement of the goal post which is often
counter-productive (most people resist change, in particular any change to their
normal operations) in most organisations. Information Assurance has to establish a
new cultural awareness that promotes change. Future internet and System of Systems
research will require a much wider remit than just for networks and transportation
(ISO Model Layers 1 to 4). It will need to encompass domains previously seen as purely
application areas, for example, like information access, processing and human-cyber
interfacing (layers 5 to 7). Models work when their user community engage in their
usage…getting them to engage is a priority!
Human Factors of Assurance
“The internet has the potential to become a ubiquitous and universal channel for
socializing and creative expression”
(European Commission, 2010)
The Internet is both Diverse and Inclusive, just about anyone with network
connectivity can “surf the net” but there still is a social divide with those without
connectivity (or with those who refuse to connect). This globally homogenous network
of networks has expanded and evolved with technology advances, organisational needs
and user demands. The semantics of the socio-technical domain has changed with the
each iteration of the world-wide-web, (Spivack, 2007). However, greater inclusivity
also constitutes a greater risk to the online community and it’s Assurance
One of the most important Human Factors in the socio-technical Enterprise is the
concept of Trust. Psychologists have had difficulties to precisely define Trust in its
social context, but as an Assurance Dimension it has become an increasing important
design issue and an operational necessity (Michael, Hestad, & Pedersen, 2002).
Engineering Doctorate
Page 104
Bridging the Air Gap: An Information Assurance Perspective
Research has shown, “if trust is not present, if there is no confidence, expectation, belief
and faith in an information system, then there will be no willingness to rely on any such
system,” (Chopra & Wallace, 2003).
In developing trust in Cyberspace the human factors involved are both contributionary
to the society and also can become anti-social, criminal or offensive. The moral and
ethical conduct of individuals online has little policing and little political will to police
the internet (Jewkes, 2003). As the internet expands more criminal activity is noted; as
it evolves, a new conjunction of criminal opportunities arise and as it becomes more
exploited, more online crimes are committed. We need to examine features of the
components of cyberspace to determine the extent to which people will have greater
predispositions to crime, new resources available to them to commit crime and many
other factors. At the same time, we need to assess the extent to which those who develop
the new cyberspace systems have incentives to adopt measures that will make cyberspace
less attractive for criminals and crime promoters (those who make crimes more likely, for
example,
by
providing
‘inside
information’, passwords,
tools,
incentives
and
encouragement, etc., or merely by being careless with their own security) wherever they
are found.
(Collins & Mansell, 2003)
As figure 33 illustrates, a key consideration from the IA perspective are the causal
relationships between the components of cyber trust and e-crime prevention, and in
particular the development of an understanding of the causes of crime in the Cyber
Domain (Collins & Mansell, 2003). The Social Values of the Communities of Interest
(COIs) place considerable influence and expectations to the equality and diversity of
the IA Trust Dimension, entrusting the integrity of the services, security of transactions
and the privacy of the information used, stored or transmitted. The figure depicts some
of the key components and issue areas in the cyberspace system. Each of these is
recursively related to the others, forming a highly complex system that is populated by
many different agents, both human and non-human.
The local social relationships have been expanded by the process of Globalisation and
international virtual communities that have reshaped DIME strategies and linked
individuals to a common cause, event or culture. Technical innovation of Information
Technologies and IT Services have open new inclusive communities for collective
thinking, sharing and knowledge transfer creating new requirements and paradigms
for online social morality and ethics.
Engineering Doctorate
Page 105
Bridging the Air Gap: An Information Assurance Perspective
Figure 33: Cyber Trust and Crime Prevention-Web of Components (Collins & Mansell, 2003)
These new standards require better models, interpretation and an inclusive code of
good practices that can be championed by all online users. In many aspects we are just
beginning to learn what our trusted socio-technical enterprises are capable of and
these emergent properties acquire further research and development. To entrust the
Information Domain, the communities and enterprises have to understand the risks
involved in the virtual environment and the processes it supports. Risk Mitigation and
Enterprise Risk Management (ERM) are other important aspects of Information
Assurance which requires awareness, training and education. In particular,
understanding the problems of residue risk, perceived risk and actual risk is necessary
to all users. Too many enterprises are either complaisant to regulatory standards or
ignorant to their vulnerabilities as risk assessments have become automated to the
compliance of check boxes rather than investigating and understanding the actual risks
involved, (Grossack, 2012).
Creating Trustworthy networks, the system designers and equipment manufacturers
are implementing the need of enterprises through technologies and infrastructures.
However, very little has been done in creating an assured architecture in the
engineering of theses system; in particular in the research of IA Architecture in System
Engineering and experiments of assured system of systems designs on cyber ranges.
More research is required in understanding the system vulnerabilities, the emergence
of complex behaviours and a better understanding of system and human normative
Engineering Doctorate
Page 106
Bridging the Air Gap: An Information Assurance Perspective
behaviour whilst online. This research will help provided a more trustworthy
environment, innovative assured technologies and secure our digital identities.
To create trust in Cyberspace, Information Assurance has to provide strategies,
governance, policies and mechanisms that can detect e-Crimes, cyber-attacks and
malicious cyber network exploitation. The IA Models and implementation need to
provide the authorities preventive and tolerant capabilities, the ability to gain and
analysis digital evidence and create secure operating domains within the current
regulatory and legislative environment. Trust in Cyberspace shouldn’t be taken for
granted; it requires Assurance to make it trustworthy and commitment to make it
resilient, dependable, safe and secure.
The Model has a cyclic activity rotating the roles of Assurance Practitioners to the
System, Network, Facilities and Communities of Interest domains and the interspersing
(Purpose to Systems; Capability to Networks; Environment to Facilities and Culture to
Communities); interrelationship of the Human-Cyber Interexchanges (IERs and
Essential Elements of Friendly Information – EEFI); interdisciplinary (Engineering,
Psychology, Social Science, Law and Business) domains of strategic management. This
rotational process recognises the dependencies (and interdependencies) between
systems and critical information infrastructures and the importance to achieving (and
/or undermining) cross-domain solutions for resilient safe, secure and dependable
operations. This is an important strategic component of Information Assurance and
there are considerable research avenues (in particular those conducted by Professors
Robin Bloomfield and Kevin Jones at the Centre for Software Reliability, City University
London) been explored to determine the consequences and complexities of
dependability between cyber domains and the cascading effects that occur as systems
fail (Al-Kuwaiti, Kyriakopoulos, & Hussein, 2009; Bloomfield, Buzna, Popov, Salako, &
Wright, 2010). Having safe (available, useable, maintainable and scalable) operational
processes that the user communities can rely upon (trusted, secure and protected) is a
further dimension of Assurance that needs to be researched, in particular to system
functionality that can gracefully collapse (rather than crash) to error, fault and failure
conditions, becoming resilient and tolerant to cyber-attacks and intrusions and having
robust critical infrastructures that survive and provide business continuity.
Engineering Doctorate
Page 107
Bridging the Air Gap: An Information Assurance Perspective
Figure 34: The Composite Strategic Information Assurance Model
The current IA maturity model is highly focus on Information Risk Management (IRM)
and largely misses the more important elements of Trust Management and this thesis
recommends an improvement to the model as illustrated in Table 10. The IAMM does
however recognise the equally important measures required for people awareness,
training and education. The Government now needs to quantify and qualify what are
acceptable Training and Educational Standards and publish the National Occupational
Standard (NOS) for Information Assurance. The jigsaw has many important
components to cover the capability gaps we have in our systems. In particular to the
alignment of the 8-Dimensions of IA is need to find Cross-Domain Solutions, System
Tolerance, Risk Mitigation, Compliance and maintenance of Shared Situational
Awareness. This creates additional, but necessary, complexity to a highly integrated,
relational concept.
Engineering Doctorate
Page 108
Bridging the Air Gap: An Information Assurance Perspective
Table 6: The Extended Enterprise Information Assurance Maturity Model
Information Exploitation (IX)
Embedding IRM Culture Within
the Enterprise
IA
Process
Leadership &
Governance
Awareness
Training, &
Education
Information Risk
Management
(IRM)
Enterprise
Information
Management
(EIM)
Implementing Best Practice IA Measures
Level 3 –
Business
Enabling
Level 4 –
Quantitatively
Managed
Level 5 –
Optimised
Executive
recognition that
information is a
vital business asset
and its assurance
is required by
governance.
A programme of
annual information
risk awareness
training is instituted
A comprehensive
information risk
policy is in place.
Executives
understand and
accept their
responsibility for IA
implementation
Executives
exercising due
diligence
to the effective
discharge of IA
Executives monitors
progress towards
embedding IA policy
across the Dept.
Enterprise
personnel undergo
annual risk
awareness training
The Accreditation
status of all existing
CIS is determined
and the information
risks are identified
within risk registers
A programme of
pre-appointment
training is instituted
for all staff
All CIS that are
critical to the
business have
been subject to
Accreditation
Enterprises attains
some awareness
about information
management
Enterprise and IT
leaders react
favourably to the
demand for
consistent,
accurate and faster
information across
key business units.
Enterprises
perceive and
qualify information
as necessary for
improved business
performance and
optimisation.
Accurate details of
training received by
all staff are collated
and reported
Residual risks are to
be tolerated and
quantified.
Executives are fully
aware of the total
level of risk
involved.
Enterprises perceive
information as
critical for business.
The organization
has implemented
significant portions
of EIM, including a
consistent
information
infrastructure
Pragmatic –
Embedded SOA
Meta-tagging
Documents
Assured Enterprise
Information and its
external stakeholder’s
key business asset are
fully embedded within
the Dept’s culture and
are subject to a regime
of continuous
improvement.
Establish and
redefine its current
Service Level
Agreements.
Monitor Service
Level Agreements.
Semantic –
Introduction of ITIL
Risk exposure of the
Department is within
Its risk appetite
Enterprises exploit
information across the
entire information
supply chain, with
service-level
agreements that are
continuously reviewed
Dynamic –
Fully realised sociotechnical IS systems.
Information
Services
Syntactic Introduction of
common IERs.
Interoperability
Isolated
(manual)
Connected
(peer-to-peer)
Functional
(distributed)
Domain
(Integrated)
Enterprise
(Universal)
Data Quality
Uncertainty
Awakening
Enlightenment
Wisdom
Certainty
Required to take a
coordinated and
systematic
approach to
through-life IA
measures.
The status of the
through-life IA
measures
employed across
the Department is
determined and
gaps are identified
Defined and
managed
Enterprise IA
Commitment
Systematic,
through-life
processes are in
place to assure all
IS which are critical
to the Dept.’s
business.
Established and
tested Enterprise
Business Continuity
Process Maturity
Level 3 processes
are extended to
embrace all of the
Department’s IS.
Incident and problem
management processes
adapt to new risks and
problems.
System of Systems
Resiliency EngineeringDemonstrate the
achievement of crossdomain resiliency.
Required to define
and manage how
information is
shared across the
Department’s
boundaries
Network
boundaries are
defined and
policies for sharing
and managing
information across
these boundaries
Identification
Authentication
A comprehensive
protective
monitoring regime
is implemented to
provide situational
awareness and
enable essential
information flows to
be maintained.
Reputational
System Survivability
Demonstrate the
achievement of
system survivability
through the mgt. of
faults and failures,
sustainability
processes, aligned
CDS and IA best
practices.
Level 3 measures
are extended so that
incident mgt. moves
from being reactive
to proactive.
Vetted
Network boundaries and
the associated
protective monitoring
regime is continually
improved to reduce the
departmental and
collective, shared
exposure to information
risk.
Valued
AccessControlled
User-Profiled
Client-centric
Federated
Collaborative
Established
compliance regime
to confirm the
effectiveness of
IRM against
mandated
standards.
The Dept. has a
comprehensive
IRM compliance
regime.
Critical IA Review
and internal audit
Recommendations
are actioned and
progress tracked.
IA incident mgt.
processes are fully
assured by internal
audit. The Main
Board is aware of
the significant areas
of the Enterprise
non-compliance
There are no critical or
significant IA audit
issues. Independent
assessment of the
Enterprise approach to
IA shows that it is
aligned with the
National IA Strategy.
Adherence to the
ISO/IEC 27001
standard and the
ISF Best Practices
Automated IA
Auditing and Risk
Assessment.
Aligned and harmonised
Cross-Domain
interconnectivity and
operations. Full
Business Continuity and
Recovery Planning
Resilience &
Sustainability
Assured
Information
Sharing
Trust
Management
Effectiveness
Level 2 –
Established
Technical Communication
protocols exist
Through-Life
IA Measures
Trustworthy
Level 1 –
Initial
Compliance
Required to define
and design a
resiliency and
tolerances into the
current architecture
Annual Reporting
Establishing an IA
Strategy and Audit.
Assurance
Implementing an
Information
Security
Management
System (ISMS)
Engineering Doctorate
They have an
External IA Review
Fault Tolerant
System of Systems
with graceful
degradation of
services and
functionality
SIEM implemented
Implementing a
Culture Change to
Information Asset
Management.
Cyber Power and
Shared Awareness
Monitored and
Controlled
Agile Shared Situational
Awareness
Page 109
Bridging the Air Gap: An Information Assurance Perspective
CHAPTER 3:
Modelling the Assurance Component
Information assurance (IA) is defined as "information operations that protect and
defend information and information systems by ensuring their availability, integrity,
authentication, confidentiality, and non-repudiation. This includes providing for
restoration of information systems by incorporating protection, detection, and reaction
capabilities.
Taxonomy of Information Assurance, 2003
Information Assurance (IA) is delivered through the assessment of information in
relation to:
Confidentiality - The property that information is not made available or disclosed
to unauthorised individuals, entities, or processes
Integrity - The property of safeguarding the accuracy and completeness of assets.
This may include the ability to prove an action or event has taken place, such that
it cannot be repudiated later
Availability - The property of being accessible and usable upon demand by an
authorised entity.
Ministry of Defence, 2011
These two definitions provide a clear indication that the institutional establishment has
formulated that Information Assurance is the risk adjusted reasoning behind the usage
of Information Security and its Protection mechanisms. In this chapter, that narrow
definition is redefined and expanded with arguments that Information Assurance
Engineering Doctorate
Page 110
Bridging the Air Gap: An Information Assurance Perspective
should be about the empowerment of the Social-Technical Enterprise to create a
trustworthy environment based on trusted communities of interests. Trust is a very
difficult virtue and is often considered the most noble of mankind; we want to trust
people, services and enterprises; and most often our trust is reciprocated providing the
bond to human society. However, we also fear being let down, used or our trust being
abused. Information Assurance is about bringing trust into Cyberspace, across
heterogeneous systems, in our exploitation and reliance of shared Information and the
ability to trust another person whom we have never met, but who shares our
community of interest. “Economic life is pervaded by culture and depends on moral bonds
of social trust. This is the unspoken, unwritten bond between fellow citizens that
facilitates transactions, empowers individual creativity, and justifies collective action,”
(Fukuyama, 1995). Trust is the foundation of the Socio-Technical Enterprise and the
very basis of this real and virtual global economy. “The speed at which Trust is
established with clients, employees and constituents—is the essential ingredient for any
high–performance, successful organization,” (Covey, Covey , & Merrill, 2008).
Chapter 1 argued for the need and purpose for Enterprise assurance is to provide a
resilient, dependable and safe environment that will change and shape the Enterprise
culture to become a trusted, sustainable operation capable of delivering its strategic
goals and mission. This strategic positioning of IA (Chapter 2.4) provides a framework
for the assurance of Knowledge, Information and Data process, storage and transit;
thereby providing the architecture of the interoperability of technology to the humancyber interexchange and the organisation structures which form from its business
processes. The IA component of the Information Domain is in fact based on 8Dimensions: Structure (Organisational and Architecture), Resilience, Dependability,
Safety, Security, Protection, Risk Management and Trust.
Assuring the Information Domain has progressed from the idea that it’s a function of
security (confidentiality, integrity, availability, access control; authentication; privacy,
non-repudiation and communication security as declared by the ITU-T X.805) to this
thesis declaration that it’s a function of a Socio-Technical Enterprise where Enterprise
defines the scope of industrious, systematic activity that creates a (profitable) business
organization which will return value to its stakeholders through their readiness to
embark on new ventures (with a high degree of boldness and energy), cross-domain
interaction and their contribution to the business processes. Creating a technology
intensive enterprise requires purpose; an engaging environment; harmonised and
aligned capability across agile human-cyber inter-exchanges and superior decision
Engineering Doctorate
Page 111
Bridging the Air Gap: An Information Assurance Perspective
making in a shared situation and culture. Since enterprises are complex socio-technical
systems, the effective use Information Exploitation (IX) and Information Operations
(IO) in the enterprise decision making process can be structured and analysed through
the adoption of Enterprise Architecture (Ross, Weill, & Robertson, 2006). Nightingale
and Rhodes (2007) define Enterprise Architecture (EA) as a set of views (Strategic,
Policy Process, Organisational, Knowledge, IT, Product and Service) which by:
"Applying holistic thinking to design, will evaluate and select a preferred structure for a
future state enterprise to realize its value proposition and desired behaviours."
Figure 35: The Information Pyramid Reference Model to Socio-Technical Enterprises
The Data Reference Component represents the transformation of Enterprise Data
across service platforms and IT infrastructures; technical services; data sensors; data
monitors; data processing; (hardware and software) product outputs and the
interfacing of communication and data networks (protocols, standards and data
structures). The US Government Data Reference Model (DRM) describes this
collaboration process as that “enables agencies to describe the types of interaction and
exchanges that occur between the Federal Government and citizens” through the
categorisation, structure and exchange of Data, (FEA, 2005). The Information
Exploitation component of the pyramid reference model is discussed in detail in sub-
Engineering Doctorate
Page 112
Bridging the Air Gap: An Information Assurance Perspective
chapters 3.3 and 3.4 where it examines the transformation of data into Information
Flows across the operational cyber processes (Information Operations), Information
Archiving
and
the
Human-Cyber
Interexchanges
(Information
Technologies,
Infrastructures, Services, Management, Assurance and Exploitation). The Knowledge
Transfer component of this pyramid reference model exhibits the Business Processes of
the Socio-Technical Enterprise which spontaneously reorganize the Enterprise Open
Systems to states of greater heterogeneity and complexity whilst achieving a "steady
state" at which it can perform Cognitive Processing, Knowledge Management (KM),
Knowledge Transfer and Decision Making across the Human-Cyber divide.
The Collective Wisdom of the Socio-Technical Enterprise, its ability to learn, be selective
and, within limits, self-regulating are the hallmarks of an Open System (Trist, 1981).
Although not parts of this thesis remit, Open System Architecture is an important
component of an Enterprise as it contributes to Enterprise Actualisation which exists
through its interoperability with the products and services of other Enterprises and the
evolving social interconnectivity. The creation of Shared Situational Awareness is the
goal of Enterprise Coalition and Partnership which is underpinned by a culture of Trust
and an understanding of the risk appetite of the Enterprise.
3.1 Assured Knowledge Transfer
Coalition military partners, and in particular the US and UK (and more recently UKFrance) have recognised the importance of transnational alliances for the conduct of
joint action operations and the need to create Cyber Environments that can Assure
Knowledge Transfer and dissemination of Information. This recognition has not been
lost with Governments, Businesses, NGOs and Charities (Brown, Khagram, Moore, &
Frumkin, 2000; Sogge, 2011; The White House, 2011).
The UK military vision of the “coalitions of the willing” (MoD, 2003) is that joint action
will be across all levels of the operational spectrum (from policing actions,
humanitarian assistance to theatre operations) and will require its Network Enabled
Capability (NEC) to provide close interoperability across the multi-lateral force
deployment. “This interoperability will bring its own set of technological, ideological,
organisational, procedural and cultural idiosyncrasies to the theatre operations…The
rapid, opportunistic exploitation of situational contingencies, the need to self-synchronize
and the requirements to synergistically marshal diverse military assets in the context of
agile force structures, require the ability to exploit and share information in ways that
Engineering Doctorate
Page 113
Bridging the Air Gap: An Information Assurance Perspective
transcend the traditional boundaries of national affiliation and operational
environment;” (Smart & Shadbolt, 2007)
The DIME evolution in Cyberspace has generated many challenges for the SocioTechnical Enterprise at all levels (Government, NGOs, Military, Multi-nationals and
SMEs). The US Centre for Strategic and International Studies CSIS paper “Cybersecurity,
Two Years Later” (CSIS, 2011) commented that after their previous report to the 44th US
President (CSIS, 2008) when “cyber-security was not a major issue for public policy” that
the overriding problem of security was intrinsically complex involving commercial
interests, concerns for privacy and the insecurity of systems to worms like Stuxnet. “We
thought then (2008) that securing cyberspace had become a critical challenge for
national security, which our nation was not prepared to meet. In our view, we are still
unprepared;” (CSIS, 2011). Enterprise Architecture provides a methodology to examine
these challenges and the US Federal EA has created a common approach to this analysis
as illustrated in figure 36.
Figure 36: The Common Approach to the US Federal Enterprise Architecture
Social-Technical Enterprise exists through regular commerce in Service and Product
Delivery, Functional Integration, Resource Optimisation and Information Interexchange
with other Enterprises, Institutions, and persons that has been created in its external
social environment (as scoped by the FEA’s 8 Levels - International; National; Federal;
Engineering Doctorate
Page 114
Bridging the Air Gap: An Information Assurance Perspective
Sector; Agency; Segment; System and Application). The Enterprise requires physical
supports for its activities - a workplace, materials, tools, and machines - a stable
organization of people able and willing to modify the material throughput or provide the
requisite services; (Trist, 1981). The Cycle-Rubik nature of the FEA Common Approach
Framework segments the organisation’s line of business as a current view (Governance
and Domain) and the shared services as a future view using eight basic elements
(Governance; Principles; Method; Tools; Standards; Use; Reporting and Audit).
Enabling Architecture
Driving EA into an organisation requires a cultural change as it require alignment and
integration of its shared services across the 5 Domain (6 if you include the cross
threading domain of security) from Strategy, through Business Activities, Information
Exchange, Systems and Infrastructure.
Figure 37: The Enabling Architecture of the Socio-Technical Enterprise (Richardson C. J., 2012)
This alignment requires us to rethink the common approach as the current model fails
to visualise the effects of (cross-thread) security and in particular a cyber-architecture
view of the information flow and it’s Information Assurance across the Socio-Technical
Engineering Doctorate
Page 115
Bridging the Air Gap: An Information Assurance Perspective
Enterprise. Figure 37 illustrates further cross-threading of the Enterprise Views as an
enabling architecture for the Socio-Technical Enterprise (Richardson C. J., 2012).
The model enabling architecture maps the Enterprise view that these interationships
are both multi-lateral and multi-layered. Both stacks (The Enterprise and Cyber Views)
are founded upon the common “real world” of network of networks (e.g. the Internet).
This physical world of data collection, process, transit and storage has been regulated
by international law and consensus from its online communities of interest where the
Internet Corporation for Assigned Names and Numbers (ICANN) manages Internet
domain names and IP addresses; The Triangle of Cyber Governance (MayerSchonberger, 2002) create Free Markets for Internet Commerce (Winn, 1997) and the
memorandum Request for Comments (RFC) administered by the Internet Engineering
Task Force (IETF), on behalf of the Internet Society, describes the behaviours, methods,
research and innovations applicable to the interworking’s of Internet-connected
systems (IEFT, 2012).
Whilst Enterprises create, develop and maintain the computer and IT products that
build these networks, it’s the usage of these IT networks as information infrastructures
that has created Cyberspace and this is encapsulated in the stack of the Enterprise
Architecture Views. The service that hosted on these cyber platforms are the starting
points for most Human-Cyber interconnectivity, whether it is the software routing table
of a network switch or the next Application on a Smart Phone these products bridge the
divide between the Real and Virtual Worlds. The business processes that drive the
creation of the products are operation decisions of the Enterprise management that are
reflected in their policies, procedures and practice. These views generate the corporate
knowledge
and
the
organisational
hierarchy,
reporting
chains,
roles
and
responsibilities. The strategic direction of the Enterprise is generated from an
understanding of its capabilities and the missions it intends to pursue.
Whereas, the Information-Stack (I-Stack), in the Cyber Architecture is concerned with
flow of information from the structuring, processing, transmission and storage of data
as information across its virtual logical infrastructures and upwards to create an
Information resource capable for exploitation, decision making and building of a shared
situational awareness.
Engineering Doctorate
Page 116
Bridging the Air Gap: An Information Assurance Perspective
Organisation’s Inherent Inabilities
“Knowledge about something is called declarative knowledge. A shared, explicit
understanding of concepts, categories, and descriptors lays the foundation for effective
communication and knowledge sharing in organizations. Knowledge of how something
occurs or is performed is called procedural knowledge. Shared explicit procedural
knowledge lays a foundation for efficiently coordinated action in organizations.
Knowledge why something occurs is called causal knowledge. Shared explicit causal
knowledge, often in the form of organizational stories, enables organizations to
coordinate strategy for achieving goals or outcomes;” (Zack, 1999).
In the creation of the Knowledge Economy, the interoperability of socio-technical
enterprises has becoming a unifying feature. The tacit or explicit nature of Knowledge
requires it to be managed as both as an object (a thing to be stored and manipulated)
and process (of simultaneously knowing
and acting; i.e. applying expertise).
Within this new economy there is an
increasing role for Explicit Knowledge
(corporate wisdom, procedure manuals,
product
literature,
or
computer
software).
Figure
38: System
Security Failings:
Insecurity in the Enterprise and its
operations
The assurances to the social element of the Enterprise Knowledge Transfer, Memory
Archiving, Expertise and Knowledge Management are far more complex than the
technical protective solutions of encryption, physical isolation and alternate site
storage, business continuity training, redundant system provision and the use of RAID
and Cloud technologies. Inter-exchanging Enterprises must efficiently and effectively
capture and share their knowhow, expertise and business products whilst protecting
their intellectual property rights and knowledge assets. It’s their ability to bring their
shared knowledge that will bring new opportunities and reduce the threats. Corporate
knowledge has intangible components rarely exhibited in technological systems but are
readily identified and have become vulnerable to threats and attacks within the SocioTechnical Enterprise. If these threats manifest themselves into attacks and their
Engineering Doctorate
Page 117
Bridging the Air Gap: An Information Assurance Perspective
security fails, These Enterprises could degrade to a sequence of deleterious debilitating
and disaffecting socio-technical event which could equally lead to irrefutable damage to
the Enterprise. Too few Enterprises have appropriate Knowledge Management policies
and capabilities to leverage and protect their Knowledge Capital. The agile sociotechnical environment has a complexity of rapid changes to their share awareness with
technological discontinuity; emergent properties, insidious exploitation and malicious
cyber-attacks as well as time sensitivity of their information flows and the use of
obsolete data. Collective and critical decisions are made from the Knowledge, Expertise
and Information available. This environment has to be resilient, robust and trusted.
Introducing Information Assurance to the Enterprise
Bringing Trust into the Socio-Technical System to safeguard operations and risk
manage the threats is the strategic purpose of Enterprise Information Assurance as
illustrated in figure 39.
Figure 39: The Assured Space – Structured, Dependable, Secure and Trusted
The key attributes that assured space offers to the Socio-Technical Enterprise are:
1. Information Assurance provides effective and timely exploitation of information
through the provision of dependable, resilient operations and mitigates the
contagion of fear, uncertainty and doubt within Cyberspace.
2. Information Assurance is fundamental to all aspects of the Enterprises business
processes from the successful conduct of its Information operations to the
management of its Knowledge and Information assets.
Engineering Doctorate
Page 118
Bridging the Air Gap: An Information Assurance Perspective
3. Information Assurance ensures stakeholder confidence that Information
Systems Risks are managed pragmatically, appropriately, and in a cost-effective
manner that maintains the value of the Enterprise.
These attributes can be mapped across the components of cyberspace as illustrated in
figure 40. The defensive nature of this map illustrates the key issues of an Assured
Enterprise: (1) its physical systems are made safe and protected by a (2) cyclic array of
functions (deterrence, restoration, removal, detection and attribution) under the
control of (3) the CND Operations; (4)the resilient system architecture and awareness
of the human factors involved allows for greater understanding of motivation and
intent which allows for (5) better risk and trust management of (6) the Information
Flows that provide better decision making, knowledge transfer and creation of a Cyberbased Shared Situational Awareness for the protected communities of interest.
6
3
5
4
2
1
Figure 40: Mapping the Defensive Components of a Socio-Technical Enterprise (Richardson C. J., 2012)
Engineering Doctorate
Page 119
Bridging the Air Gap: An Information Assurance Perspective
The 3-Layers of Understanding
Cyberspace interfaces the real and virtual world of our human endeavours. It’s a real
domain of computers, switches, storage area networks, data protocols, communication
devices and network of networks whilst the virtual world expands our mind, cognitive
powers and imagination. A domain of computer generated art, games, programmes,
animated objects and massive computational power. Cyberspace is a creative domain
rich in adaptability, opportunities and innovation, but also a complex, vulnerable state
of human exploitation, crime and hostility. The project of Cyber Power by the SocioTechnical Enterprises is a dichotomy of Taoism, the white domain of trustworthy
endeavours and the black domain of hackers and malice. However, as in the real world
of human interaction, the contextual continuum of cyberspace has many shades of grey
in its Tao world and this is reflected in figure 120 with its 3 stack components of
understanding: Knowledge, Information and Data.
REAL
Networks
and Data
Highways
Data Stack
VIRTUAL
Cyberspace
Information Stack
Knowledge
Transfer
Repositories
Knowledge Stack
Figure 41: The Contextual Continuum of Real and Virtual Space
The first layer is the Data Stack (D-Stack) that provides for networked devices, entities
and sensors to collect, disseminate, process and store digital material. The rate of
growth and exchange of data across these networks of networks places many demands
on network and traffic engineering: increased bandwidth; dense multiplexing; faster
computing (increasing the CPU’s million instructions per second rate- MIPS) and
Engineering Doctorate
Page 120
Bridging the Air Gap: An Information Assurance Perspective
greater use of fibre-optic switching networks. The ease with which these demands
increases with the escalation of data, data services and data storage overwhelms the
physical infrastructures and has created a more agile, but more vulnerable,
environment of virtual machines and cloud communities. These virtual domains are
dependent to the system architectures they are based upon. These architectures
although expedient to the demands of users are also an Enterprise security risk to the
social-technical communities that rely upon them, (MacIntosh, 1998; Zittrain, 2008).
The second layer is the Information Stack (I-Stack) that provides a seamless
transformation and transmission of data structures (information) across the
Information Infrastructures hosted in Cyberspace. This Information Domain has many
influencing doctrines (IX, IA, IM, IO and IW), policies and practices that determine the
quality, presentation and dissemination of the Information assets. The third layer is the
Knowledge Stack (K-Stack) which is a domain that is recipient of the Information
presented and the experience of the communities of interest.
The human-Cyber
Interexchanges are formulated within this domain as we begin to understand the
emergent nature of cyberspace and the adaptation of new commodities, entities and
services that evolve the socio-technical Enterprises. Information Assurance and
Enterprise Architecture provide a lens to this Cyber Domain. It is the nature of building
bridges to close down the gaps in our knowledge, system capability, skills, experience
and education that enthuses our desire and necessity to understand how the
interdependencies of these 3 stacks create the new real and virtual world of the SocioTechnical Enterprise.
Business Drivers
Cyberspace and the world created by the operations and interconnections of SocioTechnical Systems and the Enterprises that sustain them is a rapidly changing
environment.
Enterprise Architecture and its business drivers benefits the
organisation as it provide long-term structure and direction to the superior decision
making process, business processes and the Enterprise Shared Situational Awareness
as illustrated in table 13. This creates a business imperative for the success of
Enterprise Architecture that paradoxically becomes increasing harder to implements as
the changes to system capabilities and the environment accelerate. The key to
successful implementation of Enterprise Architecture is to make it relevant to real-time
operations and to-date most implementations have not fully lived up to expectations.
Engineering Doctorate
Page 121
Bridging the Air Gap: An Information Assurance Perspective
Table 7: Business Drivers and Benefits of Enterprise Architecture (Jones J. , 2012)
Enterprise Architecture Business Drivers
Leveraging New Technology
Compliance
Increase Profitability
New Markets
Business Value Generation
Rapidly Changing Business Environment
Better Utilization of Resources
Mergers and Acquisitions
Integrating a number of cultures in a disparate organization
Collaborative working with external parties
Getting people within an organization to work together effectively
Achieving compliance with Government regulations in a cost effective
manner
Enterprise Architecture Business Benefits
Creates an structured environment for Superior Decision Making
Promote a climate of continuous business evolution, improving
everyone's quality of work and deliverables
Enhance business flexibility by providing an adaptable framework, more
supple structures and best business practices
Share skills, experience and knowledge to increase asset values
Generates the business technology infrastructures to deliver cost
effective results
Bring business resources together to create a boundary-less business
Understanding business systems that builds cyberspace and appreciating them as
socio-technical systems in the context of enterprise architectures is in itself a major
piece of research and development. Enterprise Architecture aims to provide a coherent
approach for analysing the driving (strategic, operational and tactical) business and
technological factors that lead to strategic business aims, goals and missions. The
essential component to the efficient implementation of EA is properly aligning the
people, process and technology aspects of the enterprise to business drivers which
firmly lies within the domain of Information Assurance. Studying the architecture of
Enterprises can transform behavioural use cases, operational assumptions and
constraints and how the business drivers provide the basis for planning and designing
an information system and the creation of a shared awareness and superior decision
making as illustrated in figure 42. The alignment of Information Services and
Technology for Enterprise System Interoperability allows for the availability of
trustworthy knowledge, information and data services whilst ensuring traceability and
reducing risk of decision promotes a more sustainable, efficient and effective SocioTechnical Enterprise.
Engineering Doctorate
Page 122
Bridging the Air Gap: An Information Assurance Perspective
Trust
Alignment
Risk
Mitigation
Superior Decision Making
Figure 42: Enterprise Architecture Business Drivers
Information Vision
Modern society is increasingly reliant on the storage, processing and transmission of
information. Ensuring the integrity, security and privacy of information is thus
paramount, regardless of whether the information is at the level of the citizen or at a
national or international level. Moreover, future trends (as outlined in the Information
Society Technologies Advisory Group (ISTAG, 2004) report, for example) in the so-called
Ambient Intelligent Space (ISTAG, 2003) will only increase the role of information and
our reliance on it. This brings with it great opportunities to enhance our quality of life, but
at the same time, presents major challenges in terms of the privacy and integrity of
personal information.
(Martinelli & Quisquater, 2005)
Western Critical Information Infrastructures are becoming more highly dependent
upon the global cyber infrastructure. The increased automated and complex
interconnections where network routings between Private Enterprises and
Government Agencies (Gasper, 2010) has made it less practical to erect barriers
between military and civilian operations (Glebocki Jr., 2008) and many current barriers
and information fortresses are actually operating against national interests (Hundley &
Anderson, 1995; Allor, 2007; Dunlap, 2008). There is a common understanding that
achieving greater security in information and communications technology (ICT) would
Engineering Doctorate
Page 123
Bridging the Air Gap: An Information Assurance Perspective
increase its development and diffusion, with concomitant benefits in many fields. While
this technology is already spreading rapidly, it will only be possible to translate our
physical interactions into electronic interactions if sufficient trust and confidence exist
in the systems that process our information. The integrity, security, quality and privacy
of information and communication are thus paramount, in everything from personal
information transfer to government and critical infrastructures. It is now widely agreed
that lack of trust in systems will prevent their widespread adoption. As a consequence,
the development and deployment of systems with strong effective security is vital. In
addition, modern ICT systems may consist of up to several thousands of computation
and communication resources whose number dynamically changes and thus are getting
closer to creating Cyber communities; irrespective of the geographical location of the
assets. In this new framework, the capability to represent, create, negotiate, monitor
and evolve trust relationships in a secure way becomes mandatory.
Trust and security are key enablers of the Information Society. For citizens to use and
feel comfortable with e-Government services they must have confidence that their
online services are trustworthy and secure. Similarly, for consumers and SMEs to use ecommerce and e-business they need confidence in the security of online transactions
and that the data presented is timely, relevant, consistent and accurate. As access to the
Internet diversifies, from PCs to digital TVs, mobile phones and wireless devices, people
feel increasingly concerned about the protection of their assets and privacy in this
networked world. These aspects will become more and more important as we move
towards the smart digital environments based on many interacting objects, devices and
systems. In the future, personal area networks and embedded computer chips will be
everywhere in our cars, our homes and even in our clothes.
Security in such extensive inter-connected environments will require solutions very
different to those of today, and its social acceptance will require totally novel
approaches to identity and privacy management through user-friendly and trustworthy
interfaces, taking into account the privacy needs and data protection regulations in
place. Underlying the service and user interface level we must give attention to the
information and network security infrastructure. Modern service organisations, such as
banking and finance, healthcare, energy, transport and others, rely on ICT for data
exchange and control, creating strong mutual dependencies. These critical information
infrastructures must be dependable and resilient, protecting against malicious attacks,
ensuring tolerance towards and recovery from attacks, and adaptable to the changing
security requirements. “Information Superiority enables decision-makers at all levels in
Engineering Doctorate
Page 124
Bridging the Air Gap: An Information Assurance Perspective
all environments to make timely and informed decisions. It therefore contributes to the
Defence Information Vision by delivering benefits in agility, effectiveness and efficiency, “
(MoD, 2011).
The four, enduring, key benefits derived from the Defence Information Vision (MoD,
2011)are:
1. Improved Effectiveness – Our outputs are better when they are enabled by
improved information flows;
2. Agility – Information can be accessed and manipulated whenever and wherever
required, subject to affordability and security constraints;
3. Efficiency – Operational and their supporting processes are more efficient, both
because information flows through them better, and Management Information is
available to govern them;
4. Compliance – We comply with our legal and cross-Government obligations, so
that we can focus our resources on supporting operations, while maintaining the
Departmental reputation.
The effects that underline the benefits of MoD’s Defence Information Vision are:
Strategic Alignment, Accessibility and Trust; Value for Money and Information
Exploitations and these fall within the conclave of the Information Assurance Domain
and create further benefits to the Department.
Superior Decision Making
“Decision making is the process of sufficiently reducing uncertainty and doubt about
alternatives to allow a reasonable choice to be made from among them. This stresses the
information-gathering function of decision making. It should be noted here that
uncertainty is reduced rather than eliminated. Very few decisions are made with absolute
certainty because complete knowledge about all the alternatives is seldom possible. Thus,
every decision involves a certain amount of risk. If there is no uncertainty, you do not have
a decision; you have an algorithm - a set of steps or a recipe that is followed to bring
about a fixed result,“ Robert Harris, 2009.
“An accurate description of information requirements is a prerequisite for
effective information management,” (Choo, 2002).
Generally, people make poor and/or risky decisions, often with “gut” instinct rather
than gleamed cognitive knowledge, risk assessment and accurate intelligence. Decision-
Engineering Doctorate
Page 125
Bridging the Air Gap: An Information Assurance Perspective
Making should be considered a sophisticated aspect of Assurance, provisioned with
better information sharing, better understanding, and some taught effective techniques
and skills of what decision making involves, people would acquire superior decision
making. This understanding would make decision making a study of identifying and
choosing alternatives based on the values and preferences of the decision maker (Harris
R. , 2009; MoD, 2009). Within the structured military hierarchy, the C2 apparatus and
the soldier’s roles and responsibilities are well defined, exercised and evaluated.
Training, reflection and operational tours complement and increase their body of
knowledge. Military commander’s problem solving and decision making processes are
essentially co-ordinated tasks of planning, directing, and controlling where problem
solving knowledge is acquired mainly from military actors: instructors, advisors,
commanders, staff or from peer group learning in most training scenarios, combat
situations and operational planning.
These actors provide multiple perspectives
(deriving from their expertise, experiences and knowledge) to time and often
resourced constrained situations and in high tempo operations their decision making
processes in joint actions can be unstructured, incommensurable, generating conflicts
of interests and inaccuracies to the joint operational picture with intangible and often
ambiguous quantitative or qualitative apparatus providing, using and disseminating
disjointed and misleading information and where often the time sensitivity pressure
and limited resources combine to cause uncertainties and doubts arising from
unexpected internal and external situations.
A military operation is a complex, interaction of men, technology, weapon platforms,
communications and the projection of force. The operational activities need reliable,
trusted information that can be passed seamlessly across multiple security domain,
forces, organisations, networks and individual by respecting complex and possibly
conflicting sets of policies, but above all the information needs to accurate, timely and
managed. The Information Value Chain as illustrated in Figure 43 supports the NEC
Benefit Chain as it illustrates that a seamless flow of information needs which are
"contingent, dynamic and multifaceted” (Choo, 2002) to get the right information at the
right time to make the right decisions (MoD, 2005). The model’s primary activities
involve the direct handling and management of information resources, these resources
are analysed in ways that increase their value: information acquisition, information
processing and information distribution and finally through cognitive processes it is
acted upon and learnt. Although this model generates and manages the flow of
information, it does not provide objectivity or governance to the management and
administration of information.
Engineering Doctorate
Page 126
Bridging the Air Gap: An Information Assurance Perspective
Figure 43: Information Value Chain for government, (Gresham & Andrulis, 2002)
Making a decision implies that there are alternative choices to be considered, and in
such a case we want not only to identify as many of these alternatives as possible but to
choose the one that has the highest probability of success or effectiveness and best fits
with our goals, desires, lifestyle, values, etc. Within the military, and in particular the
joint information environment, Dull (2006) stated that the changes in the Joint Doctrine
needed to take account that decision making was biased by five key assumptions:
1. Quality of information of value to decision makers is subject to influence from
geography, language, culture, religion, organization, experience, or personality.
2. Decisions are made based on information available at that time
3. Third, the relevant aspects of the information environment and processes used to
make decisions are understandable.
4. Fourth, it is possible to affect the information environment of decision makers
through psychological, electronic, or physical means.
5. Finally, the effectiveness of actions relative to an objective is measurable
(Dull, 2006)
Information is critical for every aspect of modern life (Brown & Duguid, 2002) and the
quality of information largely determines the quality of decisions made, and, ultimately
it affects the quality of activity and action outcomes in organizations and in the society
in general (Stvilia, Twidale, & Smith, 2006). The Information Assurance of these five
assumptions can provide protection (psychological, electronic, or physical),
dependability (reliability, safety and continuity) and integrity to the Information flow
and provide asset value and this can provided at the strategic level as well as
Engineering Doctorate
Page 127
Bridging the Air Gap: An Information Assurance Perspective
operationally. Information Quality can be summarised by the following eight key
attributes:
ACCURATE
Information must be true, verifiable, and not deceptive.
Accurate information is based on empirical data and can be
validated by comparing sources or checking for internal
consistency.
CURRENT
The information must be applicable to the present time. Keeping
information concurrent requires a process of storage and
destruction.
RELEVANT
Relevant information applies to the interests of the individuals who
use it for the decisions they are facing. It should reduce a person's
uncertainties about work and education while facilitating choice and
planning.
SPECIFIC
For information to be specific, it must contain concrete facts.
General observations are often interesting and can provide a
background for further analysis, but specific facts are essential
to realistic planning and decision making.
UNDERSTANDABLE
People using information must be able to comprehend it before they
can use it. Data must be analyzed and converted into words. The
content of the message should avoid ambiguities and be informative
to the intended audiences.
COMPREHENSIVE
The information should include all the important categories within
its scope of coverage.
UNBIASED
This characteristic is about the motivation or purpose for which the
information is being produced and delivered. It is unbiased when the
individual or organization delivering the information has no vested
interest in the decisions or plans of the people who are receiving the
information.
COMPARABLE
The information presented should be of uniform collection, analysis,
content, and format so that you can compare and contrast the
various occupations, programs of study, and schools.
Table 8: Attributes of Information Quality (Wang R. Y., 2005a)
Asset value can be constructed by the Information Value Chain (Schwolow & Jungfalk,
2010) as illustrated in Error! Reference source not found. which remonstrates the MoD
nformation model of action and behaviour (MoD, 2009b) however develops Porter’s
classic Value Chain Model (Porter M. E., 2001) and taking accounts of Choo’s process
model of information management (Choo, 2002). Furthermore, this model usage of
Senge’s five disciplines: Systems Thinking,; Achieving Personal Mastery; Shifting Mental
Models; Building Shared Vision, and Team Learning . These provides momentum
towards system engineering and organised learning (Senge, Kleiner, Roberts, Ross, &
Smith, 1994) and Marchand’s Information Technology practice capability framework
Engineering Doctorate
Page 128
Bridging the Air Gap: An Information Assurance Perspective
(Marchand, Kettinger, & Rollins, 2002a) allowed Schwolow and Jungfalk to formulate
their Framework for Strategic Information Management Although the Information
Value Chain model doesn’t explicitly cover Dull’s observations to generating decision
making, it effectively manages and drives the information usage information-gathering
function of decision making. Whereas, the nested model, Figure 44, is inclusive of
Harris’s Decision-Making definition to Dull’s five points, Information Quality and the
two Information Value Chains. This Superior Decision Making Information Framework
takes the issues of the Quality of Information (impact of the environment, authority,
scope of coverage, and objectivity), its availability (accurate and timely), assurance
(structured, managed, dependable, protected and trusted), the need to share
(measureable and effective) and the cognitive process of knowledge transfers (making
information understandable). These five elements influence and provide direct
incentives for individuals and organizations to engage in the Information Management
processes of Governance, Administration, Services and Infrastructures.
Superior Decision Making
Quality of
Information
Information Management
Information
Availability
Information
Assurance
Information
Sharing
Knowledge
Transfer
Information
Governance
Information
Administration
Information
Services
Information Useage
Information
Acquisition
Information
Processing
Information
Distribution
Information
Infrastructures
Figure 44: Superior Decision Making Information Framework
Information Governance as expressed by Gartner (2010) is: “The specification of
decision rights and an accountability framework to encourage desirable behaviour in the
valuation, creation, storage, use, archival and deletion of information. It includes the
processes, roles, standards and metrics that ensure the effective and efficient use of
information in enabling an organization to achieve its goals.”
Engineering Doctorate
Page 129
Bridging the Air Gap: An Information Assurance Perspective
Numerous Information strategies have commented on its Governance (Cash, et al.,
2004; Van Grembergen, 2004; Garson, 2006; Van Grembergen & Dehaes, 2007). The
volume and variety of digital information is evolving, exploding and been continually
exploited by innovative methods. Structured (appropriately authorised) and
transparent services which use information are becoming more instrumented,
interconnected and intelligent (Palmisano, 2008).
Vision, Alignment &
Assurance
Culture,
Governance
networking
and creative
Structure,
Enterprise Management
Systems &
Enterp
Innovation
Social
rise
Technical
Servic
es
Figure 45: The Governance of a Socio-Technical Enterprise
Our cyber connected enterprises require their operations to analyse new information
faster and make timely decisions for achieving business goals within budget to achieve
economic advantages and competitively. Sustainable management of information
quality, through the Information Lifecycle and Value Chains is delivered through
Information Governance (Salmela, 1997; DeLone & McLean, 2004).
Engineering Doctorate
Page 130
Bridging the Air Gap: An Information Assurance Perspective
3.2 The I-Stack Model
Cyberspace is a holistic overview of the Real and Virtual Socio-Technical world of
online interactions; the World-Wide-Web, Computing networking and capacity and
Enterprise Services meeting an increasing demanding community of users. The three
underpinning elements of the contextual continuum of cyberspace (figure 120, p 120)
were the Knowledge, Information and Data Stacks. This concept of an Information Stack
stems from the pyramidal context of transforming data to wisdom and has been
represented as the components of Enterprise Information Architecture (EIA). These
five components: Knowledge, Information, Enterprise, Technology and Data (as
illustrated in figure 128); have been the linchpin for many architectural models, e.g.:
Information Architecture for the World-Wide-Web by Louis Rosenfeld and Peter
Morville; Decision Driven® Information Architecture by John Fitch and Information
Architecture by Richard Saul Wurman at the Information Architecture Institute.
Cyberspace33 is also a noted component of the 21st Century Information Domain and
should have its own part of MoD’s Environmental Operating Concepts34 (EOCs). Current
UK Information Security Polices (DIAN 08, 2006; CESG, 2009 and JSP 440, 2010) have
declared how the UK military will use Cyber Operations35 within its current Defence
Conceptual Framework (Command, Operate, Inform, Prepare, Project, Protect and
Sustain) in light the UK Strategic Security and Defence reviews (2010) this will impose
some insurmountable technical obstacles to current doctrine. An adaptive Operational
Security (OPSEC), holistic, real and virtual, Information Assured cross-domain cyber
solution with an inclusive and extensive risk assessment policy that Bridges the Air
Gaps is required.
The mapping out of the Information Domain into clear interdependent, but
independent, disciplines is essential for understanding the complex behaviour of the
Human-Cyber Interchanges within system domains and system of systems.
33
JDP 3-70 (2008) “Battlespace Management” Ministry of Defence, p 1-3.
34
The current EOCs are the Future Land Operational Concept (FLOC); the Future Maritime
Operating Concept (FMOC). The Future Air and Space Operating Concept (FA&SOC) and the Future
Electromagnetic Operating Concept (FEMOC).
35
DCDC/200080604/JtCon/Operate/Cyber “A stocktake of MoD’s Cyber Capability” 5 June 2008.
Engineering Doctorate
Page 131
Bridging the Air Gap: An Information Assurance Perspective
Organisations, Business
Knowledge
Enterprise
Processes, Decision Making,
Governance, Shared Awareness
Knowledge Management
Information Flow, Exploitation
Enterprise
Information
Operations and Storage;
Assurance and Management;
Content, Format, Presentation
Service Orientated Architecture
Enterprise
Service
Applications
Automated Processing
ITIL & Service Desks
Infrastructures
Enterprise
Technology
Systems Engineering
Smart Systems
Communications
Physical Database Design
Enterprise Data
Database & File Structures
Data Dictionaries
Protocols, Packets & Routing
Figure 46: Components of Enterprise Information Architecture (EIA)
The Information Stack (I-Stack) is a mapping framework to identify the joint functions
of independent components of the Information Domain and their main linkages and
dependencies. The purpose of this model is understand the Information Flow across
the domain, the interdependent role of Information Operations and Exploitation to
enable Enterprise information sharing, transmission and storage in an assured and
Engineering Doctorate
Page 132
Bridging the Air Gap: An Information Assurance Perspective
managed environment as illustrated in Figure 47. The framework encapsulates a
number of existing models and places the physical domain of the Internet (and its
variants and off-spring) as a component of its Cyberspace.
Figure 47: The Information Stack and the Joint Functional Concept
The Socio-Technical Centre of Gravity
MoD’s Information Strategy (MoD, 2009; MoD, 2011) declared that we need to be better
informed to create a better defence. The strategy identifies the need to order to protect
the information assets and that the Process Owners, Information Assets Owners and
individuals need to become aware of the governance and security policies, business
drivers and continuity planning, Risks and to be accountable for their roles and
responsibilities when handling information. This needs to be in concert with continued
capability development and investment in specialist skills, whilst maintaining close
partnerships with OGDs, allies, industry and academia. This will allow the Department to
manage its information risk effectively (MoD, 2011).
Engineering Doctorate
Page 133
Bridging the Air Gap: An Information Assurance Perspective
Figure 48: The Influence of Assurance to the MoD S's Information Strategy
The key benefits from adopting this strategy were declared as: Improved Effectiveness;
Agility: Efficiency and Compliance. The strategy introduced its 3 MODIS pillars
(Enterprise Architecture, Skills and Information Assurance) has recognise the need for
strategic positioning of the Information Asset and that its value can be further
appreciated through sharing whilst its sensitivity still requires appropriate protection
and security. The Ministry of Defence Architecture Framework (MODAF) describes a
set of protocols on how MoD will organise information about the business and deliver
information to the right person. The second MODIS pillar is concerned with ensuring
that the “right person” has the necessary skills and behaviours to service, manage,
protect and exploit it.
To support better decision-making, information needs to be assessed, analysed,
combined with other information and knowledge, and presented in a timely and
meaningful way; i.e. information needs to be delivered at the right time! The third
MODIS pillar is Information Assurance, which ensures that the Information is delivered
dependably and securely to the appropriate decision makers, thereby giving it the right
information to the right person, at the time! In this chapter, the IA Model will develop
the themes of how this is achieved and its influence on the two other pillars. The
integration of the 3 pillars allows for a more agile, secure and dependable environment,
where the systems are resilient, robust, tolerant and protected and information flows
are trusted, risked managed and safe through the use of Enterprise Architecture (EA),
Information & Data Architectures, Technical Architectures and Information Assurance
Architectures (IA2). Such an assured capability and risk appetite has the potential to
Bridge the Air Gaps and allow Cross-Domain Solutions.
Engineering Doctorate
Page 134
Bridging the Air Gap: An Information Assurance Perspective
The Information Asset as the Centre of Gravity
“The centre of gravity is the dominant characteristic of a force, the “hub of all power and
movement, upon which everything depends . . . the point against which all our energies
should be directed.”
Carl von Clausewitz, On War, 1832
Without the timely and effective use of information our decisions become jaded,
inappropriate or suspect. Whilst assured information is valuable, it’s the context it is
used in that values it as a commodity, i.e. information must be relevant. Military
Commanders and their strategists develop and execute missions, operations and
campaign plans based on a number of factors such as Strategic Purpose, the
environment, capability, the threat, Intelligence, Joint Force structure, weapons
technology, legal and their own experiences and education (cultural). Education in
military doctrine, theories and practice helps the field officers to understand and
explain the occurrence of an event or state of nature (MoD, 2010c).
Theory can provide a framework to consider how to approach a problem. It can help one
consider issues or questions to solve before making detailed approaches toward
developing a theatre strategy or campaign plan. If a theory is sound, then one could use it
to solve problems by predicting possible outcomes, identifying potential problems, and
finding options to get an opponent to take certain actions or modify his behaviour. Theory
can provide a foundation to help military strategists contemplate or evaluate potential
courses of actions (Chun, 2010). The use of centre of gravity36 (Fowler, 2002) has been
developed into this Seven Ring Concept Model to illustrate (Figure 135) the possible
36
US Joint Publication 5–0 defines centre of gravity as comprising “the characteristics, capabilities,
and/or sources of power from which a system derives its freedom of action, physical strength, and the
will to fight (take action).
Engineering Doctorate
Page 135
Bridging the Air Gap: An Information Assurance Perspective
influences of multiple centres of gravity (Economic, Diplomatic, Military, Political,
Social and Cyber) affecting the Information Domain. In this model, the complex system
property of emergence and the patterns that arise out of the interconnectivity and
multiplicity of its node’s relatively simple interactions produce integrative levels within
the model where the sum of the collective nodes is less than the sum of the whole
system. The model thus represents a holistic view of the Information Domain rather
than building views from the domains in which it interacts.
Figure 49: The Strategic Information Asset Seven Ring Concept Model
The heterogeneous nature and any relative importance of the key nodes within each of
the seven elements should not have, as properties of that element, strategic or
operational effects on those they link to. However, as the model illustrates, the
surrounding centres of gravity become subservient to their role when they act
interactivity and influences the whole system. It is the emergent consequences of these
key nodes (threats and opportunities) and their linkage (that may represent strengths
and weakness) that comprise subsystems with an element (thereby creating the
individual element’s Centre of Gravity) generating new properties when the systematic
Engineering Doctorate
Page 136
Bridging the Air Gap: An Information Assurance Perspective
effect of act collectively with layers of interoperability (inclusive of the Information
element) which truly reflect the importance of the Information domain to the global
economy.
Figure 50: EBO Steps to creating the Centre of Gravity, (Vego, 2006)
EBO needs to link the strategic objective to the desired end state for the steps to
creating the centre of gravity cannot be considered in isolation from the military’s
operational objective as illustrated in Figure 50. It is the objective that determines the
situation and subsequently the level and scope of the analysis of enemy and friendly
critical strengths and weaknesses. The impetus from EBO is that System of System
Architecture has to articulate the positioning of Socio-Technical Enterprise. The
strategic objectives of the Enterprise are influenced by the 7-ring concept model and its
centres of gravity. This is an important research topic to be explored by the Assurance
Community. Emergent properties of complex systems are rarely anticipated and often
are unknown. The nodal properties that generate the uncertainties may represent
opportunities to the Enterprise but also threats whereas the linkages can be used to
determine the strength of assurance against the vulnerabilities the system produces.
The understanding of the causal component of Emergence is a major factor in creating
a trustworthy environment and will become a bridge linking System Engineering and
Information Assurance (SEnIA).
Engineering Doctorate
Page 137
Bridging the Air Gap: An Information Assurance Perspective
The Policies and Practice Framework
“Information needs to be clear, accurate, trusted and not compromised, lost, leaked,
disseminated, unauthorised, published or corrupted.”
(Fenz & Ekelhart, 2009).
The strategic value of this asset is maximised with effective Information Usage;
ensuring that it is available as a shared, easily accessible service within an organisation
and a sound Information Management Doctrine with good governance, business
continuity, administration, dependable infrastructure and services as indicated in the
IA Policies and Practice Framework (Figure 51). It is incumbent of any information
system used to structure, store, exploit and transfer data has to be capable of tagging
and logging the storing, retrieving, moving, copying, modifying and deleting of any
information. “Under the current DoDI 8510.01, IA managers encounter difficult obstacles
associated with monitoring IA situational awareness, conducting IA control validation
activities, summarizing validation results, and attempting to preserve the IA posture of
their systems individually and collectively as part of a larger System of Systems,”
(Landree, Gonzales, Ohlandt, & Wong, 2010)
The IA Policies and Practice Framework (Richardson C. J., 2012) provides the
practitioner a comprehensive matrix of the important issues of Information Assurance
in a Socio-Technical Enterprise. The 12 Domains of the Framework are:
Administration Policies
Auditing
Risk Management
Business Continuity
Personal Security
Enterprise Security
Physical and Environment Security
Communication Security
Infrastructure Assurance
Cyber Assurance
Incident Management
Standards
The military Cross Domain Solution (CDS) requires an assured system architecture that
provides an automotive and/or manual ability to access, transfer and store data
between two or more differing security domains (DoD DISA, 2008). The US DoD Cross
Engineering Doctorate
Page 138
Bridging the Air Gap: An Information Assurance Perspective
Domain Solution is planned to provide net-centric, service-oriented, cross domain
information sharing solutions with guaranteed quality of service for authorized users
anywhere on the DoD’s Global Information Grid (GIG). Within the UK’s MoD there is a
need resolve the assurance and accreditation concerns of CDS within the ISTAR
community.
Figure 51: IA Policies and Practices, (Richardson C. J., The Assurance of Socio-Technical
Enterprise Operations, 2012)
There are a plethora of operational Communication and Information Systems (CIS)
which we continue, to want, to integrate both within existing command structures and
with our coalition partners. These systems of systems grow out of operational necessity
Engineering Doctorate
Page 139
Bridging the Air Gap: An Information Assurance Perspective
and are becoming more interoperable and integrated platforms that formulate an
interdependent, complex Enterprise Architecture (EA) as illustrated in figure 140. Such
new EAs will require considerable time and skill to complete full accreditation, and the
accreditation process itself will need to converge with all partners. This expansive,
evolving environment (SPS Components) will exhibit emergent properties that the
stove-piped, single discrete security domain accreditation approach may overlook.
Furthermore potential vulnerabilities introduced at the interface between an everincreasing number of exploitive Information Services and Systems and by increasingly
complex network connections may be undiscovered. There will also be consequential
expense (cost in time, further analysis, training and verification) implications to assure
these aggregated, heterogeneous Information Systems for Accreditation.
The Information Assurance Diamond Model
The Information Domain as illustrated in Figure 51 has a number of Enterprises and
other formations that exploit the services, systems and archives of the Information
Storage and Service Domains. To ensure that the information flow is trustworthy, the
model requires a holistic IA Framework. Taking Information Assurance as the focal
point of a resilient, robust military network, the central Information Service Domain in
figure 140 requires an Information Security policy to protect the Service Domain from
any malicious error, fault and failure conditions.
IA
•IM
•IS
•IT
IS
FR
•Policies
•Protection
•Failure
•Restoration
Information Assurance aligns the Information Domain interconnectivity with a
structured approach that reflects the trusted roles and responsibilities of the
communities of interest, their vetting, clearances and access privileges.
IA
• Architecture
• Security
Engineering Doctorate
S
• Organisation
• Resilience
T
• Empoyability
• Reliance
FR
• Safe Operation
• Expertness
Page 140
Bridging the Air Gap: An Information Assurance Perspective
These Enterprise systems need to provide safe and dependable operations to
reduce the incidents of system faults and failure.
IA
• BCM
• Disaster
Planning
ID
• Availability
• Safety
FR
• Faults
• Failure
Risk Management reviews the probalitity of a malicious event and the impact that it
might have on the system failing and its ability of recovery.
IA
• Architecture
• BCM
R
• Analysis
• Assessment
FR
• Survivability
• Recovery
These conceptual routes of IA providing a robust Socio-Technical Enterprise can be
framed as the diamond model as illustrated in Figure 52.
IA
T
S
R
IS
ID
FR
Figure 52: The Information Assurance Diamond Model
Engineering Doctorate
Page 141
Bridging the Air Gap: An Information Assurance Perspective
The IA Model Quadrant
“Interoperability enabled by Communication and Information Systems37 (IO by CIS) has
been defined as...’the ability of systems, units or forces to provide services to and accept
services from other systems, units or forces and to use the services so exchanged to enable
them to operate effectively together’. (MoD ACP167, 2011).
The basic 4 part model as illustrated in Figure 142 (and developed from Figure 39,
p275) doesn’t fully illustrate the increasing dependency exhibited with our military
communication networks (Brass, Galaskiewicz, & Greve, 2004) and their service
architectures (Lund, Eggen, Hadzic, & Hafsoe, 2007) which has significantly heightened
concerns regarding their reliability (Soliman & Janz, 2004); security (Phillips, Ting, &
Dem, 2002); dependability (Al-Kuwaiti, Kyriakopoulos, & Hussein, 2009); impact to
business continuity (Sikich, 2003; VanVactor & Gill, 2010) and operational
effectiveness (Cebrowski & Garstka, 1998).
Figure 53: Building the IA Contextual Model Quadrants
37
IO enabled by CIS management and assurance is mandated by the MoD’s Vice Chief of Defence
Staff (VCDS). It is mandatory for all UK MOD acquisition projects containing Communication and
Information System (CIS) - regardless of financial approval category, lifecycle stage or operational
theatre - unless agreed otherwise with the MoD Systems Engineering and Integration Group (SEIG).
Available at: http://www.mod.uk/
DefenceInternet/FactSheets/InteroperabilityEnabledByCommunication
AndInformationSystemsioByCis.htm (accessed 15th March 2011).
Engineering Doctorate
Page 142
Bridging the Air Gap: An Information Assurance Perspective
There is a critical dependency on these complex (Lukasik, 2003; Luiijf, Nieuwenhuijs, &
Klaver, 2008), highly connected, interacting systems where their interoperability may
inherently produce major consequential impact upon critical and cross domain
operational infrastructures from minor/simple network intrusion, failure and security
violations (Qian, Joshi, Tipper, & Krishnamurthy, 2008). These risks exemplify the cross
domain problems, where NEC interoperability and the “Need to Share” are now
mandated across MoD Networks. Research and development of military systems have
often focussed on system functionality with security and dependability being
independently pursued. These network fundamentally command and control modern
military operations and that their information flows and exploitation are critical to
Situational Awareness and Decision Making. The MoD’s Information Strategy (MODIS,
2009) linking Enterprise Architecture and Information Assurance have articulated the
need to provide robust, dependable, fault-tolerant, secure and trusted networks.
Enterprise Architecture and Information Assurance are positioned to converge these
capabilities and provide intrusion-tolerant systems. At the 2011 Cyber Warfare
Conference, a USCYBERCOM General quoted that with the increased and more
sophisticated cyber threat to Government and Military infrastructures and supporting
networks that we must “expect and acknowledge that our networks are already
compromised and that we have intrusion”.
Our objectives are a secure and resilient United Kingdom, and shaping a stable
world. In pursuit of those goals, our highest priorities are tackling terrorism,
cyber security, international military crises and national disasters such as floods
and pandemics." Prime Minister David Cameron.
The admission that we cannot have absolute security on firewalled, encrypted, IPS,
personnel vetted, air-gapped classified systems is a significant statement from military
sources. There are increasing frequent numbers, multiple types of attacks, attack
vectors, attack agents and malicious viruses are inflicting constant intrusions to our
networks. Measured in the tens of thousands per day, these cyber assaults have become
a national concern (Ministry of Defence, 2010).
However, it’s not just the dependencies on the performance and functionality of the
systems that Enterprise has become reliant upon, but how the systems interact with
each other and with the communities of interest. This Human-Cyber interexchange is at
the heart of the Socio-Technical Enterprise and Information Assurances provides the
many of the trustworthy bridges that exist between these two domains as illustrated in
figure 54.
Engineering Doctorate
Page 143
Bridging the Air Gap: An Information Assurance Perspective
HUMAN
CYBER
Structure
Dependability
Trustworthiness
Security
Figure 54: An IA Perspective to the Human-Cyber Interexchange
The IA Model Quadrant, as illustrated in Figure 55, brings back the need to holistically
view Information Assurance from four key areas of study:- (1) The System Engineering
and Enterprise Architecture of the Information Infrastructure; (2) The investigation
and modelling of System Dependencies and Safety; (3) The building of better, more cost
effective security and protection devices and (4) controlling change, Human Factors
and culture of the environment through Trust and Risk Management.
Figure 55: The IA Model Quadrant
Engineering Doctorate
Page 144
Bridging the Air Gap: An Information Assurance Perspective
The quadrant illustrates the hierarchal construction of the 4 principle disciplines of
Information Assurance; however a more holistic view would be depicturing the cyclic
nature of those disciplines and their component elements which all interact with each
other. The view exhibited in figure 55 demonstrates how architecture can affect the
systems information dependency, how safety influences protection, how security is
risked managed and how trust affects organisation hierarchies.
The cyclic nature of the model illustrates (as exhibited in Figure 56) the need not to
focus not on anyone discipline within the Art and Science of Assurance, but to continue
to re-examine, analysis and evaluate its impact, direction and guidelines. IA needs more
research and development, more intellectual and industrial debates, more discussion
across a greater segment of society and more education in our schools, colleges,
universities and workplace. The Socio-Technical Enterprise has to evolve in this new
dynamic marketplace, but it has to protect its information assets, its communities of
interests, the organisations that work with it and the Enterprises for which its services,
products and values that have become to rely upon it. In the Information Age,
everybody is becoming connected, and those connections are becoming pervasive and
dependent to our society.
• Organisation
• Enterprise
Architecture
• Resilience
• Agility
Infrastructure
Trustworthiness
• Trust Management
• Risk Management
• Education and
Awareness
• Cultural Change
• Safety
• Tolerance
• Reliability
•Survivability
Structure and
Resilience
Dependabilty
and Safety
Trust and
Risk
Management
Security and
Protection
Dependability
Security
• Protection
• Confidentiality
• Integrity
• Avaliability
Figure 56: The Cyclic Nature of the IA Model Quadrant
Engineering Doctorate
Page 145
Bridging the Air Gap: An Information Assurance Perspective
Information Infrastructure: IA Components of Structure & Resilience
In chapter 3, the arguments were focused on the Architecture and Interoperability of
the Enterprise. These arguments help create this first quadrant of the IA Model. The
Socio-Technical Enterprise will create a changing environment, often led by
technological innovation, but will be sustained by its social desire, wants and needs.
Information Assurance has to address the business processes and their alignment to
other internal and external processes that involves Information Assets, Process,
Storage and Transit.
With ubiquitous systems, the complex expansive and evolutionary (Strategic
Positioning) environments with ever-changing, agile networks boundaries need
Resilience, defined by Jean-Claude Laprie (2008) as the “persistence of dependability
when facing changes”, having tolerance to cope with unanticipated events and
boundary changes caused from interoperable interconnection.
The classical
development of Resilience is of system persistence of service in periods of change that
be dependably delivered. These Resilient services can be justifiably called trustworthy
in an agile environment.
Table 9: IA Resilience Attributes
RESILIENCE ATTRIBUTES
1.
Tolerance
Coping with situations exceeding the
System’s specifications and expectations
2.
Robustness
3.
Adaptability
Coping with an evolving system and having
the ability to evolve whilst executing
4.
Utility
The utility and diversity of the system to
perform whilst coping with threats
5.
Accessibility
Confident access to secure, verifiable and
evaluated services
The System retains its ability to deliver
services in conditions which are beyond its
normal domain of operations
The linkage between the attributes of the systems architecture and the architect of the
business processes and Enterprise Structure has many creative and innovative tracks
to be researched, developed and pursued. One of the more pressing is the building of
tolerances into the socio-technical system. Many technical systems have failed
Engineering Doctorate
Page 146
Bridging the Air Gap: An Information Assurance Perspective
catastrophically when confronted with malicious attacks or major design errors.
Information Assurance is a methodology that will question the Enterprise architects to
minimise risk and to create policies, procedures, good practice and techniques to
ensure robust structures; more tolerant operations; greater utility of services; better
access to the community of interests and a more tolerant working environment to
intrusion and faults. Socio-Technical Enterprises require an assured purpose, a secure
environment, dependable capabilities and a culture of trust.
Information Dependability: IA Components of Dependability & Safety
The second component of the IA quadrant is the disciplines of System and KID
dependability and socio-technical system safety. The more complex and integrated our
real and virtual worlds become, the more reliant we become on them performing
correctly. Enterprises are becoming more dependent on the interdependencies of its
systems and those of other Enterprises with its becoming more interoperable with.
The sharing environment requires dependable services and information and
dependable knowledge management, transfer and understanding which both rely upon
dependable data from our data sources.
Figure 57: Assured Information Dependability is the fabric of the Socio-Technical Enterprise
System survivability is a cornerstone of Enterprise Assurance. The Socio-technical
Enterprise have become custodians of the Critical Information Infrastructures in which
our society and culture has adopted and become ever increasing reliant upon. These
Enterprises themselves have to become dependable. Figure 146 illustrates that safe
Engineering Doctorate
Page 147
Bridging the Air Gap: An Information Assurance Perspective
and healthy operations, that is routinely checked up (audited), that maintains the good
state of its operations within performance tolerances, is agile and flexible to the access
needs of its communities; capable of improving its readiness of services (across SOA
platforms) and quality (QoS); is good enough to respond to threats and its own
vulnerabilities will provide a trustworthy Enterprise capability and ensure system
survivability within its own risk appetite. Safe and dependable operations provide firm
foundations for a successful Socio-Technical Enterprise and its opportunities to grow in
a complex, sometimes hostile, environment. The objective of this Assurance model is to
provide a trusted solution to the communities of interest that will allow system
confidentiality, integrity, availability, no-repudiation, authentication and access control.
The Cross-Domain solution requires a de-confliction of the “need to share “ aims and
objectives and the current “need to know” principle where current military systems,
implementing the Bell-LaPadula Model (Bell & LaPadula, 1973; Bell, Looking Back at
the Bell-La Padula Model, 2005).
Information Security: IA Components of Security & Protection
Absence of unauthorised disclosure of
information
Absence of unauthorised system state
alterations
Readiness for authorised actions
Absence of denial of receipt
Absence of unauthorised access to information
Absence of unauthorised communications
Absence of unacknowledged credentials
Authority to deny access to personal
information
Ability to do harm
Goal or Aim to do harm
Identified Vulnerabilities
Figure 58: Security Attributes to the IA Model
Engineering Doctorate
Page 148
Bridging the Air Gap: An Information Assurance Perspective
The Assurance of a System is often cited by its levels of Protection and Security
Markings. Information Security is the protection of information and information
systems from System Susceptibility and these attributes are listed in figure 58. It has
been defined as the prevention of unauthorized access, use, disclosure, disruption,
tampering, modification, interrupting or destruction in order to provide integrity,
confidentiality, and availability (NIST, 2003). A secure system is the absence of
unauthorised access to, disclosure of, or handling of, system state (Avizienis, Laprie,
Randell, & Landwehr, 2004). Furthermore, the ITU-T X.805 Recommendation (2005)
adds 5 more dimensions (Non-Repudiation, Access Control, Communication Security,
Authentication and Privacy) as attributes to reduce System Vulnerability38 to the 3
established tenets (Confidentiality, Integrity and Availability) that allow systems to
Detect, React and Adapt to deny threat Capability, Intent and Opportunity (Little &
Rogova, 2006; Gasper, 2010). To ensure that the security policies, procedures and
guidelines are adhered to and accomplished, the Enterprise has to deploy protection
mechanisms as illustrated in figure 59.
Figure 59: The Sphere of Protection to the Socio-Technical Enterprise
(Keller B. M., 2011)
38
System vulnerability is defined to be the intersection of a system susceptibility or flaw, access to the
flaw, and the capability to exploit the flaw.
Engineering Doctorate
Page 149
Bridging the Air Gap: An Information Assurance Perspective
Information Trustworthiness: IA Components of Trust & Risk Management
The fourth component of the IA Quadrant is Information Trustworthiness. The heart of
the Socio-Technical Enterprise is its ability to manage its risks and maintain trust in
both the real and virtual worlds. There are conflicting notions that trust can and cannot
exist in Cyberspace (van Swaay, 1992; Committee on Information Systems
Trustworthiness, 1999; Minsky, 2003; Sterner, 2011). The emergence of our
Information based, networked, society requires people to make superior, trusted,
decisions from services, applications and data presented from cyberspace. The building
of trust and relationships with online users, clients, customers, suppliers and cyber
agents is of major importance to the online economy, social networks and coalition
enterprises (Luo, 2002). In our 3 layer model, the Social Domain relies on social
networking of the Human-Cyber Interexchange peer-to-peer cyber connectivity. This
communicative world is veiled in anonymity, usurpation, covert channelling, coercion
and subversion where our Cyber based interactivity and interactions can produce a
“disinhibition effect” (Suler, 2004) in an uncertain world, where fear and doubt is
common place; yet it’s our chosen space to social network, conduct e-commerce and
publish thoughts, knowledge, media and private details. Can we trust our trust under
such circumstances?
The recent EU study looking towards the future of the Internet (European Commission,
2010) identified that culture changes had a face of visibility – that there exists a balance
between ubiquity and security, pervasiveness and privacy, centralization and surveillance.
Visibility could be seen in terms of two main “faces” of the internet:
1. Visible internet applications, obvious to users, requiring input or
observability
2. Invisible internet applications, operating without active user input or
observation.
The report noted that: Difficulties arise when dealing with the second “face”, ie which
aspects should be invisible, and how? This concept invokes the multiplicity of the future
internet and how it will be manifested. Major sources of multiplicity include: privacy
domains – an internet analogue of public and private space; identities; levels of user trust
(eg high security retail vs. no-control segments); national or regional internets; and so on.
For the Socio-Technical enterprise, the context of trusts, its maintenance and
improvement is cost of doing business in Cyberspace. In fact, trust is the new Return of
Investment calculation for its corporate viability and values.
Engineering Doctorate
Page 150
Bridging the Air Gap: An Information Assurance Perspective
In creating Trust in the Enterprise; how can the Human-Cyber interface can be viewed
as a trust relationship? Can we create trust in Cyberspace? These two important
questions are still to be resolved in finding Cross-Domain Solutions. An assured
solution for the Enterprise architect requires the development of trust, trusted systems
and system integrity as well as strategies for achieving dependable, safe and secure
services, systems, infrastructures and networks. Is trust a people thing, or can things
affect our trust.
Structure
• Organisation
• Enterprise
Architecture
• Resilience
• Agility
Dependability
Security
•
•
•
•
•
•
•
•
Safety
Tolerance
Reliability
Survivability
Protection
Integrity
Confidentiality
Availability
Figure 60: Trust is the new ROI for the Socio-Technical Enterprise
How can we decide when to trust and does trust generate acceptable risk? Can we
assure trust? The model allows to the questions to be asked and directs its other 3
quadrants to argue and support solutions. The other component of the quadrant is risk
management. which has a direct effect on the security and resilience of a system. The
amount of risk in what is acceptable and what is unacceptable derives the Enterprise
Risk Appetite. This appetite is maintained if the system performs within agreed
tolerances and benefits the Enterprise and its operational capability, however it can be
eroded if Risk Management becomes checked boxed, non-compliant, lost in focus or
neglected. Intolerances are the nemesis of the Social Technical Enterprise.
Engineering Doctorate
Page 151
Bridging the Air Gap: An Information Assurance Perspective
3.4 Creating a Reference Model for IA
Information Assurance (IA) is the assumed responsibility (Corporate Governance) and
accreditation of a socio-technical Enterprises across the 5-layers of the Cyber Domain
(Geographical, Physical, Logical, Persona and Cyber Persona), inclusive of their Business
Processes, Information Operations, Information Exploitation, Management, Services,
Technologies and Infrastructures. The socio-technical Enterprise is assured by
appropriate levels of maturity and awareness within the 8-Dimensions of Information
Assurance (Structure, Resilience, Dependability, Safety, Security, Protection, Trust and
Risk Management).
(Richardson, C.J., 2011)
Taking the above definition for Information Assurance and building on the modelling of
IA Interoperability across the 5-layers of cyberspace and the IA Quadrant Model a
Reference Model can be created for Information Assurance as illustrated in figures 61
and 62.
Figure 61: Matching the Quadrant model to the Layers of Cyberspace
Engineering Doctorate
Page 152
Bridging the Air Gap: An Information Assurance Perspective
Throughout this thesis, the arguments has been presented, analysed, modelled and
where possible evaluated to create this IA Reference Model. By taking any of the 3Dimensions, an IA practitioner can start to analyse a Socio-Technical Enterprise and its
Systems from an Information Assurance Perspective.
In Bridging the Gaps, Information Assurance provides a Strategic, Operational and
Tactical perspective that allows an Enterprise to function in a robust and resilient
manner, with a high degree of dependability, safe and secure operations; protected and
risk managed and above all…Trusted.
Figure 62: The Information Assurance Cuboid Model
Engineering Doctorate
Page 153
Bridging the Air Gap: An Information Assurance Perspective
CHAPTER 4:
Bridging Gaps in Education and the Profession
Whether researching new technologies or implementing information risk
management initiatives, information security professionals are being held to even
more stringent standards than ever before.
(Frost & Sullivan, 2008)
Sir Isaac Newton’s work once inspired and reassured a world that was ready to be
enlightened. His original ideas that “results were proportional to the forces applied”
and that “cause precedes effect” generated a determinism outlook to the world
(Baggott, 2004). Determinism has long been used as a classic model to measure the
effectiveness of practitioners, including IT executives, managers, and teachers.
However, in the light of the digital age has determinism become dated? Do these linear
models cease to help today’s practitioners to become effective cyber leaders, especially
if there were some sudden, unexpected changes?
Determinism measures against a matrix through some linear process to a predictable
outcome. It was used to gauge and evaluate our ability to develop skills within the
matrix and thereby this linearity would enable practitioners to effectively predict and
control human systems and human behaviour through some small incremental change
(Pentland & Liu, 1999; Burns, 2002). Early UK Network Enabled Capability (MoD,
2009a) skill matrices emulated this deterministic skills process to augment the
technological development of Netcentric Warfare with a matrix of defined roles and
Engineering Doctorate
Page 154
Bridging the Air Gap: An Information Assurance Perspective
responsibilities (Alberts, Garstka, & Stein, 1999). The matrix defined the necessary
educational and experienced required for each role and how that role fits within the
Command and Control (C2) of the Organisation (UK, NATO or some other Coalition).
However, this work soon produced a vast database with an ever increasing complexity
owing to frequent movement of personnel within MoD. Time in posts was short
(normally 2 to 3 years, and sometimes a lot less) and the individuals had few
opportunities to engage in skill up-training (for the post they occupied or even
prepping for their next post). A more inclusive methodology was needed to provide
sufficient capability within an organisation that allows for the agile deployment of its
staff and builds the necessary infrastructure for training and education. MoD’s
Information Strategy (MoD, 2011) recognised that up-skilling was pivotal to its
doctrine and exonerated in the UK’s Cyber Policy (Cabinet Office, 2011a). Since the
publication of the National Information Assurance Strategy (Cabinet Office, 2007) the
need to quantify what the professional IA standards were required and the level of
education specifically needed have been discussed and with many policies promulgated
through many government departments. The Cabinet’s Office Central Sponsor for
Information Assurance (CSIA) and its General Information Assurance Products and
Services Initiative (GIPSI) brought together more representation towards an IA
standard from central and local Government, NHS, Criminal Justice Network, Industry,
Commerce and Academia. This work was continued later on by CESG, Department of
BIS, DfE and the Information Assurance Advisory Council (IAAC). Six years on and the
UK still has to create a National Occupational Standard (NOS) for Information
Assurance or even produce a comprehensive national framework to supply appropriate
training for our cyber security practitioners.
The NOS is essential for Higher Educational Establishments to focus upon the IA issues,
skills and education that Government, Industry and the wider online community needs.
CESG (the UK’s National Technical Authority for Information Assurance) has employed
three institutions to develop its deterministic CESG Listed Advisors Scheme (CLAS) for
certified Accreditors and IA Advisors: BCS, the Institute of Information Security
Practitioners (IISP) and APGM-UK.
This exemplifies GCHQ’s specific view on the
educational standards needed, but fails to recognise those of Industry, the Legal and
Accountancy Professions and of the business management of e-commerce. There is a
more holistic need for authorities such as CESG, BIS, DfE and IAAC to engage with a
wider community and the UKAS Skill Councils (who represent Industry and Academic
interests) as their actions, themes and policies will have a ripple effect from any
derived national standards to the curricula, to professional development and finally to
Engineering Doctorate
Page 155
Bridging the Air Gap: An Information Assurance Perspective
created the necessary holistic learning environment for IA to flourish both as a science
and an art. A National Occupational Standard will provide a necessary bridge and
driving forces to the educational gap between what the UK enterprises and their
organisations requirements (and retraining) and what training and education can
delivery within the current national education framework.
Strength
2
Driving Forces
Restraining Forces
Business Continuity
Resilience
3
Strength
4
& Capital Investment
4
Reliable Operations
Dependability
and Governance
6
7
Legal Obligations &
Security
Malicious Attacks
and Governance
4
6
Fear, uncertainty, doubt
Trust
Risk Aversion
and Governance
Total = 15
Total = 21
Equilibrium
Figure 63: Force Field Diagram for the Assured Information Operations
Equilibrium is required to be struck between resource allocation and necessity to
change. The model (figure 153) illustrates the current imbalances between assurance
Engineering Doctorate
Page 156
Bridging the Air Gap: An Information Assurance Perspective
and corporate reluctance and that the necessity for change would fail if a balance
wasn’t achieved. The three main applications (Change Management, Productivity
Improvement and Decision Making) of Kurt Lewin’s (1951) force field model analysis
allows IA practitioners to identify and understand the Enterprise’s assured state to
redress the current shortfalls. The importance of this analysis is its ability to
demonstrate where changes are necessary and what forces need to impact. The model
has proven to be a powerful decision-making tool as Business Managers can influence
the forces to maximise the corporate’s risk appetite and potential of changes to
succeed. Figure 63 provides strength indicators to designate the scalar levels of
influence where: 1 = extremely weak and 7 = extremely strong
Many organisations are only just beginning to recognise Assurance Education; the bulk
of their security budgets are paid out on consultancy and technologies; hence the high
strength score marks for security and corporate legal obligations such as the Data
Protection Act, 1998. Motivation to protect corporate assets has always been strong,
but for most acquired information systems the need for security was often an afterthought or became a necessity after some fault condition. This late addition of security
mechanisms often led to inappropriate compromises and latent vulnerabilities
(Meunier, 2011).
The apparent reluctance businesses to invest time and money in skills training and IA
Education, measured as resilience in this model, is in part due to their perceived need
to protect corporate assets rather than tackle the more intrinsic problems of changing
cultures hence the lower score of 4 in capital investments. Chapter 4 had demonstrated
the need for the strategic positioning of Information Assurance and implicitly
confirmed the necessity for a good education and training.
With natural disaster like Katarina , terrorists attacks like 9/11 and data losses like
TkMax and Sony Play-stations, business continuity has risen in corporate governance,
however little has been done to the majority of the critical information infrastructure
as the data from the World’s Economic Forum (2012) shows that the latest technologies
are increasingly accessible to local industries, but indications relating to confidence in the
institutions responsible for developing safeguards, including those that mage the risks of
emerging technologies, have not shown proportionate increases.
Engineering Doctorate
Page 157
Bridging the Air Gap: An Information Assurance Perspective
4.1 Bridging the Professional Gaps
As first discussed in Chapter 1, there is a capability gap between what we need to know
and what we know. This lack of knowledge has developed from increasing complex
picture of how we operate in cyberspace and the integration and interoperation of
technologies, software applications and human ingenuity. The pace of this exploitation
of cyber resources has outstretched many of our training and educational programmes
leaving many communities of users ignorant of the issues of interoperability and safe
operations. Information Assurance in the Community is all about redressing this
capability gap and developing good IA practitioners, resourcing their education and
continuous specialized training. Corporate Governance mandates adherence to best
practice and security policies to assure the safety and protection of their information
assets. More than ever there is a need for IA practitioner’s specialism to meet current
security requirements. Have our communities of interests become naïve to the
complexities of Cyberspace and the Human-Cyber Interfaces? The frantic and explosive
technological pace of the Internet has not produced a corresponding cultural
progression towards greater awareness of its emergent properties. Cyber security
education remains stubbornly low and user community’s exhibit poor behaviour
towards security breaches (Cornish, Livingstone, Clemente, & Yorke, 2011).
There are too few practitioners implementing Cross-Domain Solutions and these few
are having to cope with restricted budgets, reduced skilled resources and increasing
complex network of networks with new properties been routinely discovered or
exposed as vulnerabilities. The UK’s Cyber policy (Cabinet Office, 2011a) recognises
the need to change our attitude to training but it stills underfunds as we consistently
fail to provide the necessary resources to train our professionals. Understandably, we
all have to work within budgets, but those budgets have to be realistic to the risks
involved (Bhagyavati, Agyei-Mensah, Shumba, & Kearse, 2005). When it comes to
Cyber Security; Ignorance is bliss: if you don’t know something, it can’t hurt you - that is
to say it causes no discomfort. From childhood we learnt to protect ourselves from
harm but we were also willing to explore; as we age, we began to restrain ourselves for
the fear of others might do. This becomes more evident with our online experiences
which have increasingly obtruded our awareness of its criminality and harm from
malware. Cyberspace opens a new world of opportunities and making IA work will
protect us in this virtual dimension. A programme of cyber awareness is necessary and
Figure 64 illustrates the benefits and consequences of a blissful, exploiting but
educated user community.
Engineering Doctorate
Page 158
Bridging the Air Gap: An Information Assurance Perspective
Strength
Weakness
Blissfulness
Catharsisic
No Discomfort
Fearless
Innocence
Unrealistic Trust
Out of touch with Reality
Myopic
Unappreciative of impact
Uncertainty
Opportunity
Threats
Knowledge
Compassion
Understanding
Risk Appitite
Capability
Chaotic Edge
Misunderstandings
Lack of Awareness
Risk Adversion
Malicious Attacks
Figure 64: The SWOT of Human Blissfulness in Cyber Communities
The IA Profession needs to provide the knowledge, awareness and understanding to its
cyber communities to provide more dependable and safe systems that the users can
benefit from, trust, manage and exploit rather than be exploited.
IA in the Defence Community
John Colley, Chairman of (ISC)²’s European Advisory Board stated that: “The
opportunity for the information security profession is immense. Clearly we must continue
to understand the evolving threat landscape coming from increasingly sophisticated
criminal factions. We must also stay on top of the technology available to protect against
these threats, recognising them as tools, rather than the focus of our jobs. Most
importantly, however, we must recognise that our jobs are not only critical to the ongoing
running of the business and protection of its assets, but also to its development and
strength in the future. We are driving a change in the role of the security professional. Let
us make the most of our influence.”
Engineering Doctorate
Page 159
Bridging the Air Gap: An Information Assurance Perspective
Fundamentally, security is a compromise to influences, power and agenda and often
may be not fit for purpose. Corporate executives have employed and later witness
security professionals who did not improve the business situation, but further
complicate or cause a degree of disbelieve when they present doomsday scenarios or
forecast future major IT failings. These professionals are out to sell services and
platforms and exploit the potential threats (malicious attacks to a risk adverse
clientele) and weakness (unrealistic trust, fear, uncertainty and doubts) of an
uninformed community; as illustrated in figure 111. They expose a proliferation of
guidance, policies and security technologies to provide technical solutions to the issues
of cyber management, architecture, assurance and exploitation; but they provide very
little recognition of the skills, knowledge and education that is needed by the business
community to communicate, comprehend and provide necessary cyber assurances for a
sharing, informative community of people and cyber actors.
The NEC is an inter-networking cyber dominated world of Information Exploitation
(IX) which is both complex and chaotic (Russell & Russell, 1999; Spar, 1999; Wheatley
M. J., 2006). Cyberspace has brought about uncertainty in an environment of cyber
products, services and layered networks that have slowly lost cohesion as they mashup (Lee, 2005; Dreyfus, 2008). NEC Command and Control, cyberspace management
and leadership not only needs it’s personnel more experienced in its many capabilities,
but also educated in its architect, processes, procedures and policies (Alberts D. S.,
1997). This takes time and the NEC roll-out hadn’t prepared adequate time for training
and education (Major General Baxter, 2005). This process of development and lack of
underpinning know-how has generated many issues, incidents and business process
failures within coalition operations in Afghanistan (Kellner, 2008; Rickards, 2010). The
following MoD Information Assurance Policy and Standards are the current key
documents for Information Assurance and Accreditation.
The Defence Manual of Security: JSP 440
Data Protection Act 1998
HMG Information Security Standards
Defence Crypto-security Publications
The Defence Manual of Interoperable Core Network Technologies: JSP 457
JSP 600 - MoD CIS Policy and Assurance Process
Defence Co-ordinating Installation Design Authority Manual of Regulations
JSP 740 – MoD Acceptable User Policy
JSP 747- Information Management Handbook
Engineering Doctorate
Page 160
Bridging the Air Gap: An Information Assurance Perspective
The damage caused to the MoD by a lack of awareness of Information Assurance can be
serious. Poor configuration of Information Systems, inappropriate behaviour by staff,
careless information management, excessive distribution of documents and failing to
apply security policies and procedures can expose vulnerabilities, reduce operational
edge, expose the MoD to litigation and adversely affect its reputation. At this moment,
the MoD has an underfunded and understaffed accreditation process to provide the
assurance to an online community of 300,000 users and ineffective Information risk
and incident management process, with very few individuals aware of it, understand it
or even take heed of their contents when acquainted with it. The new military
perspective towards IA (MoD, 2011) is from the premise that it is assures the conduct
of Defence business, whether on deployed operations or in the administration of MoD
fixed systems.
Military IA encompasses all activity needed to assure the critical
information on which Defence business relies. From this approach and the model
produced in Chapter 3, a new definition of IA can be established: Information Assurance
(IA) is a holistic management process and architecture designed to ensure that the
systems and networks employed to manage, store and transit the critical information
assets across the human-cyber interfaces and used by an organisation are reliable,
resilient, secure and trustworthy; and that tolerant measures and processes are in place
to counter malicious activity and inappropriate behaviour, in order to support the
business needs of the organisation.
Up-to-date, readily accessible and, above all, secure information is a critical component
of the Defence Community’s that now has the drive to implement efficient and cost
effective working practices. For the MoD, good IA is ensuring that the integrity of such
critical information is maintained, while protecting systems from those that may seek
to abuse them. Under the UK Cyber Policy (Cabinet Office, 2011a) this has become a key
concern. Above all, the Defence Community requires a survivable voice and data
network infrastructure that delivers information in assured manner in the most testing
of environments, while allowing it to take advantage of up-to-date technology such as
email, the Internet and Virtual Private Networks; e.g. the MoD’s Defence Fixed
Telecommunications Service (DFTS) has been working since 1997 to ensure that
information, ranging from ‘unclassified’ to ‘top secret’, can be accessed easily and
securely via a fully interoperable infrastructure. However, in life, people don’t react to
reality; they react to their perceptions of reality and a lot of the MoD’s contextual work
has not been implemented and its online community is still very ignorant of their roles
and responsibilities within cyberspace (Roper, 2005).
Engineering Doctorate
Page 161
Bridging the Air Gap: An Information Assurance Perspective
Chaos Theory in development of an IA Community
Understanding the need to identify and create the sensitivity, Lorenz’s Butterfly Effects,
to a dynamically changing, chaotic rich environment formulates and captures issues to
initiate, facilitate and support change within the domain influenced by Chaos Theories.
The chaos paradigm replaces the ubiquitous paradigm of Newtonian reductionism that
postulated a linear, mechanistic view our real world. Zohar, (1990) see quantum
physics as the bedrock of chaos that is “rich with imagery that almost begs application to
the experiences of daily life.”
Implicitly, experiencing this phenomenon is being very much involved the concepts of
uncertainty through a necessary and directed process of establishing, inventing and
modifying government framework and educational structures to generate the new IA
profession. Understanding the theories of Zohar (1990), the Quantum Self and Zohar
(1997) Corporate Brain offered an interpretation of Chaos Theory to structure
organizations for fundamental transformation. She demonstrates how people must
change the thinking behind their thinking. “rewire the structures of the corporate brain to operate more fully and achieve genuine fundamental organizational change.”
The Cabinet Office papers on Transformational Government (2005) and The National
Information Assurance Strategy (2007) provides the source for transformational change
and which Shelton, (2003) had earlier illustrated could provide an appropriate
environment to evolve the paradigm;“by applying principles found in chaos theory an
organization can make ‘lemonade out of lemons’ and become more responsive to change
agents while continuously moving ahead and growing from the inside out without the
fear of complete chaos.”
Generating the IA professional qualities, values and continuance in order for it to
become established, grow, develop, survive and adapt is a result of this re-invention
and creative adaptation to providing a new specialism, the wave/particle dualism
establishes a perturbed equilibrium. Dooley (1995) observed that learning
organizations such as DCCIS could: “allows self-organization, rather than attempting to
control the bifurcation through planned change. Being “off-balance” lends itself to
regrouping and re-evaluating the system’s present state in order to make needed
adjustments and regain control and equilibrium. By understanding and introducing the
element of punctuated equilibrium (chaos) while facilitating networks for growth, an
organization can change gears from “cruise” to “turbo” in regard to speed and intensity of
Engineering Doctorate
Page 162
Bridging the Air Gap: An Information Assurance Perspective
organizational change. While maintaining an equilibrium state seems to be an intuitively
rational method for enabling an organization to gain a sense of consistency and
solidarity, existing on the edge of a chaotic state remains the most beneficial environment
for systems to flourish develop and grow.
System management mechanisms deal with order and regularity, security deals with
the complexity generated by irregularities. With Information assurance it’s the
understanding of interlacing architectural complexities and human behaviour produces
a complex, dynamic complexity.
This complexity has elements of an emerging
structure, where the whole is often more than its parts, that there is no disaggregation
but there is a lack of knowledge (uncertainty of relevant knowledge) and a degree of
blindness and the sensitivity is dependent on the boundary conditions of unpredictable
behaviour and bifurcation. Dualism within the Quantum Theory, by a simple
transposition can create a security paradigm with a deterministic chaos /assurance
dualism. A characteristic of Chaos, as observed by Mitchell (1998) is that complex
interactions modelling real (cyber-based) behaviours have demonstrated consistently
that the potential outcomes have predictable limits. Thus in a security context, knowing
the exact state how the system will end up is a requirement, but this is unrealistic as
Heisenberg’s Uncertainty principle confirms. The range and the probabilities of
possible outcomes has to be constrained, allowing Assurance to take control which is
ultimately very realistic. Finding the critical values to provide system assurance is a
worthwhile future action and a recommendation to develop beyond this Thesis.
The Right Policy
Netcentric warfare effects-based operations (EBOs) are “processes for obtaining a
desired strategic outcome or effect on the enemy through the synergistic and cumulative
application of the full range of military and non-military capabilities at all levels of
conflict” (Alberts, Garstka, & Stein, 1999)
EBOs routinely involve complex environments that require information exploitation to
enable decision making in multinational, multifunctional collaborative groups and
provide shared situational awareness to commanders. These operations pose problems
when insecure information resources are required to interoperate with military
networks, in particular the Internet has become essential to the military’s superior
decision benefit chain. Under current UK’s information security standards, classified
Engineering Doctorate
Page 163
Bridging the Air Gap: An Information Assurance Perspective
networks have considerable security and risk exposure constraints that reduce system
access across strategic, operational and tactical commands. Awareness of how IA affects
knowledge and information management and their overall trustworthiness,
necessitates further investigation and analysis of the NEC and in particular
understanding how IA professionalism plays an important role in shaping the
behaviour and the complex nature of the NEC domains. Governments, corporations and
the military have undergone “a transformation in their ability to gather, share and
process information. The result is an unprecedented reliance on information
infrastructures for their very survival. This dependency creates new opportunities for
disruption” (Anderson 2005). This presents an unprecedented reliance on information
infrastructures for their very survival.” In one sense, this tautologises the reliance on
technology that is new and is by definition “unprecedented” and in another sense, the
need for the system’s dependency for survival. The claims are false, as “Information” is
hardly the highest in the hierarchy of human needs (Maslow, 1943): water, food and
shelter, law and order are surely still more important; but the trend toward increasing
dependence on IT in our social systems provokes real issues; and whether it is wise to
continue the trend of dependency, is a question which all security professionals should
be engaged with.
UK’s National Information Assurance Strategy (NIAS)
Whether
researching
new
technologies
or
implementing
information
risk
management initiatives, information security professionals are being held to even
more stringent standards than ever before (Frost & Sullivan, 2008).
The UK’s National Information Assurance Strategy (Cabinet Office, 2007) takes a
coherent approach to managing information security and its risk treatment by making
it an integral and effective part of normal business process. Information is a valuable
asset that must be safeguarded. In the case of information held by public authorities
and businesses, especially personal information, people want to be certain that it is
held securely, maintained accurately, available when necessary and used appropriately.
Information Assurance (IA) is used to assure the management of risk to information
and effective IA ensures that the opportunities provided by new technology can be
exploited to maximum benefit.
Engineering Doctorate
Page 164
Bridging the Air Gap: An Information Assurance Perspective
The convergence of interconnected data and systems causes unprecedented increases
in the potential and actual security risks to information assets as they passes through
an increasingly complex web of systems. Figure 156 illustrates the 2-sides of the HCI
coin – FUD and IA. Effective IA education needs to achieve a step change to the security
professionalism that overcomes user’s fear, uncertainty and doubts. As enterprises,
such as the MoD, adopt collaborative business models, based on highly interlinked
infrastructures, they are more vulnerable to attack. In the past, the MoD approach was
to isolate, but now these highly secure, fortress solutions are no longer fit for purpose;
rather the new military enterprise needs to adopt a solid architectural approach to
designing secure, joined-up systems that maintain the integrity of the information they
hold and what they pass from community of interest to another. In short, visible
security needs to be built in from the very outset to allow the interoperability of
systems and the architects of such systems have to build high- assurance platforms that
will allow these layers of system operability to cross domains, i.e. bridge air gaps.
Core UK Security Principles
1.
Ultimate responsibility for HMG security policy lies with the Prime Minister and
the Cabinet Office. Departments and Agencies, via their Permanent Secretaries
and Chief Executives, must manage their security risks within the parameters
set out in this framework, as endorsed by the Official Committee on Security
2.
(SO) (see Appendix 2 for MoD’s board structure).
All HMG employees (including contractors) have a collective responsibility to
ensure that government assets (information, property and staff) are protected
in a proportionate manner from terrorist attack, and other illegal or malicious
activity.
3.
Departments and Agencies must be able to share information (including
personal data) confidently knowing it is reliable, accessible and protected to
agreed standards.
4.
Departments and Agencies must employ staff (and contractors) in whom they
can have confidence and whose identities are assured.
5.
HMG business needs to be resilient in the face of major disruptive events, with
plans in place to minimise damage and rapidly recover capabilities (see figure
157 for the threat exposure and mitigation to the UK public sector)
Engineering Doctorate
Page 165
Bridging the Air Gap: An Information Assurance Perspective
Figure 65: IBM view on UK’s information asset threats
Culturally, within MoD, mind-set has to change about how solutions are constructed
and this means visibility at strategic defence reviews, operational deployment planning,
system design and run time about security attributes, claims, needs and outcomes. The
vision for a network enabled MoD also requires a more holistic approach to the
National Information Assurance Strategy and to the education of its practitioners. It is
no longer sufficient just to secure an organisation’s IT assets; the business processes
that govern the use of those assets also need to be secure and robust (Cabinet Office,
2011a). This means developing clear processes and policies to govern the way
employees, coalition partners and other stakeholders interact with MoD’s information,
underpinned by a safe and secure infrastructure. Without this combination, the
integrity of the Department’s business will still be threatened. Only such a multi-faceted
approach to Information Assurance that encompasses people, policy, processes and
infrastructure will ensure that the risks of joined-up operations can be balanced
against the benefits.
The NIAS (2007) strategic outcomes and other IA initiatives such as the HMG IA
Maturity Model and Assessment Framework (Cabinet Office, 2010), and modular Code
of Connection (Police National Accreditor, 2009) and Risk Managed Accreditation
Engineering Doctorate
Page 166
Bridging the Air Gap: An Information Assurance Perspective
Document Sets (CESG, 2010) placed on enterprises such as the MoD and the UK’s
police force (NPIA Information Assurance Capability Team, 2010) can be achieved and
evolved by focusing on three IA performance objectives set out in the NIAS. These will
have important implications for the way that organisations, particularly within
government, do business.
UK National Information Assurance Strategy Objectives (Cabinet Office, 2007)are:
Objective 1: Clear and effective information risk management by organisations.
Clear board-level ownership and accountability for information risks will be
required;
Where information is shared, a single point of risk ownership will be
identified.
That IA should be visible and understood by all Government employees at all levels and
across all of its organisations.
Objective 2: Agreement upon and compliance with approved and appropriate IA
standards.
Organisations, particularly those within, or linking to government, will
operate within a national framework of IA common standards;
Trust and confidence in the use of information will be maintained through an
effective model of compliance with these standards.
Enterprises are required to take ownership and manage the IA issues, empowering its
IA practitioners and ensuring proper consultation it done with stakeholders in the
decision benefit chain
Objective 3: The development and availability of appropriate IA Capabilities.
Government will work more closely with wider sectors in the development of
Capabilities’ to enable organisations to manage information risks;
These capabilities include: availability of the right products and services;
coordinated and appropriate efforts on innovation and research; improved
professionalism, and awareness and outreach.
That there is a common understanding and awareness of the enterprise Risk processes
and its mitigation by the communities of interest and this is conveyable across
domains, coalition networks and other interoperable systems.
Engineering Doctorate
Page 167
Bridging the Air Gap: An Information Assurance Perspective
The Broader Social-Contemporary Security
Information assurance can be an important business enabler, supporting
secure, effective and agile information services, but only if a hostic view is
taken.” Detica white paper, 2008
The traditional (Cyber Layer 1) geographical, defence-based, physical security is no
longer the only criterion that defines human well-being and development. Increasingly,
security has become a combination of attributes relating to freedom from persecution,
want, fear and a broad range of other concerns, such as the security of water, food,
energy and environmental security. Aspects of this trend are recognised by the United
Nation’s ‘Responsibility to Protect’ agenda (UN, 2004), which focuses on preventative
and developmental lines of activity (including ‘pre-emptive’ action) rather than purely
reactive intervention. However, prevention requires a longer view and proportionately
more effort in recognising the indicators of an impending crisis and in tackling the root
causes of instability rather than the more obvious symptoms. In turn, early responses
may be difficult to determine, but will, in an inter-connected world, always require
decisions and intervention across a wide range of activity including economic,
diplomatic, military, developmental, humanitarian and now cyber. In military terms,
people and their business processes have become the vital ground for Information
Operations (IO) which deliberately intervenes and interferes how they go about their
business. IO can disrupt, coerce, harass and sabotage across the 5 dimensions of
military operations.
Effective holistic education of Information Assurance has to advance understanding
through quality education of our leaders, practitioners and the user community the
fields of information operations and cyber security including Information management,
services, exploitation, security and its assurance, critical infrastructure protection,
national security information management, and computer network. The United
Nation’s ‘Responsibility to Protect’ agenda (UN, 2004) has in part contributed to the
MoD’s Joint Discussion Note JDN 4/05. The JDN illustrates the complex and dynamic
strategic environment of the 21st Century and how the department should encompass
strategies like the NIAS. Figure 158 illustrates the strategic importance of IA (as
discussed in Chapter 4) which aligns the JDN with national policy. The Comprehensive
Approach (MoD, 2006) discussion paper signalled that there are significant potential
challenges to peace and security to which we need strategies to ensure safety, security
and integrity. That these challenges are likely to persist throughout the global
Engineering Doctorate
Page 168
Bridging the Air Gap: An Information Assurance Perspective
environment with the interconnected, globalisation nature of several transnational
trends that will affect resources, science and technology, social, military and political
dimensions as developed in Chapter 4. The JDN discussion paper describes the world of
sovereign states, unequal in development and resources, conflicts and tension seem set
to continue among nations and power groupings. The symptoms of crisis will be
spawned by a combination of climate change, ideology, greed, ethnic animosity,
residual territorial claims, religious fanaticism and competition for resources including
agricultural land, mineral wealth, water rights and oceanic resources. The desire for
socio-economic improvement and population migration (refugees and Internally
Displaced Persons) driven by war, economic and environmental collapse or natural
disaster will generate national responses and demands for international assistance and
these emergency responses are becoming more dependent on system interoperability
and Information availability . Additionally, terrorist actions, communal violence,
endemic criminality and ethnic disturbance will continue to complicate international
relations, while individuals and commercial interests are likely to have multiple
identities, allegiances and cyber proxies. This will compound the protection and
security requirements for Critical Information Infrastructures and Emergency
Response Services which are often privately run and often controlled by organisations
outside the nations they serve.
The Human Dimension in the Social Context of Security
The human security agenda requires a response that is sensitive to the extensive,
particular needs of societies, communities and individuals. To this end, all constituent
parts of a society (rule of law, education, commercial, humanitarian and health,
information, military, economic and diplomacy and governance) should be considered,
as well as the history and culture of an individual society as illustrated in figure 66:
Figure 66: The Constituents of a Society
Engineering Doctorate
Page 169
Bridging the Air Gap: An Information Assurance Perspective
Only then can a range of appropriate objectives, resources and contributors be
established to influence the situation. The spectrum of involvement, doctrinally and
familiarly known as the ‘Complex of Actors’, might comprise other governments,
International Organisations, NGOs and private and commercial interests. Additionally,
experience has indicated that successful resolution would overwhelmingly rely on the
attitude and motivation of the indigenous and/or local population at the heart of the
crisis and those in the surrounding region, although care should be taken not to create
a dependency culture. Two other groups that should be considered in any responses
are opportunists, who seek to benefit from the situation or the perpetuation of a crisis,
and spoilers who have an interest in undermining the response.
Implementing NIAS through the Defence System Approach to Training
Figure 67: The Strategic Positioning of Security
Information is a critical asset for any organisation, and particularly so to the MoD. Its
exploitation is fundamental to the achievement of business objectives. The
Government’s National Information Assurance Strategy (NIAS) enables organisations in
the UK to fully exploit the benefits of information and communications technology
(ICT), while at the same time ensuring that wider UK interests are maintained. The
Engineering Doctorate
Page 170
Bridging the Air Gap: An Information Assurance Perspective
Central Sponsor for Information Assurance (CSIA) uses the term “Information
Assurance” to describe the appropriate management of information risks (that is to
ensure the availability, integrity, confidentiality, non-repudiation and authentication of
information and information systems) in order that the benefits of ICT are fully
realised. The NIAS explains that ownership and responsibility for this strategy for
Information Assurance rests with the Official Committee for Security and its chair, the
Cabinet Office Permanent Secretary, Intelligence, Security and Resilience.
For effective decision making, information needs to be clear, accurate, trusted and not:
compromised, lost, leaked, disseminated, published (without approval) or corrupted.
The Rawlinson Report39 highlighted the need to provide both an educational
framework and the IA Profession within MoD. Organisations like the Defence College
for Communication and Information Systems (DCCIS) have begun to take a proactive
part in delivering the goals of NIAS and responding to Brigadier Rawlinson’s
observations:-
1. How NIAS will affect the DCCIS and its training regime and how within the
organisation the effect of the IA Professional Framework will have on job
specifications and training requirements?
2. The NIAS calls for a new profession of IA practitioners with a prescribed
Government career structure and professional development. This creates an
opportunity for the Royal Signals to take an initiative to adopt the NIAS to
create an IA trade group in conjunction with its current IS trade group. Existing
Operational Performance Statements (OPS) will need modification and
enhancement
to
reflect
the
IA
Framework
and
to
identify
how
graduates/trainees will meet the necessary prescribed SFIA and NQF standards.
3. How DCCIS can leverage its expertise to establish future accredited IA courses
for MoD and other Government Departments for pre-employment training and
continuous professional development?
39
MoD Information Assurance Review 18Nov05
Engineering Doctorate
Page 171
Bridging the Air Gap: An Information Assurance Perspective
As DCCIS is the MoD’s centre of excellence for communications and information
systems, then it is incumbent on the college to take a lead in promoting professionalism
in IA. Information security and its assurance is an issue with people rather than
technology and it is reliant on people, their awareness, ethics and behaviour. This is
partially reflected in DCCIS (2011) current training goal to:“ensure that personnel have
an appropriate awareness of information security policies and practice to the extent that
their duties require, and to fully understand their responsibilities including their legal
obligations”.
A holistic approach to delivering aspects of NIAS through the MoD’s own IA Maturity
Model will require Training Needs Assessment to identify each post and assign the IA
level of competency required to meet the framework and the necessary training
requirements for the post holder. NIAS requires that IA practitioners have further
specialized training, developing the necessary transferable skills, with focused courses
of increasing educational content and the provision of professional development
courses. NIAS calls for the development and availability of appropriate IA capabilities
and identifies seven specialisms within its professional framework. Many existing roles
and posts within the MoD’s CIS environment cover in part, or are identifiable as IA
functions.
The MoD’s Information Strategy (MoD, 2011) framework requires practitioners to
obtain educational and transferable skills for these posts. Consequently there is a
requirement to assess the current IA post and incumbents against skills, training,
educational and Continued Professional Development (CPD) needs of IA Foundation,
Practitioner and Subject Matter Experts (SMEs) as illustrated in figure 161. JSP 822
directs all Defence personnel accountable for, or with influence over, the delivery of
Defence capability, the meeting of performance requirements, or the implementation of
Defence policy, for which T&E interventions are required. It applies to all decision makers
and practitioners employed in the Regular Forces, the Reserves, MOD civilians, and
Industry who are engaged in the derivation and assurance of Defence capabilities or
performance requirements, and/or the development, delivery, or assurance of associated
T&E interventions (MoD, 2012).
NIAS and the expected National Occupational Standard (NOS) will modify or create
through the Defence Systems Approach to Training (DSAT) a new Operational
Performance Statement (OPS)/ Competency Framework (MoD, 2012). The DSAT OPS
will be required to develop the envisaged Defence IA Practitioner at SO2 / SO3 level,
Engineering Doctorate
Page 172
Bridging the Air Gap: An Information Assurance Perspective
but also targeting supervisors (Yeoman, Foreman & IS supervisors). Specialist’s roles
such as ITSOs and SACs should also be included. We will also have to derive the OPS to
cover the soft issues of Information Assurance. MoD’s Network Enabled Capability
doctrines of Information Superiority (MoD, 2006; MoD, 2011) have predicated the need
for information security and its assurance. Interoperability, Information exploitation
and ICT advancements has brought a transformation risks and new trends in
information system threats and vulnerabilities. Vulnerabilities introduced by the
complexity of the new military information systems and the impact of degraded
systems within Information Operations from increasing complex attacks has
necessitated the adoption of information assurance. NIAS has identified there is
requirement for a change of culture and acceptance of IA to be fundamental to our
business goals, which Rawlinson (Rawlinson, 2005) also commented on.
–
Scoping Study Report
Determines current position and suggested approach – is a TNA needed?
•TRA requested - completed by DCTS (quad-Service and non-eqpt) or by
single-Service focus (RN HR Services, Army A&SD, RAF TAC))
DSAT
Documentation
Guide
Training Authorisation
Document
Operational Performance Statement / Competence Framework
•Course Title & Code
Job Analysis – Job Scalar (Job – Duties – Tasks – Sub-tasks – Task
Elements) – Job Spec
•TrAD, OPS, FTS Version
No & Date
•CEB Title
Performance, Conditions, Standards (product and processes) - DIF (Trg
Cat) & HMI Analyses
•TNA Determined / TRA Led / Completed by DCTS, RN, Army or RAF
•SOTR
•Course Length
•Frequency
•Course Capacity
•Stakeholder Signatures
•CEB Authorized. TRA Owned
Sqn TO Focus
Formal Training Statement
Training Performance Statement
Workplace Training Statement
Residual Training Gap Statement
•TRA owned. SME determined – Course Design Team / TDA
Assessment Strategy
Instructional Specification
(1 EO = 1 ISpec)
Administration:
•Course Details
Course Folder
Timetable (Course Programme)
ISpec
•TO – performance
AStrat
•EO – performance,
conditions & standards
ASpec
•KLPs
•Duration
•Resouces
Evaluation Strategy
(overarching strategy)
Entry standard, Details of
entry test, Type: summative
or formative, Criterion
referenced or normative
referenced, Grading: pass or
fail; moderation,
standardization
Details of Instructor:Student Ratio
Allotted Hours
Assessment Specification
Resources
•Assessment
•Assessment Programme
•H&S / EP
•Type of Assessment
•Duration
•ISpec review date
Execution:
InVal
•Development of KLPs
•Consolidation
•TO / EO Assessed
•Marking Details
•INTRO
End of Course
Completion of TO
Completion of Lesson (EO)
•Assessment Criteria (Pass /
Fail, etc)
•Results of Failure
TDA Delivered
TRA Led / Owned (for the RAF, TRA = COS (Trg). Sponsorship is delegated.
Figure 68: JSP 822: The Defence System Approach to Training (2012)
Engineering Doctorate
Page 173
Bridging the Air Gap: An Information Assurance Perspective
However, the gaps in our operating processes, business continuity and awareness of
the user communities have to be managed, corrected and where necessary a change of
culture introduced. Bridging the Gaps in IA Education and Professional Standards is
essential for the MoD Information Strategy to gain the benefits it clearly wants from its
Operations, Coalition partnerships, Decision Making and achieving Information
Superiority. However, DSAT is an expensive process, with considerable overheads in
resources, manpower and costs. The MoD has tried over the last 20 years to outsource
its Education and Training programmes as a cost saving process. These attempts have
concentrated the training (reducing the number of trainees and training
establishments) but have failed to attract a private consortium to take over the Defence
T&E commitments.
Policy Driven IA Education
Individual security lies with the skills, knowledge and experience that we have in
ourselves. An important objective which can be facilitated by DCCIS, to aid the change
of culture, is transforming the Defence Information Strategy and the NIAS into a
profession development programme that:
a) Provides recognition and career development of transferable skills and
knowledge for the profession with timely, supportive, accredited development
courses for the MoD and in turn for other Government Departments.
b) Provides an forum for the understanding of the issues and the proliferation of
the guidance, policies and security technologies involved in IA
The proposed Information Security Professional Development (ISPD) programme,
delivering the Right Skills, to the Right People at the Right Time, supports the NIAS
framework and the Institute of Information Security Practitioners structured career
path and provides the MoD la clear direction for IA Education and Training to meet the
UK’s Cyber Security Strategy (Cabinet Office, 2011a). The programme will be geared to
provide educational qualification and transferable skills to practitioners as it is
intended to help them to stay on top of the available technologies and innovations and
thereby sustain our assurance against these threats. Most importantly, the aim of the
ISPD is to provide recognition through academic excellence, an understated goal in the
NIAS. IA practitioners are not only critical to the on-going running of our core business
and protection of its assets, but also to its development and strength in the future. This
unique service to provide understanding of the evolving threat landscape coming from
increasingly sophisticated attackers should be established within DCCIS.
Engineering Doctorate
Page 174
Bridging the Air Gap: An Information Assurance Perspective
4.2 Federated Education
Understanding risk at an enterprise level is a fundamental requirement for Information
Assurance. While many business drivers are not exclusively related to IA, there are
nevertheless many information-based factors, such as information sharing policies,
which contribute to overall risk and therefore need to be considered. Holistic IA
Education requires methodologies that take a Strategic Position of Security (SPS) of the
enterprise to identify key business drivers and risks, which can then be examined from
a specific IA perspective. Within the MoD our Information Assurance practitioners
need to construct risk-balance cases, which are rigorous appraisals of the risks and
their impact, which support the Network Enabled Capability (NEC) decision-making,
risk prioritisation and potential trade-offs within the enterprise. Risk owners should be
clearly identified and given a better understanding of their risk appetite. The business
drivers and prioritised set of MoD’s risks should be used to create an IA vision and
strategy for the department. The holistic approach to effective Information Assurance
education will need a more detailed IA curricula derived from business cases and
implementation roadmaps for the department going forward.
The Right Skills
“You don’t want to open that Pandora’s Box, because you never know what Trojan horses
will leap out”.
Rt. Hon Ernest Bevin MP
Pervasive computing, Information Services (IS) and Information Technologies (IT) is as
much a part of our lives as Maslow’s (1943) pyramid. Information Security, its
Assurance and risk management has become technically and holistically challenging to
the practitioners and academia. They have become key issues in today’s transforming
and pervasive information driven world and its complex of actors. Securing our
Information assets is critical as it is pushed and pulled around us all 24/7. It is
exploited, stored, manipulated, targeted, controlled, stolen and often compromised (US
CERT 2008).
“Professionalism” requires a sober and objective approach to risk assessment: but the
dilemma for the security industry is that wherever threats are evaluated as remote, the
security industry will receive very little attention (funding) from anyone. The IT
security sector has been notorious for the way it trumpets any vulnerabilities it finds to
Engineering Doctorate
Page 175
Bridging the Air Gap: An Information Assurance Perspective
one and all, usually well before they have been discovered let alone exploited by
anyone else, merely as a means self-publicity and headline-grabbing, in order to attract
funding. So the dilemma for the profession is how its “professionalism” will allow it to
step out of this maelstrom of self-interest, and convince the public at large that it is
objective, and has no particular interest in exaggerating security threats. The record of
IT professionals (in general) in the area of proportionate threat assessment is not good
(e.g. the Millennium bug that wasn’t). Easy sensationalism is easier than evidencebased threat assessment and scientific objectivity, it would seem. “We live and work
both as individuals and as part of communities [complex actors], within organizations
and society as a whole. Our understanding and acceptance of the world around us is
couched within negotiated meaning of those contexts. Security needs to support users in
seeing and negotiating safely on those terms within technologically mediated systems.”
(Adams and Blandford, 2005).
The Computer Security Institute / FBI (2007) reported a significant upswing in
cybercrime and these criminals are becoming well organised. Motivated individuals and
criminal groups see the Internet as a medium to further their causes; disseminate their
SPAM and other propaganda; to change, poison, disrupt or destroy existing structures.
Information Infrastructures need to become more interoperable and robust; systems
more dependable and critical infrastructures have to be trusted. Mitigating complexity
to develop and secure NEC systems and their application IA Practitioners have to
understand both the enterprise architecture and the adversaries. The knowledge and
skills to meet this demand have to be gained and continuously developed and it is
incumbent that IA Education has to provide a holistic approach to emergent designs
and application complexities (Bishop, 2002; Wasim 2006).
In the virtual world, informed knowledge often has a very short shelf life. Whitman
(2004) expounds new vulnerabilities are often found each day and on the same day we
can experience a threat. These threats vary from espionage, sabotage, hacking, identity
theft, crime to terrorism. The level of sophistication and speed of development of the
tools being used to create security breaches and attacks are growing exponentially
(Eloff, 2005). This constantly changing, chaotic environment encapsulates why security
knowledge needs to be continuously evaluated and disseminated as deployed countermeasures become bypassed and obsolete overnight. Consequently, IA practitioners
must be continuously updated with a holistic, concurrent and relevant development
programme. Professional Institutions and universities providing IA education have a
duty to keep their curriculum innovative and relevant. NIST (2003) has a framework to
Engineering Doctorate
Page 176
Bridging the Air Gap: An Information Assurance Perspective
developing IA education courses. However, Information Assurance is very diverse,
combining the disciplines of holism, complexity theories, computer science,
information philosophy, CIS engineering, soft systems, forensics, education, psychology,
business administration, law, and accounting. The interdisciplinary nature requires
cohesive perceptions and perspectives of specialist educators, lecturers and
practitioners often requiring different schools to collaborate. Such a multi-disciplinary
curricula approach and subsequent integration will require careful planning and
implementation. Gibson (2007) posits that the IA profession needs modern business
administration skills to the already complex multidiscipline portfolio and figure 162
illustrates the depth of 3 components of this portfolio. Many universities incorporate
Information Management, Risk Management and Business Studies modules to their
undergraduate and post-graduate courses and they are starting to address the
capability gap in our knowledge and expertise of Security, Risk and it Management. Our
learning institutions are beginning to produce a growing number of professionals with
Information Assurance expertise.
Security
•Confidentiality
•Sensitivity
•Availability
•Accountability
•Intrigity
•Appitite
•Analysis, Assessment & Audit
•Convergence and Emergence
•Judgement and FUD
•Threat, Vulnerability and Impact
Risk
Management
•Knowledge
•Information
•System
•Policies, Procedures and Practice
•Change
ASSURED
Figure 69: Information Security Management
Engineering Doctorate
Page 177
Bridging the Air Gap: An Information Assurance Perspective
Security Education
“Blame human psychology: when it comes to information security, we’re simply not built
to intuitively rank actual risks. Learn how building threat models can help companies
rationalize the biggest security and compliance risks they face,” Mathew Schwartz 2006.
Figure 70 illustrates the information asset is often seemed wrapped around the
technologies and applications that support it, rather than the content of the knowledge
it represents. Hence people become distant to the content and rely on the technology as
barrier hoping that processes will protect themselves and their systems from
vulnerabilities, threats and possible attacks. Often the environment and the
organisations that have built it will play an important role to the judgement of these
actors in their complex world. We can see that Assurance and its associated Risk
Management needs to address all the spheres of influences, to protect the services,
organisation, people and the information asset; transposing the vulnerabilities and
threats vectors away from the assets to the dimensions of Assurance.
The Threat and
Attack Plane
System
Assurance and Risk
Vulnerabilities
Environment
People and Process
The Threat and Attack Plane
System Vulnerabilities
Information
Technology
Information
Figure 70: Encapsulating the Assurance of Information
We typically overreact to less risky threats while ignoring bigger, quieter, more longterm hazards. Thus we obsess about laptop encryption, try to automatically monitor for
Engineering Doctorate
Page 178
Bridging the Air Gap: An Information Assurance Perspective
information leaks, while ignoring the threat of insiders or social engineering attacks,
and wait for some impending governance, risk, and compliance platform silver bullet to
solve all future problems. Lack of information is frequently not the cause of our
inability to identify our biggest information security and compliance-related threats.
Rather, it’s a more fundamental problem. “We are not adept at making rational security
trade-offs, especially in the context of a lot of ancillary information designed to persuade
us one way or another,” alleges BT Counterpane Chief Technology Officer Bruce
Schneier in a recent essay titled “The Psychology of Security.” In particular, he identifies
five areas “where perception can diverge from reality” when it comes to evaluating
security trade-offs: risk severity, risk probability, cost magnitude, countermeasure
effectiveness, and the actual trade-off itself.
Students and practitioners are faced with many complex, ill-defined challenges with the
virtual environment. Information infrastructure and their knowledge silos are been
linked, routed and dumped routinely without authority. To be successful practitioners,
they will need to be able to solve the ill-defined holistic problems caused by our
complex actors and the system of systems architectures. This reflects the nature of the
information security environment assessing the risks, threats, and vulnerabilities are
only the beginning to assuring and accrediting the systems. This, in-turn poses
significant challenges to the educators, who need to prepare the IA professionals to
recognize and manage complexity (Janet, 1986).
Education
Motivation
Deformation
Dissonance
Awareness
Figure 71: Education facilitating Understanding
Engineering Doctorate
Page 179
Bridging the Air Gap: An Information Assurance Perspective
Figure 71 illustrates how education facilitates understanding and in particular our
curiosity and need to know is a strong motivator as commented by Peter Senge and his
Fifth Discipline (Senge P. , 1990). However, even though the Defence Strategy calls for
better education, it fails to provide suitable and substantial resources to enact a fruitful
outcome. Why? - It is not about resources, in particular cash, it is about how we
manage our human resources, how we engage in the wider communities of interest and
how we educate and make aware those complex actors. Figure 72illustrates the process
required to build a Continuum of Understanding as described by Shedroff (1999) and
as developed into a learning organisation by Peter Senge.
Context of Understanding
Consumers
Experience
Data
Information
Producers
Knowledge
Wisdom
Cognitive
Comprehension
Stimulus
Awareness
Context
Context
Context
Global
Local
Personal
Activities
Activities
Activities
Organisation
Conversation
Contemplation
Presentation
Storytelling
Evaluation
Interpretation
Audience
Non-Participatory
Participatory
Figure 72: The Continuum of Understanding (Shedroff, 1999)
Engineering Doctorate
Page 180
Bridging the Air Gap: An Information Assurance Perspective
Higher educational institutions like Bournemouth University have planned and
implement BSc courses in Security and considering potential job opportunities
(Participatory in Figure 165) in information security want a large number of their
undergraduates to enrol. Most students (Consumers in Figure 165) are motivated
(Cognitive Stimulus) to acquire practical skills and future security courses will need to
cover a wide spectrum (Comprehension Awareness) of security concepts, designs,
applications, governance, simulations and practicals including hacking (Brian, 2006).
Current University courses are equally popular among the undergraduate and graduate
students. At the Defence College there has been a clear distinction in their increasing
numbers wanting to undertake security projects. While CIS Management graduate
students tend to look for more theoretical projects leading to their theses most
undergraduate students are more interested in “hands-on” implementation-oriented
projects that are more offensive than defensive (Martin, 2006).
Why would managers, administrators, practitioners and even users want to engage in,
develop and relearn Information Assurance? Often we hear “if the Government educates
and trains it personnel, industry will entice away”. In practice this is not apparent.
Holistic career minded individuals are not always motivated by salary expectations,
many see rewards from achieving objectives and being recognised for doing so.
Education is rewarding. We need a shift of mind to develop and foster Senge’s Personal
Mastery, to produce a shared vision from the development of mental models as
structured in his book.
The Information Security Professional Development Programme
The soldier’s or civilian’s Continued Professional Development (CPD) is a process by
which individuals take control, taking the responsibility and ownership of their own
learning and development, by engaging in an on-going process of reflection and action.
This is a process that empowers, excites and can stimulate individual achievements,
aspirations and career goals. The Information Security Professional Development
Programme (ISPD) is a proposed solution for the professional development of
practitioners based on the Government’s IA Profession Framework. The aim is to
provide a clear career path supported by a certified educational and training
programme for Government and NGO security professionals. In particular, there is a
greater need to focus on educating existing professional practitioners and accrediting
their professional competencies. The ISPD Programme should extend to cover List-X
companies and other Government contracted agencies.
Engineering Doctorate
Page 181
Bridging the Air Gap: An Information Assurance Perspective
More work needs to be done to formalise the ISPD such as scoping a Training Needs
Assessment and establishing guidance for the identification of roles and proposed
certification of personnel conducting information security functions within the
Department, its networked information environment and the security roles across
other Government Departments. This extra work will provide the foundation to
establishing the National Occupational Standard (NOS) for Information Assurance
(currently under discussion between the Skills Council, BIS, CESG and BCS).
The proposed ISPD programme will have three core security disciplines:
Physical security
Personnel security
Information security
However, there are a number of other important NEC security-related topics which,
where appropriate, will be included in the curriculum at an appropriate level of
complexity. It is envisaged that general security training courses are designed to
provide specialized training in areas beyond the core security disciplines. These include
Communications Security, Business Continuity, Information Assurance, Operations
Security (OPSEC), Information and Risk Management. And Gerald (2006) gives a
compelling case for certification and accreditation methods to be incorporated into an
information security curriculum.
Table 10: ISPD Levels of Competencies
Level
1.
2.
3.
Competency
Basic training – CBT and distant learning
Practitioner training and education– Taught
and distant learning module courses
Expert training and education – Specific
taught modules with distant learning
NQF Levels
2
3 and 4
5,6 and 7
material
The ISPD would be organised into distinct levels of competencies, illustrated in table 6,
will provide the opportunities to gain nationally recognised civilian qualifications
Engineering Doctorate
Page 182
Bridging the Air Gap: An Information Assurance Perspective
through the accreditation of education, training and experience. This is an important
component of MoD’s personnel strategies since it provides recruiting, development,
retention and resettlement benefits. The ISPD training should align the established
SFIA / NEC framework against the Qualifications and Curriculum Authority’s National
Qualification Framework (NQF) and any future Occupational Standard. It would be
organised into its distinct levels of competencies as illustrated.
The key element to the ISPD programme is a framework that addresses the following
Education and Continuous Professional Development objectives:
1) Develop a skilled profession with a common understanding of the concepts,
principles and applications of Information Management; its Security and
Assurance for each level to gain information superiority and enhance the
confidentiality, integrity and availability of the information infrastructure.
2) Develop a more holistic approach to Information Security and Assurance by aiding
the establishment an IA profession.
3) Establish an education, training and awareness baseline, against the SFIA/NEC
framework, scoping the technical and management of information security skills
amongst
personnel
performing
security,
information
management,
risk
management and Information Assurance functions within Government and NGOs.
4) Provide qualified security professionals.
5) Augmenting skills developed through training and experience with the
implementation of a professional development programme comprising of
residential courses, distributive and computer based training, distance learning,
supervised on-the-job training, exercises, examination and certification.
6) Verify, audit and sustain knowledge and skills through standards, qualification
testing and certification.
The ISPD should develop and certify some additional material which reflects specific
business best practice, legal requirements, technical standards and ethics that are
international, contextual and organisation specific (Janine, 2006). While each level in
the ISPD programme is open for students meeting certain formal prerequisites, the
sequence of CPD modules and degree courses will be designed in such a way as to allow
Engineering Doctorate
Page 183
Bridging the Air Gap: An Information Assurance Perspective
students to progress from NQF levels 3 to 7 without undue overlap or repetition. This
would still provide the flexibility for this organisation and other departments to
recognise relevant international qualifications but still have the professionals having
knowledge of the local content and regulations which are necessary for practising
information security.
Figure 73: The Proposed Modular CPD Roadmap
The UK’s greatest asset is our information, whether its intellectual knowledge, data
sources or financial transactions, we need to protect it, and thus we need assurance and
this assurance will be provided by accredited professionals, who have a career path
with rewards, to secure its confidentiality, integrity and availability to authorised users.
The ISPD programme is something long overdue and what the IA community has been
asking for. The proposed programme provides the education element to a new
structured career path for the security professionals. It will educate them in areas in
which they have been entrusted, to protect people, information, facilities, operations,
and activities. This initiative will provide the UK trained security professionals with a
genuine career path.
The Federated MSc
The opportunity for the information security profession is immense. Clearly we must
continue to understand the evolving threat landscape coming from increasingly
sophisticated criminal factions. We must also stay on top of the available technology to
protect against these threats, recognising them as tools, rather than the focus of our
jobs. Most importantly, however, we must recognise that our jobs are not only critical
Engineering Doctorate
Page 184
Bridging the Air Gap: An Information Assurance Perspective
to the running of the business and protection of its assets, but also to its development
and strength in the future. We are driving a change in the role of the security
professional.
“Imagination is more important than knowledge. Knowledge is limited.
Imagination encircles the world.” Albert Einstein
Image studying security, its vulnerabilities and failures in a dedicated academy; a
depositary of knowledge and incidents; a facility to pursue innovative solution. A place
that coordinates IA issues, where threats and attacks can be diagnosed and investigated
without compromising commercial sensitivities or the confidentiality of military
systems.
Figure 74: Proposed Federated Master of Science (MSc) in Information Assurance
Frankly, this is much easier said than done and indeed if the academy operates
confidentially, it may have some problems convincing the public that it indeed is a
“professional” organisation, rather than just a “closed shop”. That there may be
difficulties to achieve the aforesaid feedback into development processes if evaluations
are classified and hence we will need some way of protecting case details from being
inferred from general security advice. Some might argue that the very fact that some
organisations do not wish details of security mistakes to become known is symptomatic
of inadequate security culture. There is considerable literature about the need for
Engineering Doctorate
Page 185
Bridging the Air Gap: An Information Assurance Perspective
security education and a contrasting perception of little resources to facilitate it. The
implementation of an ISPD facilitates the ideal of building a UK IA Academy which can
coordinate and accredit CPD courses for Educational and Professional Institutions,
Government Agencies and corporations. Focus and efforts should follow, but also, the
UK should develop the US programme for National Centre of Academic Excellence in
Information Assurance Education established by the U.S. National Security Agency.
Figure 75: An Alternative Schedule for a Federated MSc in Information Assurance
Like a number of our universities Bournemouth’s BSc scheme of work for their new
Information Security and Forensics course has initially focused on various aspects of
adding and integrating IA subjects into their existing curricula.
The proposed
Federated Master of Science (and possibly a Master of Research-MRes) framework are
illustrated in Figures 167 and 168 and exhibits the two semester programme
examining the Human-Cyber Interfaces and Understanding the IA Cross-Domain with
an underpinning selection of core lectures and studies and a laboratory work in the
kinetic learning environment of a (SEnIA) cyber –range.
A general outline of the curriculum that is widely recognized and replicated is required
and typically a degree course should contain four core modules: “Information
Management”; “Security Devices, Mechanisms and Cryptography”; “Information
Engineering Doctorate
Page 186
Bridging the Air Gap: An Information Assurance Perspective
Assurance” and “Computer Security and Network Defence” which should be
accompanied by several elective modules and a final project.
Bournemouth has
recognise that other universities are increasingly offering more dedicated courses that
broaden the scope of undergraduate courses to post graduate degrees and diplomas
such as The Royal Holloway, University of London, MSc. Degree in Information Security,
which first commenced in 1992.
Bridging the capability gap requires more than a few Universities pioneering courses.
There should be a national requirement to focus and scope more courses towards
professional than academic careers. Current security courses are typically dictated by
faculty research interests, considerable attention has since been devoted to the
systematic curricula design process of academic programs particularly at the
undergraduate level (Hjelmås and Wolthusen, 2006). However fascinating, “information
forensics” (or the study of vulnerabilities) is really only worthwhile if it leads to general
lessons being learned from particular cases; this requires that a vulnerability analysis
leads to concrete proposals for changes to the computer systems development process;
the aim of these changes should be to eliminate the whole class of vulnerabilities to
which the subject vulnerability belongs. Randomised analysis of programmer error is
not of much value, but a systematic classificatory analysis stands more chance of
improving IT products significantly prior to delivery: a valid goal for any professional
IA academy.
So do security professionals have role in dissuading product suppliers from seeing
security as their own private business? This dilemma has been a problem for CLEFs
operating Common Criteria assessments, since the assessment is generally paid for by
the product supplier: if the details of the assessment are not made public, there is
always some question about whether the evaluation certificate is just the result of a
circular “rubber-stamping” exercise for the sake of getting paid: as Ross Anderson put
it, “the real issue is (said to be) ‘confidence’; that is, convincing people that systems are
secure even when they aren’t”.
There are challenges and opportunities presented by offering a UK wide IA Education
and CPD programme, to be innovated, timely and relevant, to offer a clear progression
academically challenging and professionally rewarding education which will enable
students pursue further careers in both academia and industry. The IA Academy is an
imaginative solution but it can be positioned to facilitate security knowledge
management.
Engineering Doctorate
Page 187
Bridging the Air Gap: An Information Assurance Perspective
“The control of knowledge is the crux of tomorrow’s worldwide struggle for power
in every human institution.” Alvin Toffler
Figure 76: A detailed sematic of the first proposed IA MSc Semester
Figures 169 and 170 illustrate a detailed sematic timetable for the proposed Federated
MSc in Information Assurance. It encourages a high ratio of contact time between
students and staff and allocates considerable time for experimentation and system
simulation workshops. This paper proposes the development of the IA Professional
Framework with a specific security educational programme, the ISPD and developing a
network of academia and practitioners through a national centre of excellence. Such a
centre will need the resources and cooperation of Government Departments, NGOs,
Corporations, training organisations and higher educational institutions.
Engineering Doctorate
Page 188
Bridging the Air Gap: An Information Assurance Perspective
Figure 77 A detailed sematic of the second proposed IA MSc Semester
In partnership with Bournemouth University, the Defence College is continually
developing an innovative security education paradigm. By working closely with other
government agencies in developing an information security and assurance curriculum,
institutions like Bournemouth University will able to provide a unique and rich
learning environment for their students and ensure that government, NGOs and
corporate employees gain their Professional Development in relevant practices of
Information Assurance. Bridging the capability gap is important and a recognised IA
Academy can bring together government agencies and corporations into a resourced
research laboratory that will ultimately facilitate the real paradigm. The Academy
would be a facility where security problems can be solved with innovation by teams of
faculty members, professionals, and students.
Qualifying and sustaining IA
practitioners is a challenge to be conquered. The Academy will need to progress,
develop and implement an Educational and IA CPD programme to train student and
existing and newly accredited professionals effectively, economically and with a holistic
approach.
Engineering Doctorate
Page 189
Bridging the Air Gap: An Information Assurance Perspective
4.3 Building an Information Assurance
Competency Framework
The IA competency framework set out in this paper is inclusive, and practitioners are
encouraged to consider whether any other specialist skills relate to their work,
particularly in relation to the Government IT Profession and Knowledge and
Information Management Profession.
There are six key strands to the implementation of IA professionalism:
Professional Competency Framework – described in this document.
Training and opportunities to share common experience.
Private sector collaboration – the IISP will be key in this area.
Networking and mentoring.
Communication.
Partnership – working with, and alignment to, Professional Skills for
Government, the Government IT Profession, the Knowledge and Information
Management Profession and other professions and stakeholder groups, in
particular the IISP.
Recognition and understanding of IA
This IA Competency Framework proposes a structure for an IA profession, to which all
those with IA responsibilities would belong (although it does not preclude membership
of other professions, such as the Government IT Profession, where appropriate). It does
not take account of the professional needs of the other specialists with which IA
specialists work, such as IT, project management and finance professionals.
IA
specialists need an appreciation of these other professionals’ particular areas and their
relationship to both the organisation’s business and IA. In the same way, these other
professionals need an understanding of the need for IA and the roles of IA
professionals. Indeed, all staff need a basic appreciation of IA and their particular
responsibility for protecting information within their own sphere of influence. This is
comparable to the inclusion of Finance as a core competence within the PSG
Framework. This wider understanding of IA is outside the scope of this Competency
Framework, but it is vital in ensuring that IA specialists are given proper recognition
for their contribution to the organisation’s business. In turn, all IA professionals need
Engineering Doctorate
Page 190
Bridging the Air Gap: An Information Assurance Perspective
to ensure that they can communicate effectively with the business, and with others
outside IA, in appropriate language.
Although IA is a distinct profession, there are potential areas of overlap with both IT
and Knowledge and Information Management, as shown in Figure n below. Members of
one profession might therefore also be members of one or both of the others,
depending on their role and background. Information Technology (IT) is concerned
with the application of technology to enable business objectives. It encompasses a wide
variety of specialisms, including design, implementation and operation of information
systems. The Skills Framework for the Information Age (SFIA), used as the basis for the
Government IT Profession framework, covers a broad church, including such diverse
activities as procurement and project management, which are clearly professions in
their own right, but with some overlap with the IT profession. Information Assurance
holds a similar relationship with IT, in that it is distinct, but with elements of overlap.
The Government IT Profession brings together all IT professionals working across the
UK public sector, from new entrants through to the members of the Chief Information
Officer (CIO) Council. It is coordinated by the Delivery & Transformation Group within
the Cabinet Office, and the CIO Council provides sponsorship and direction from the
highest level. Its aim is to create a joined up, government–wide IT profession which
provides IT professionals with a career of mutual benefit to the individual and the
government. HMG defines Information Assurance as “the confidence that information
systems will protect the information they handle, and will function as they need to, when
they need to, under the control of legitimate users”. The IA Profession needed to include
roles which provide this confidence by ensuring that the confidentiality, integrity and
availability of business information and information systems are appropriate, cost
effective and compliant with legislation, regulation and standards. The 2007 UK’s
National Information Assurance Strategy defines “the development and availability of
appropriate IA Capabilities”, including improved professionalism, amongst its
objectives.
The Government’s General IA Products and Services Initiative (GIPSI) Profession sub-
group subsequently established a competency framework and career structure for the
Information Security and Assurance profession. The present need is for a programme
to progress and accredit education and professional development of existing
practitioners. The framework links the Skills Framework for the Information Age
(SFIA), which is currently used by the Government IT Profession, to a career path and
expected educational standards.
Engineering Doctorate
It defines competencies from Entry to Head of
Page 191
Bridging the Air Gap: An Information Assurance Perspective
Profession across IA, and expands IA into seven specialisms:
Leadership
Head of Profession
Information Assurance
Entry
DISCIPLINES
Education, Training
and Awareness
Engineering and
Security Network Architecture
Contingency Management
Associate
Practitioner
Operations and
Security Management
Practitioner
PROGRESSION
Senior Practitioner
Verification and Audit
Subject Matter Expert
Risk Management
and Accreditation
Policy and Governance
Head of Specialism
TRANSFERABLE SKILLS and QUALIFICATIONS: Business and Personal
Figure 78: UK Government IA Framework
The Government Framework (also see Annex 5) further identifies the educational and
training qualification requirements and the accredited continuous professional
development certification through membership of professional bodies such as the
Institute of Information Security Practitioners (IISP), BCS and the IET. The
qualifications were defined for each level in line with the National Qualification
Framework (NQF).
While each level in the ISPD programme is open for students meeting certain formal
prerequisites, the sequence of CPD modules and degree courses will be designed in
such a way as to allow students to progress from NQF levels 3 to 7 without undue
overlap or repetition. This would still provide the flexibility for this organisation and
other departments to recognise relevant international qualifications but still have the
professionals having knowledge of the local content and regulations which are
necessary for practising information security in the UK.
The opportunity for the information security profession is immense. Clearly we must
continue to understand the evolving threat landscape coming from increasingly
Engineering Doctorate
Page 192
Bridging the Air Gap: An Information Assurance Perspective
sophisticated criminal factions. We must also stay on top of the available technology to
protect against these threats, recognising them as tools, rather than the focus of our
jobs. Most importantly, however, we must recognise that our jobs are not only critical
to the running of the business and protection of its assets, but also to its development
and strength in the future.
Table 11: Competency Levels of an IA Practitioner
Level
Competency
NQF Levels
1.
Entry awareness based training
1
2.
Basic training – CBT and distant learning
2
3.
4.
Practitioner training and education– Taught
and distant learning module courses
3 and 4
Expert training and education – Specific
taught modules with distant learning material
5,6 and 7
We are driving a change in the role of the security professional. The UK’s greatest asset
is our information, whether its intellectual knowledge, data sources or financial
transactions, we need to protect it, and thus we need assurance and this assurance will
be provided by accredited professionals, who have a career path with rewards, to
secure its confidentiality, integrity and availability to authorised users. The ISPD
programme is something long overdue and what the IA community has been asking for.
The proposed programme provides the education element to a new structured career
path for the security professionals. It will educate them in areas in which they have
been entrusted, to protect people, information, facilities, operations, and activities. This
initiative will provide the UK trained security professionals with a genuine career path
and appropriate accreditation.
Under current UK Information Security standards, classified networks have
considerable security and risk exposure constraints that reduce system access across
strategic, operational and tactical commands. Awareness of how IA affects knowledge
and information management and their overall trustworthiness, necessitates further
investigation and analysis of the NEC. IA professionalism plays an important role in
understanding the behaviour and the complex nature of the NEC domains.
Engineering Doctorate
Page 193
Bridging the Air Gap: An Information Assurance Perspective
• Fault Management
• Configuration Management
• Accounting
• Performance Management
• Traffic Enginnering
•Protocol Analysis
•Threat Analysis
•Vulnerability Analysis
•Impact Analysis
•Traffic Analysis
Network
Behaviour
Analysis
Network
Management
Network
Security
Network
Operations
• Risk Management
• Access Control
• Authentification
• Auditing
• Real Time Network Awareness (IDS,
IPS, RUA)
• Bandwidth Management
• Intelligent Infrastructure
Management
• Help Desk
• Network Monitoring
• Change Management
Figure 79: Ignorance of Network Behaviour, Management, Operations and Security
Governments, corporations and the military have undergone “a transformation in their
ability to gather, share and process information. The result is an unprecedented reliance
on information infrastructures for their very survival. This dependency creates new
opportunities for disruption” (Anderson 2005).
This presents societies with an
unprecedented reliance on information infrastructures for their very survival. In one
sense, this is tautologous: any reliance on technology that is new is by definition
“unprecedented”; in another sense (our dependence for survival), the claim is merely
false: “information” is hardly highest in the hierarchy of human needs: water, food and
shelter, law and order are surely still more important; but the trend toward increasing
dependence on IT in the systems that provide these things is the real issue; and
whether it is wise to continue the trend is a question all security professionals are
engaged in answering.
Engineering Doctorate
Page 194
Bridging the Air Gap: An Information Assurance Perspective
CHAPTER 5: Thesis Conclusion –
Managing the Holistic Paradigms
“Information Assurance (IA) is the assumed responsibility (Corporate Governance) and
accreditation of a socio-technical Enterprises across the 5-layers of the Cyber Domain
(Geographical, Physical, Logical, Persona and Cyber Persona), inclusive of their Business
Processes, Information Operations, Information Exploitation, Management, Services,
Technologies and Infrastructures. The socio-technical Enterprise is assured by
appropriate levels of maturity and awareness within the 8-Dimensions of Information
Assurance (Structure, Resilience, Dependability, Safety, Security, Protection, Trust and
Risk Management).” (Richardson, C.J., 2011)
Cyberspace has transformed our society, the way we do business and it affects our lives
in countless ways. We depend on its global connectivity, which delivers information at
light speed to most destinations in the world. In the Internet of Things, we and system
agents order goods, do successful transfer of products to markets, manage financial
assets, banking, travel arrangement and social networking to global communities: it
affects us, it is beginning to control us and at the same time it offers new hope,
freedoms and new opportunities. Cyberspace has become mankind’s event horizon.
Engineering Doctorate
Page 195
Bridging the Air Gap: An Information Assurance Perspective
The goal of the thesis was to research the question does system isolation work. Can we
really keep our secret, secret on a need to know bases and is this viable in the medium
to long term future of Government (Diplomatic); Intelligence; Military and Economic
(DIME) communities. The electronic isolation of our information systems is called Air
Gapping and it was sensible when our systems were used as administration tools for
departments, armed forces and other agencies. Bespoke systems were designed to
meet physical electronic attacks, signal interceptions and spectrum analysis, they were
often enclosed in TEMPEST shielded facilities and had very few terminals for a very
select set of users; such systems are still operated today. However, the information
stored in their data files are now needed by many new agents, actors and system users,
they need to share intelligence, government communications, mission media and
financial transactions with an ever increasing number of suppliers and clients. The
original context and contents of these silo-like knowledge repositories may be subject
to new analysis, data mining, knowledge transfer and decision making processes. The
Socio-Technical Enterprise of the Information Age needs to share its Knowledge,
Information and Data Assets.
The consequence of this research is to brush-off linearity and drill into complex
systems. To look beyond limited lifecycle models, so prevalent in system engineering
and enterprise architecture to encompass the problematic human behaviour affecting
such systems.
This thesis has set out to capture the more torridialG models of
interoperability, where each type of system behaviour impinges on the holistic,
combined operational pictures of Human-Cyber Interexchanges. The thesis asks the
questions and offers some methodology to find the answers from an Information
Assurance Perspective. It doesn’t have the answers, but it does show how we can get
better at making informed and trusted decisions.
What is the research question?
Can Information Assurance provide sufficient Trust and Risk Reduction to allow
information processed, stored and communication within highly sensitive (often
critical) networks, with their own discrete security domains (including encryption
mechanisms), which are often Air-gapped (physically and electronically isolated)
to interact safely and securely, particularly across many interoperable networks
and including the possibility of interfacing with the Internet.
Engineering Doctorate
Page 196
Bridging the Air Gap: An Information Assurance Perspective
The Hypothesis questioned can the Socio-Technical Enterprise and transforming
Governments, NGOs and the particularly the military afford to risk its most sensitive
data to a probably cyber-attack. Stand-alone systems with their own security domains
which are physically and electronically isolated; protected from other systems and
unauthorized access; are assumed to have a high level of security and are essentially
Air-Gapped. Whereas, bridged air gapped systems have made intrusion easier by
multiple access points, multiple system integration and uncontrolled access.
The
Hypothesis further questions whether the operational benefits overcome the potential
loss of assets; does the mission goals become realised in a more efficient and superior
manner if the communities of interests acted more coherently with a better situational
awareness, does the Enterprise have an risk appetite to do better, to share more
frequently and encourage greater interoperability with its partners. The wish has been
clearly stated, but is the will there? As fear is a very potent barrier.
The Cost of doing Business
Land
Sea
Air
Space
Cyber
Persona
Ubiquitous Communications
Information Infrastructures
Network of Networks
Figure 80: The cost of doing business in military cyberspace
To answer the hypothesis a methodology was created to discover the causal effects of
Bridging the Air Gap (Figure 24, p16). The methodology road-mapped 6 different paths
to argue that Information Assured Socio-Technical Enterprise could, and would, work
more efficiently and more effectively even with the risk of loss. However, such a risk
Engineering Doctorate
Page 197
Bridging the Air Gap: An Information Assurance Perspective
had to be managed with more stringent safeguards, a better cross-domain solution and
a better understanding of the systems of systems created.
From a military perspective, (figure 80) the cost of doing operations in Cyberspace is
considerably cheaper than the other four military domains (Land, Sea, Air and space)
and this hasn’t gone unnoticed by other State Actors and potential adversaries. The
military has to consider, develop, deploy and be willing to use cyber weapons and
consequently we have Cyber Warriors who have a serious dilemma in Cyber Network
Operations: when to defend and when to attack and is the potential to attack a good
defensive policy - deterrence? This dilemma produces a distinction between
Information Operations and Information Exploitation as modelled in I-Stack (Figure 47,
p133). The Defensive Approach allows IA Policies and Best Practice Framework (figure
51, p139) to identify a comprehensive and coherent metric structure to analysis,
manage and evaluate the Enterprise performance against International Standards. The
IA metric will provide sufficient Trust and Risk Mitigation to the Enterprise when the
system’s resilience and dependability components are driven through the Diamond
Model (figure 52, p141) to create a more assured Socio-Technical Enterprise.
Meeting the Research Aims
The research aim was to find a balance between protection and availability of
Knowledge, Information and Data (the security of the KID components) and the need to
exploit the information assets of a Socio-Technical Enterprise. This balance had to
trusted, dependable, risk managed and resilient to errors, faults, intrusions and
failures. The development of Information Assurance offers such a possibility. The
Global and Military information environment demonstrated that bridging the air gap
will allow the integration of many organisation (and create many vulnerabilities and
attack routes). The safety of the Enterprise System is equally as strong as its security as
these Information systems and operations are critical to our society, way of life and
most likely our lives. If Information Assurance was to offer any solutions then we had
to understand that the critical components of a safe and secure environment is
paramount to military success and national security; the context and concepts of
Information Assurance had to be thoroughly examined. Building models of the key IA
issues provided that examination.
In addressing the primary aims of research into Bridging the Air Gap from an IA
perspective this thesis postulated the “need to share” and the active building of
inclusive communities of interests through technical to social interoperability has more
Engineering Doctorate
Page 198
Bridging the Air Gap: An Information Assurance Perspective
impact to the overall well-being of a Socio-Technical Enterprise than the risk adverse
“need to know” policy and its restrictive, exclusive practice of limiting access. This
thesis has met its 5 primary aims and Engineering Objectives (Eos) as summarised in
Table 12:Table 12: Compliance of the Research Primary Aims
Primary Aims
Compliance
To provide an Information Assurance
Capability that will facilitate Cross –
Domain Solutions. This capability will
need a framework that formulates the
assurance
implications
of
interoperability within cyberspace,
human factors, protection of networks
and secure data content, alignment of
enterprise
architecture,
any
organisation
culture
changes,
information exploitation, management
and service dependability from
bridging the air gap between highly
classified networks and possible
interaction with lower classified
networks and the Internet and how it
might be done. The investigation will
also consider when those bridges might
be considered an acceptable risk.
Establish and develop an information
assurance framework and appropriate
models
to
meet
operational
interoperability
requirements;
whereby the study shall analysis
various contextual and conceptual
considerations
of
aligning
and
harmonising domain internetworking,
thereby offering an assured crossdomain solution to military CIS
interoperability.
Exploring six main topics within the
layered environment of Cyberspace (see
figures 11, 14 and 25) and thereby
framing the Cyber Landscape through
modelling IA concepts. Analysing
dependable, resilient convergence of
technologies
and
networks
and
developing a Cyber-Assured Culture
through
Education;
Promoting
Transferable Skills & Professionalism
will provide a new capability for
Information
Assurance.
IA
will
demonstrate how to provide solutions to
system interoperability; operational
EO1: The strategic positioning of IA as
the underpinning science of SocioTechnical interoperability, the mapping
of the Information Flow (figure 47,
p133) ; Security of the Cross-Domain &
System Survivability (figure 62, p153)
and the effective management and best
practice to control the Human-Cyber
Interexchange (figure 51, p139) have
been explored, modelled and argued
within this thesis. Its investigation has
produced working models that allow
greater understanding, perception and
awareness that the application of IA is
essential for the trustworthiness of
Systems and survivability of
Enterprises operating in Cyberspace.
Engineering Doctorate
EO2: Chapter 2 (Figure 21, p74): The
Composite Model of Interoperability
provides an IA Framework that
encapsulates Enterprise Architecture;
the layering of Interoperability (Figure
5, p19) and systems of systems
interoperability.
EO1, EO2 & EO3: The development of
the IA models and their current
application to various business (figure
32, p100); Enterprise systems (figure
34, p108) and educational (figure 78,
p192) problems is a testimony of
importance and application of this
research. More has to be done and
there are future recommendations. The
alignment of the 8-Dimensions of IA is
needed to find Cross-Domain Solutions,
System Tolerance, Risk Mitigation,
Compliance and Maintenance of Shared
Situational Awareness. This creates
Page 199
Bridging the Air Gap: An Information Assurance Perspective
benefits; operational security and new additional, but necessary, complexity to
community learning outcomes.
highly integrated, relational concepts
of the Information Domain and
Cyberspace.
Illustrate the value of this research EO1 & EO3: The Thesis provides
approach to the network-centric security sufficient breadth and depth of
problems of NEC (and the Global modelling IA Cross-domain Solutions of
Information Environment as illustrated Socio-Technical Enterprises (some of
in Error! Reference source not found.) which are been actively used by
nd highlighting the real human-centric Enterprises) and has recommended to
assurance issues to the various layers, further test the validity and impact of
domains and environments of an these models in a (SEnIA) Cyber Range.
interoperable Cross-Domain Solution
and provide a discussion on how the
qualitative experience of this research
and individual perceptions can be
analysed and developed.
To identify, formulate and exhibit this
approach and model implementation
demonstrating it as a worthwhile
Doctoral investigation. The thesis will be
a successful project managed research
programme with achievable, realistic
outcomes within well-defined goals and
agreed deliverable products.
EO4: The contextual and conceptual
modelling of IA as formulated within
this thesis has extended the State of
Art, knowledge and understanding of
the Science of this new Academic
Philosophy.
The Human-Cyber Interexchange within a Socio-Technical Enterprise and the coupling
across Enterprise Boundaries is a complex and evolving environment with many
known and unknown emergent properties that can create new opportunities or
jeopardise our societies. The ability to promote and to have: safe and secure,
transforming, Information Operations across Cyberspace with protected Critical
Information Infrastructures is a tier-1 national priority (Cabinet Office, 2011a). This
Thesis has provided the context in which IA may allow Enterprise to meet that priority
and the concepts and models of where and how this can be done.
5.1 Business Solutions to the Bridging the Gap
The rise of the Socio-Technical Enterprise, its real and virtual business operations, the
ever increasing capacity to process, store and transmit Knowledge, Information & Data
(often referred as Big Data); the introduction of Moore’s law to computer design
creating more powerful petabyte multi-cored machines; the phenomenal growth the
Internet of Things (man and virtual agents) and this vast new world and symbiosis of
Human-Cyber Interexchange (as illustrated in figure 81) has transformed how
Governments, Industry, the military and individuals interact. We are becoming more
Engineering Doctorate
Page 200
Bridging the Air Gap: An Information Assurance Perspective
aware of our environment, more socially connected and much more knowledgeable
More Machines
with vast arrays of Knowledge repositories a few clicks away.
More People
Figure 81: The Socio-Technical System of Man and Machine
The social landscape of the natural (real) word has created the Human-Cyber world
and the social-technical enterprises that maintain, expand and evolve. The SocialTechnical Enterprise is a Social Machine described by Professor Tim Berners-Lee
(Berners-Lee & Fischetti, 1999) as a “processes in which the people do the creative work
and the machine does the administration” which Theodore Piepenbrock (2004) further
described as a dynamic spatial and temporal complex system “where cause and effect of
management's strategies and policies are distant in space and time… Temporal
complexity recognizes that policies, decisions, structure and delays are interrelated to
influence growth and stability. An enterprise's long-term success therefore is a function of
management's ability to control this dynamic complexity.
This dynamic complexity presents the Enterprise with new, vibrant management
challenges, new opportunities to grow on a global scale; interact and access a global
audience, to create new communities of interest and to share information to the benefit
of all. Newtonian physics betrays this ideal world, for the opposite is true, the challenge
is to keep out the unwanted, the criminals, people with malicious motives and actors
who want to steal the Enterprise intellectual property. Dynamic complexity also
produces fear, uncertainty and doubt (see chapter 3.1, p156), it creates vulnerabilities
and weaknesses that can threaten the existence of its business, and the business of
others; the spatial nature of the cyber world is that we all are interconnected.
Engineering Doctorate
Page 201
Bridging the Air Gap: An Information Assurance Perspective
In Cyberspace, the good does outweigh the bad, Social Technical Enterprises are
flourishing, social networks are expanding, e-commerce has a phenomenal rate of
growth and most of our society’s institutions and supporting systems are administered
across the Internet. There is cybercrime, but there has always been crime in human
society; this is just a different attack pattern that we need to become more aware of
these attack profiles and have better socio-technical solutions. Resolving Cyber Attacks
and patching our vulnerabilities has become harder, the anonymity of individuals that
roam the networks makes policing and attribution much more difficult.
Billions of Dollars have been spent on Cyber Security and the protection mechanisms of
network edge devices and anti-virus software and yet, it takes a few $100 and some
rudimentary knowhow to penetrate these most sophisticated defences. The protection
mechanisms are needed because they do deter, hinder and capture most malicious
attacks (CNA) but they are frequently been exposed to social attacks and zero-day
vulnerabilities. This natural has kept many Intelligence Agencies arguing for electronic
isolation (Air Gapping the Systems) of our more important and sensitive Critical
Information Infrastructures, Military Capability and Knowledge Repositories. Nations
and Enterprises need to keep their secrets, secret. However even isolated secure data
silos have been compromised, penetrated and may still have insider intrusions;
absolute security is impossible. Furthermore, these system silos have information that
their user communities need to share, amongst themselves and with others. The
sharing of information has created new interpretations; new knowledge and
understanding; a greater awareness of the problems to be solved and has benefitted the
Enterprise with more informed, superior decision making. The shared awareness has
greatly improved the mission success, operational performance and efficiency of the
Enterprise.
What is required is an Assurance Process that will allow the transfer of KID assets
across Enterprise boundaries that will not compromise their operations, but will
benefit their social-technical capabilities and strategic goal. This thesis has attempted
to find the socio-technical bridges that might be employed to make our sharing of
information more trusted, dependable and secure. There are technologies such as
encryption, data diodes, intrusion prevention systems and multi-layered authentication
and access control that all contribute to the protection of Information Systems and the
Information flow across distributed services and databases which are making our
cyberspace more secure and protected, but it isn’t enough.
Engineering Doctorate
Page 202
Bridging the Air Gap: An Information Assurance Perspective
As Chapter 3 demonstrated, the layers of interoperability stem from the technical
interface to the social systems of organisation and the motivation and psychological
human factors. With people, there’s always insecurity. The largest single threat to
Cybersecurity is the Insider Threat. Information Security needs a new perspective.
Chapters 1 to 4 have argued that this new perspective is Information Assurance and its
architecture, framework and models are needed to provide and the resilience,
dependability, safety, security, protection, risk managed and trustworthiness of the
Socio-Technical Enterprise. Chapter 7 has provided a number of arguments to create IA
practitioners and education for the communities of interest. Bridging the Air Gap was
never going to be a technical solution. Cross-Domain solutions and system survivability
needs informed and knowledgeable IA practitioners to formulate evolve and evaluate
the constant variable picture of cyber operations and the flow of information.
Strategic Reprise
In 2006 a number of on-going conversation were converging on the need to provide a
national response and direction for Cyber-security and the protection of our Critical
Information Infrastructures and Institutions (Rawlinson, 2005; Cabinet Office, 2005;
Dull, 2006). In Afghanistan, NATO was trying to provide a mission secret platform for
all communities of interest, including Afghan Government and military agencies. These
systems were under constant Advance Persistent Threat (APT) attacks and well
published exposures were hurting the reputation and integrity of these communities
(Allor, 2007).
In 2007 the UK Government published its National Information Assurance Strategy
(Cabinet Office, 2007) which formulated a number of (CSIA) Government Working
groups to provide methodologies to implement this strategy and at a Bletchley Park
NATO Seminar the concepts of security compromises was raised as a Socio-Technical
problem (Richardson C. J., Security: a necessary compromise?, 2007).
In 2008 the US White House published the Comprehensive National Cyber-security
Initiative (The US National Security Council, 2008) and started to invest money in new
military organisation (CYBERCOM), security initiatives and IA education in Government
Departments and Universities. This initiative was challenging and demanded
improvements to defend national interests and information assets. This theme was
promulgated at the NECTISE conference at Leeds University (Richardson C. J., Bridging
Engineering Doctorate
Page 203
Bridging the Air Gap: An Information Assurance Perspective
an IA Capability Gap, 2008) and the drafting of a proposed IA professional framework
(Richardson C. J., The IA Professional Framework - Draft White Paper, 2008) to
Although these doctrines were based on the development of Information Security
attributes and policies, they were only beginning to formulate issues involved with a
social-technical environment and in particular in the high-tempo environment of
military operations Telic and Herrick. This required a new look at the context and
concepts of Information Assurance as initially described at a MSc Guest Lecture, DCCIS,
Blandford Forum, (Richardson C. J., Cyber Situational Awareness: The Assurance of
Information Operations, 2008b) and the need to federate our networks in theatre. This
became a central theme of Chapter 4, the CSIA sponsored GIPSI working Group on
Professionalism. This framework was later modified and reintroduced to the
competency framework of IA practitioners in Institute of Information Security
Professionals (IISP) and then by CESG for IA Practitioners for Government Services. It is
now also used for bases for a National Occupational Standard (NOS) currently been
formulated by BIS and the Skills Council for IT (e-Skills).
The cyber initiatives have placed Information Assurance as the main policy for the
security and protection of Cyberspace and this had become the focus of IA Architecture
and Information Management Strategies, (Willett, 2008; MoD, 2009).
The strategic Positioning of Information Assurance as argued in chapter 2.4 (Figure 34,
P108) has focused IA as a major component of Corporate Governance, Business
Engineering Doctorate
Page 204
Bridging the Air Gap: An Information Assurance Perspective
Continuity and the trustworthiness of business and decision-making processes
(Richardson, C. J., Information Assurance: Holistic and Human Centric, 2011b). This
new focus integrated the concepts of strategic business modelling to an IA framework
that mapped the follow of Information and the responsibility of the Enterprise to
protect its information assets. This formulated a new strategic composite model for IA
as illustrated below,
PURPOSE
CULTURE
JC
CAPABILITY
CSA
RM
ENVIRONMENT
Engineering Doctorate
Page 205
Bridging the Air Gap: An Information Assurance Perspective
Reprise of the Cross Domain
Figure 82: Current MoD System Access Schema
CDS is a main issue of IA (p.8) and has three assurance categories:
1) Access Solutions: The development of Geo-positioning, authentication
access control system was an important component of developing a CrossDomain solution. This problem was the instigation of this thesis and a major
development programme for MoD IT Access Control. The majority of this
work is beyond the classification of this thesis, however it is believed that in
the last 5 years, significant progress has been made and a system is
currently been evaluated.
2) The need to provide Cross Domain Transfer Solution is has been
modelled with an IA perspective to Enterprise Interoperability and
Layering of Cyberspace. This thesis argues that these two 3-Dimensional
models will provide a greater insight to the properties and attributes of CDS
and allow for more systematic approach to analysing the potential
solutions.
3) Accredited Solutions: The Framework proposed in Chapter 6 (Figure 111,
p342) provides the assurance for secure and trusted CDS for Information
Operations and Exploitation. The next task is to develop the framework as a
logical automated software model and experiment its capabilities in a
cyber-range.
Engineering Doctorate
Page 206
Bridging the Air Gap: An Information Assurance Perspective
5.2 Assuring the Human-Cyber Interexchange
The thesis has presented a number of arguments that has changed the perception of
Information Assurance. Some of these arguments still require considerable
experimentation and simulation to validate their premise and verify their capability to
the communities of interest. However, these models are been analysed and have made
impact in the education of the assurance socio-technical systems and engineering of
systems. With appropriate and detailed testing, the models will provide the
communities an important tool set towards the understanding and control of the CrossDomain and System Survivability. The EU and HMG are creating a number of research
programmes to further investigate Trust in Cyberspace and these models, along with
some future recommended research will provide an important perspective.
At the 2011 Cyber Security Conference held in Brussels the challenging consequences
of these frameworks and the Human-Cyber Interexchange modelling concepts were
introduced (Richardson C. J., Cyberspace: The 5th Domain, 2011). The need to test
these models was accepted and the plans for a Cyber Range at DCCIS, Blandford Forum
was planned and a financial costed business plan was produced
With the movement of the Engineer Researcher to a new lectureship at Bournemouth
University, the Cyber Range concept and proposed simulations and experimentation
has been revisited, planned and a multi-million pound revised business plan produced.
The new System Engineering and Information Assurance (SEnIA) platform has been
incorporated into the University’s 2012-2018Strategic Business Plan for the
continuation of Socio-Technical System (of systems) research; the development of IA
simulations and threat modelling and any possible EU Horizon 2020 research
themes.
Engineering Doctorate
Page 207
Bridging the Air Gap: An Information Assurance Perspective
Reprise of the IA Models
The IA Composite Model of Interoperability (Figure 21, p74), as illustrated below,
provides a 3-Dimensional holistic interpretation for the alignment and harmonisation
of Enterprise business processes and its architecture with the technical-organisational
layers of Interoperability of interconnecting Social-Technical Enterprises.
This composite model creates a new insight to the functionality and issues of CDS and
Enterprise interoperability. The 3-D Cuboid utilises the analytical capabilities and
functional views of Enterprise Architecture, the identified NCIOC layers of Enterprise
Interoperability and Systems of Systems model developed by Carnegie Mellon
University.
The 378 functional components of this model will provide a holistic, coherent and
comprehensive picture of system interoperability of interconnecting Social-Technical
Enterprises.
The Assured Cyber Defence Architecture (Figure 40, p119), as illustrated below is a
jigsaw of components that influence and affect the cyber defence of a Socio-Technical
Enterprise. The framework provides a coherent overview of IA Architecture as a
methodology to provide Cyber Network Defence and a platform for Shared Situational
Awareness and Superior Decision Making.
Engineering Doctorate
Page 208
Bridging the Air Gap: An Information Assurance Perspective
The model identifies 8 domains (with multiple elements) that influence the Cyber
Defence and the creation of a trusted Cyber Operation Picture used by the Enterprise
Communities of Interest’s decision-making processes and shared situational
awareness. The ability to control and secure operational and trusted repository
information is essential to well-being and efficiency of the Enterprise and the
performance of its mission goals.
The Information Functional Concept Model (Figure 47, p133 ) is a six layer model
that differentiates the flow of information through a Socio-Technical Enterprise.
Formulated on the principle Knowledge comes from Information which comes from
Data (KID), the I-Stack Model provides a contextual overview of the Information flows
from the physical components of the Data Layer to the virtual components of the
Knowledge Layer demonstrating the Human-Computer interactive components of
Information Exploitation and Information Operations.
Engineering Doctorate
Page 209
Bridging the Air Gap: An Information Assurance Perspective
This model provides a new holistic picture of the Information Domain.
The 4 layers of Information (its technology, Architecture, Control and Utility) provide a
framework for many interrelating and interconnecting activities. The model provides a
simple relationship of many more established models and best practices such as
Information Technology Infrastructure Library (ITIL); The Open Archival Information
System (OAIS); The Information Security Forum for Best Practises for Information
Security, MoD’s Joint Doctrine Publications for Information Operations and Information
Management and a host of CESG, RFC, ISO and ITU standards and guidelines, in
particular ISO 20000 and ISO 27000.
The Information
Assurance Cuboid
Model (Figure 57
p153), is the key
model
for
interpretation
of
Information
Assurance
in
Cyberspace.
The
thesis
has
illustrated
the
process
that
structures this 3-
Engineering Doctorate
Page 210
Bridging the Air Gap: An Information Assurance Perspective
Dimensional Cuboid. The model builds on the argument that there are 8-Dimensions of
Information Assurance as presented in the IA Quadrant Model (and themed through the
report) which are mapped against the flow of information (Process, Storage and
Transit) and the military’s perception of the layers of Cyberspace (Geographical,
Physical, Logical, Persona and Cyber Persona). The IA Cuboid Model provides a
reference to all the attributes of Assurance and allows the practitioner to build policies,
procedures and best practices to design, maintain and develop IA in social machines
and the Socio-Technical Enterprise.
The IA Skills Framework (Figure 78, p192) as illustrated below was derived from
the UK’s National Information Assurance Strategy (Cabinet Office, 2007) to develop the
IA profession (Richardson C. J., The IA Professional Framework - Draft White Paper,
2008). Incorporated in the latest draft of HMG’s Information Assurance Competency
Framework; the model has also been developed for the UK’s National Occupational
Standard for Information Assurance:
Leadership
Head of Profession
Information Assurance
Entry
DISCIPLINES
Education, Training
and Awareness
Engineering and
Security Network Architecture
Contingency Management
Associate
Practitioner
Operations and
Security Management
Practitioner
PROGRESSION
Senior Practitioner
Verification and Audit
Subject Matter Expert
Risk Management
and Accreditation
Policy and Governance
Head of Specialism
TRANSFERABLE SKILLS and QUALIFICATIONS: Business and Personal
Figure 83: UK Government IA Framework
The framework has been used to create a federated MSc and many of the degree’s
models are been used for Continuous Professional Development of IT Professionals and
other communities interested in Information Assurance Architecture.
Engineering Doctorate
Page 211
Bridging the Air Gap: An Information Assurance Perspective
5.3 The Future Direction and Studies of IA
History has taught us: never underestimate the amount of money, time, and effort
someone will expend to thwart a security system. It's always better to assume the worst.
Assume your adversaries are better than they are. Assume science and technology will
soon be able to do things they cannot yet. Give yourself a margin for error. Give yourself
more security than you need today. When the unexpected happens, you'll be glad you did.
Bruce Schneier, 1997
The Information Domain has many rooted problems and the potential to provide great
opportunities to society, science and business:- the diversity of the markets and
Enterprise it supports, the open architecture of the Internet and its protocols (TCP/IP),
the pervasive technologies and services that make physical and virtual machines our
real world and our motivation to be innovative and creative opportunist or
reactionaries, greedy criminal with a thirst for power or money. Cybercrime is, globally,
on the increase and has made significant impact of Governments, Multinational and
SMEs, Financial Institutions and upon Individuals. It has generated a new Cyber-arms
race with potentially ruinous outcomes for the Global Society. The APTs and SMART
CNA are exploiting the complexities of interconnected systems, poor security and zeroday vulnerabilities. System Intrusion and passive attacks are common occurrence to
DIME Organisation and Governments have finally begun to realise the true magnitude
of Cyber Threats. Information Assurance provides a Socio-Technical barrier to
malicious Cyber Network Exploitation. It is the rationale for Information Security and
Protection Mechanisms; the Risk Management of Business Information Processes; the
trustworthiness of Information Assets for superior decision-making; the resilience and
tolerance of dependable system of systems and the methodology to understanding and
creation of a good state of operations for an information demand, sharing and
exploiting global communities of interest. Society needs to understand the need for
Assurance; it needs better education and more IA professionals; an awareness of the
persistent cyber threats and the knowledge to mitigate the risks of working in
cyberspace. Time and Resources are needed to expand the research and development
of IA, knowledge transfer to the Enterprises and the education of Individuals. The US
Government has made a large financial commitment to bring and implement a national,
comprehensive strategy of Information Assurance. The EU has made IA a policy
Directive and has made IA a major component of its Horizon 20020 Research
Programme. The UK’s new Cyber Strategy has started to organise national centres and
some research initiatives, but it is not enough.
Engineering Doctorate
Page 212
Bridging the Air Gap: An Information Assurance Perspective
A number of our large-scale system of systems have been suspended or cut owing to
the apparent failure to delivery to cost and functionality. The biggest concern with most
of these projects was their lack of awareness to interoperability and its assurance.
There is enough evidence and a strong correlation that System and Software
Engineering needs High Assurance and that these system architects require better
understanding of IA and its impact on the business processes of Socio-Technical
Enterprise. IA is about get the right information (accurate and dependable), to the right
people (trusted, vetted and in need of the data) at the right time (sensitivity,
geographical distributed and accessible). The creation of the System Engineering and
Information Assurance (SEnIA) Platform with its 4 Cyber Laboratories; 3 Skunk
Workshop Seminar Rooms; the building of 12 PhD IA programmes and the creation of a
Federated MSc at Bournemouth University are examples of the commitment that this
institution has to the fusion of research, development and education it has towards
Information Assurance and the concepts and potential impact this thesis has to its
Science and Societal impact.
Reprise Contributions
The following public conference proceeding, symposium and guest lectures have
contributed to this thesis:
Richardson, C. J. (2007). Security: a necessary compromise? NATO Conference, Bletchley
Park, 26 June 2007. Telindus.
Richardson, C. J. (2008a). Bridging an IA Capability Gap. Realising Network Enabled
Capability (RNEC’08), NECTICE, Leeds, UK, 13 October 2008. NECTISE
Loughbourgh University.
Richardson, C. J. (2008b, October 20). Cyber Situational Awareness: The Assurance of
Information Operations. CISM MSc Lecture. Blandford Forum, Dorset, UK:
Defence College of CIS (DCCIS).
Richardson, C. J. (2008c). The IA Professional Framework - Draft White Paper. Defence
College of Communication and Information Systems (DCCIS), ICT Faculty.
Blandford Forum: Cabinet Office.
Richardson, C. J. (2008d). Managing Information Security and its Assurance. Blandford
Forum: Defence College of Communications & Information Systems (DCCIS).
Richardson, C. J. (2009a). A Holistic Approach to Effective Information Assurance
Education. Military Information Assurance and Security Symposium, MoD Abbey
Wood, 16 April 2009. Cobham Technical Services.
Engineering Doctorate
Page 213
Bridging the Air Gap: An Information Assurance Perspective
Richardson, C. J. (2009b, November 10). Computer Network Operations: Military Cyber
Operations in Theatre. CISM MSc Lecture. Blandford Forum, Dorset, UK: Defence
College of CIS (DCCIS).
Richardson, C. J. (2011). Cyberspace: The 5th Domain. Cyber Security 2011, Brussels,
Beliguim, 31 May- 1 June 2011. IQPC.
Richardson, C. J. (2011). Information Assurance: Holistic and Human Centric. iGRC TD2
Presentation, Birkbeck, University of London Symposium, 15 December 2011.
Bournemouth University
Richardson, C. J. (2012, June 5). The Assurance of Socio-Technical Enterprise
Operations. MSc Information Assurance Module 2. London, UK.
The themes, concept models and the impact of IA has been taught as degree modules at
the Defence College of Communications and Information Systems (DCCIS): MSc
Communication
and
Information
Systems
Management;
BSc
(Hons)
Telecommunications Systems Management; BSc (Hons) Management of Military
Information Systems and the FdSc Communication Systems Management by the
Engineering Researcher since October 2005 and recently BSc (Hons) Digital Forensics
and Security at Bournemouth University. Furthermore there have been 10 MSc
published Dissertations by DCCIS students, supervised by the Engineering Researcher,
that have taken military aspects of IA and applied them to operational and system
concerns in theatre, within MoD CIS, NATO NEC and with the New Zealand Command
and Control Organisations. Bournemouth University is currently assessing both a new
MSc and a MRes in Information Assurance and some of the proposed modules are
already been taught on its outreach CPD programme with the BBC. There are 3 new
PhD Research Programmes in the application of IA in Cybercrime and Policing are been
supervised by this Researcher and another 2 have been instigated and await
candidature. Some of the models have used by a European Multinational to develop its
new business strategy and operations in European Information Security, by UK
institutions to develop a Professional Competency Framework for IA practitioners and
by the UK Skills Council (e-Skills) to create a National Occupational Standard in
Information Assurance. These initiatives have been promulgated through the Cabinet
Office, the Information Assurance Advisory Council (IAAC), The Ministry of Defence and
a number of conferences. Some Knowledge Transfer Partnerships (KTPs) are currently
been developed between Bournemouth University and some local SMEs to encourage a
greater dissemination and adoption of this research IA methodology and models.
Engineering Doctorate
Page 214
Bridging the Air Gap: An Information Assurance Perspective
5.4 IA Bridges
The counter argument to 20th Century Deterrence is knowing how to use Information
Assurance in the 21st Century. Richardson, C. J., 2012
Information Assurance is the rationale behind Safe and Secure flow of Information
assets across the Information Domain of a Social Technical Enterprise. It is not a
component of Information Operations, but a component of Information Exploitation.
This is a fundamental concept for the Socio-Technical Enterprise when Information
operations may have outright offensive (other than penetration testing) component
which is ethical (and morally) unacceptable to the IA philosophy. IA is not an
operational deterrence, but a trust building process for the Enterprise business
process. However IA practices do, and should continue influence Operational Security
(OpSec) policies. In building bridges, as illustrated below (figure 17, p65) the thesis has
demonstrated that there are a number of methods (see table 13) to provide
Information Assurance to the Enterprise.
Table 13: IA Methods to Build Bridges
Bridges to Build
IA Methods
1. The Need to Share
Providing Information Assurance to the Technical to
Organisational Layers of Interoperability
2. The Need to Know
Providing Security and Protection Mechanisms (Access
control, Encryption, IPS, etc) to maintain System
Confidentiality and Integrity
3. Landscape
Human-Cyber Interexchange
Federated Networks of Networks
Cross-Domain Solutions (CDS)
Systems of Systems IA Architecture (SoS IA2)
Socio-Technical Enterprises
4. Domain
Developing a Cross-Domain Solution for System
Interoperability and Resilience in Cyberspace.
5. Initiatives
The BU SEnIA platform Initiative
The EU FP7 – Theme 10 Security
EU Horizon 2020
The SDA Security & Defence Cyber-Security Initiative
EPSRC Centre of Excellence in Cyber Security Research
Engineering Doctorate
Page 215
Bridging the Air Gap: An Information Assurance Perspective
The IA Cuboid and Diamond models have incorporated
6. Trusting
the 9-Dimensions of trust into a metric that aligns them
to the dynamic components of assurance, the 3 layers of
information flow and the 5 layers of Cyberspace. This
produces over 30,000 trust entity relationships. (The
Cyber Security-Trust relationship alone has 9pp x14bfp
x9T-Ds x3(P-S-R) x5(CLs)= 17,010 E-Rs)
A Federated & modular kinetic learning is an important
7. Learning
first step in IA education. The practitioners need to
understand the working concepts of IA policies in system
behaviour and architecture.
The IA framework structures many standards,
8. Good Practice
guidelines, working models, legal compliance and
established good practices (ISF).
Future Work
The research (Figure 4, p16) had 4 main themes (Strategic Positioning of Information
Assurance; developing a Cross-Domain Solution for Interoperability and Resilience
within Cyberspace; development of 8-dimensional IA Cuboid and the development of IA
Education and its Profession); each component has generated considerable external
interest and this has been reflected in table 21.
Table 14: Possible Future Work to this Thesis
Possible Future Work
1.
Building a relational data model for all (30K+) components of the IA Cuboid and
data mine the model for possible linkages, exclusions and external influences
2.
Building a relational data model for the 378 component composite cuboids of the
Interoperability Model
3.
Map the IA Policies and Practice Framework to the above two databases and
produce a comprehensive IA Reference Model
4.
Simulate threat modelling to OODA operations and impose IA constraints,
compliance and policies
Engineering Doctorate
Page 216
Bridging the Air Gap: An Information Assurance Perspective
5.
Develop a universal Access Control Model for Cross-Domain Operations.
6.
Develop a Meta-tagging PKI for inter-domain Grey Networking with PRIME IP
encryption
7.
Create Large-Scale Systems of Systems (physical networks, simulated networks
and system-in-the-loop) and test IA policies to current emulated CII systems.
8.
Create a Federated MSc with at least 5 UK Universities
9.
Continue to aid the development of the UK National Occupation Standard
10.
Continue to develop a Professional Competency Standard for IA Practitioners
11.
Influence and help build the EU Policy on Information Assurance
12.
Build and develop the BU SEnIA platform
13.
Build Socio-Technical Enterprise Emulations to test future SoS Architectures
Summary
Bridging the Air Gap has generated a number of key research themes which has been
further developed from the original concepts described within this thesis.
Information Assurance is a vibrant and evolving science with numerous UK and
European initiatives; particular in Trusted ICT, Assured System Architecture and CrossDomain Interoperability Solutions. This Thesis has created a number of models to
address the current evolving; expanding and exploitative issues involved in IA and the
future work will ensure that the research concepts will become impact models for the
benefit and safety of Socio-Technical Enterprise and other DIME organisations.
The Research already generate further Government, Industry and Academic Research
and Development and is hoped that it continues to add value to the IA community and
to the expanding world of Cyberspace.
Engineering Doctorate
Page 217
Bridging the Air Gap: An Information Assurance Perspective
References
(n.d.).
Committee on Information Systems Trustworthiness.
(1999). Trust in cyberspace. (F. B. Schneider,
Ed.) Washington, D.C., USA: National
Academies Press.
EA. (2000). EA Guidelines for the Accreditation of bodies
operating certification/ registration of
Information Security Management Systems.
Brussels, Belgium: European co-operation for
Acceditation (EA).
Abadi, M. (2000). Security Protocols and their
Properties. In Foundations of Secure
Computation, NATO Science Series (pp. 39-60).
Chicago: ISO Press.
Abernethy, K., Treu, K., Piegari, G., & Reichgelt, H. (2005).
A learning object repository in support of
introductory IT courses. Proceedings of the 6th
conference on Information technology
education (pp. 223-227). Newark, NJ: ACM.
Abraham, F. D. (2005). Cyborgs, Cyberspace,
Cybersexuality and the Evolution of Everyday
Creativity. Retrieved May 2, 2011, from
Blueberry Brain Institute (USA):
http://www.blueberrybrain.org/chaosophy/Cybersexuality-v4.htm
Abramson, M., Breul, J., & Kamensky, J. (2007). Six
Trends Transforming Government:How the
interrelated effects of demographics,
technology, and new modes of public service
delivery are changing the way government is
being managed. The Public Manager.
Adams, A., & Blandford, A. (2005, July). Bridging the gap
between organizational and user perspectives
of security in the clinical domain.
International Journal of Human-Computer
Studies, 63(1-2), 175-202.
Adams, C., & Lloyd, S. (2006). Understanding PKI:
Concepts, Standards, and Deployment
Considerations, Second Edition (2nd ed.).
Boston, MA: Addison-Wesley Professional,
Pearson Education, Inc.
Adelman, S., Moss, L., & Abai, M. (2005). Data Strategy.
Indianapolis, Indiana: Addison-Wesley
Professional.
Akdeniz, Y., Walker, C., & Wall, D. (2000). The Internet,
Law and Society. Pearson Education, Inc.
Alberts, C., & Dorofee, A. (2002). Managing Information
Security Risks: The OCTAVE (SM) Approach
(1st ed.). Pittsburgh, PA: Addison-Wesley
Professional, SEI Series CERT Book, Pearson
Education, Inc.
Alberts, D. S. (1997). Agility, Focus, and Convergence:
The Future of Command and Control. The
International C2 Journal, 1(1).
Alberts, D. S. (2002). Code of Best Practice for
Experimentation. Washington D.C.: CCRP
Publication Series.
Alberts, D. S., & Hayes, R. E. (2006). Understanding
Command and Control. Department of
Defence, Office of the Assistant Secretary of
Defense (OASD),Command & Control
Research Program (CCRP). Washington D.C.:
CCRP Press.
Engineering Doctorate
Alberts, D. S., & Nissen, M. (2009). Toward Harmonizing
Command and Control with Organization and
Management Theory. (D. S. Alberts, Ed.) The
International C2 Journal, 3(2), 1-59.
Alberts, D. S., & Papp, D. S. (2001). Volume III: The
Information Age Anthology: The Information
Age Military. Washington D.C.: DoD C4ISR
Cooperative Research Program (CCRP).
Alberts, D. S., Garstka, J. J., & Stein, F. P. (1999). Network
Centric Warfare: Developing and Leverating
Information Superiority. 2nd Edition.
Washington D.C.: Department of Defense
Command and Control Research Program
(CCRP).
Alberts, D. S., Garstka, J. J., Hayes, R. E., & Signori, D. A.
(2001). Understanding Information Age
Warfare. Department of Defense,
C3I/Command and Control Research
Programme. Washington D.C.: CCRP.
Alberts, D. S., Huber, R. K., & Moffat, J. (2010). NATO NEC
C2 maturity model. Washington D.C.: DoD
Command and Control Research Programme
Press.
Alexander, P., Kimmel, G., & Burke, D. (2007). Security as
a System Property: Modeling trust and security
in Rosetta. Lawrence, KS: The University of
Kansas, ITTC.
Al-Hamdani, W. A. (2006a). Knowledge flow with
information assurance track. Wasim, A. A.-H.
(Proceedings of the 3rd annual conference on
Information Security Curriculum Development
(InfosecCD). Kennesaw, Georgia, 22-23
September 2006 (pp. 52-57). ACM.
Al-Hamdani, W. A. (2006b). Assessment of need and
method of delivery for informationsecurity
awareness program. Proceedings of the 3rd
Annual Conference on Information Security
Curriculum Development, InfoSecCD 2006,
Kennesaw,Georgia, USA, 22-23 September,
2006 (pp. 102-108). ACM.
Al-Kuwaiti, M., Kyriakopoulos, N., & Hussein, S. (2009,
Quarter 2). A comparative analysis of network
dependability, fault-tolerance, reliability,
security, and survivability. Communications
Surveys & Tutorials, 11(2), 106 - 124.
Allemang, D. (2010). Semantic Web and the Linked Data
Enterprise. In D. Wood (Ed.), Linking
Enterprise Data (p. 23). Springer.
Allen, J. (2005). Governing for Enterprise SEcurity. The
Software Engineering Institute. Pittsburgh,
PA: Carnegie Mellon University.
Allor, P. (2007, August 2007). Understanding and
Defending Against Foreign Cyber-Threats.
Journal of Homeland Security, 1.
Alperovitch, D. (2011). Towards Establishment of
Cyberspace Deterrence Strategy. In C.
Czosseck, E. Tyugu, & T. Wingfield (Ed.), 3rd
International Conference on Cyber Conflict (pp.
87-94). Tallinn, Estonia: CCD COE
Publications.
Anandavala. (2005, October 28). Information System
Theory (IST). Retrieved May 10, 2011, from
Anandavala :
http://www.anandavala.info/index.html
Page xviii
Bridging the Air Gap: An Information Assurance Perspective
Anderson, J., & Rainie, L. (2010, July). The future of social
relations. PEW Internet and American Life
Project. Washington, DC: Pew Research
Center.
Anderson, J., & Rainie, L. (2010). The Future of the
Internet. Washington, D.C.: Pew Research
Center .
Anderson, K. (2005). Hacktivism and Politically.
Motivated Computer Crime. Encurve, LLC.
Anderson, R. (2008). Security Engineering: A Guide to
Building Dependable Distributed Systems (2nd
ed.). Cambridge: Wiley.
Andress, A. (2004). Surviving Security: How to Integrate
People, Process and Technology (2nd ed.).
Auerbach Publications, Taylor & Francis
Group.
Ardagna, C. A., Camenisch, J., Kohlweiss, M., Leenes, R.,
Neven, G., Priem, B., et al. (2010, January).
Exploiting cryptography for privacy-enhanced
access control: A result of the PRIME Project.
Journal of Computer Security, 18(1), 123--160.
Armistead, E. L. (2004). Information Operations: Warfare
and the Hard Reality of Soft Power (Issues in
Twenty-First Century Warfare) (1st ed.).
Potomac Books, Inc.
Armistead, E. L. (2007). "Information Warfare:
Separating Hype from Reality” Issues in
Twenty-First century Warfare (1st ed.).
Potomac Books, Inc.
Armistead, E. L. (2010). Information Operations Matters:
Best Practices. Potomac Books, Inc.
Armistead, E. L., Kuusisto, R., & Kuusisto, T. (2005).
Common Operational Picture, Situation
Awareness and Information Operations.
Proceedings 4th European Conference on
Information Warfare and Security, University
of Glamorgan, UK, 11-12 July 2005 (pp. 175186). Academic Conferences Limited, Reading,
UK.
Army Regulations 25-2. (2009). Information Assurance.
Department of Defense, Secretary of the Army,
Department of the Army. Washington D.C.:
Army Study Guide, DoD.
Army Research Laboratory. (2009). Advanced Decision
Architectures for Warfighters: Foundations and
Technologies . (P. McDermott, & L. Allender,
Eds.) Adelphi, MD, USA: Army Research
Laboratory Advance Decision Architectures
Collaborative Technology Alliance.
Arquilla, J., & Borer, D. A. (2007). Information Strategy
and Warfare: A Guide to Theory and Practice
(Contemporary Security Studies) (1st ed.). (J.
Arquilla, D. A. Borer, J. Gow, & R. Kerr, Eds.)
Routledge.
Arquilla, J., & Ronfeldt, D. (1997). In Athena's Camp:
Preparing for Conflict in the Information Age.
Washington D.C.: RAND National Defense
Research Institute.
Arquilla, J., & Ronfeldt, D. (2000). From Cyberspace to
the Noosphere:Emergence of the Global Mind.
New Perspectives Quarterly, 17(1), 18-25.
Arquilla, J., & Ronfeldt, D. (2001). Networks and Netwars:
The Future of Terror, Crime, and Militancy (1st
ed.). Santa Monica, CA: US National Defence
Research Institute, RAND Corporation.
Arquillia, J. (2008). Worst Enemy: The Reluctant
Transformation of the American Military.
Chicago, IL: Ivan R. Dee, Publisher.
Engineering Doctorate
Ashenden, D. (2005). Governance Principles for Sharing
Information in the Network Enabled
Capability (NEC) Environment. 4th European
Conference on Information Warfare and
Security, University of Glamorgan, UK, 11-12
July 2005 (pp. 1-8). Academic Conferences
Limited, Reading, UK.
Attina, F. (2008). Multilateral Security Trends. An
Analysis of 124 UN, NATO, OSCE, and EU’s
Peacekeeping Operations. ISA's 49th Annual
Covention, Bridging Multiple Divides. San
Francisco, CA: ISA.
Avizienis, A., Laprie, J., Randell, B., & Landwhehr, C.
(2004, Jan-March). Basic Concepts and
Taxonomy of Dependable and Secure
Computing. IEEE Transactions on Dependable
and Secure Computing, 1(1), 11-33.
Avizienis, A., Laprie, J.-C., Randell, B., & Landwehr, C.
(2004, JANUARY-MARCH). Basic Concepts and
Taxonomy of Dependable and Secure
Computing. IEEE Transactions on Dependable
and Secure Computing, 1(1).
Axelrod, R. M. (1997). The complexity of cooperation:
agent-based models of competition and
collabration. Princeton, NJ: Princeton
University Press.
Baber, C., Stanton, N., Houghton, R., & Cassia, M. (2008).
Hierarchical Command, Communities of
Practice, Networks of Exploration: using
simple models to explore NEC Command
Structures. Realising Network Enabled
Capability (RNEC’08), NECTICE, Leeds, UK, 1314 October 2008. NECTISE.
Baggott, J. (2004). Beyond Measure: Modern Physics,
Philosophy and the Meaning of Quantum
Theory. Oxford: Oxford University Press.
Bagnell, R. J. (2006). Cyber Situational Awareness: The
Integration and Role of Visualization in
Information Assurance Operations.
Proceedings 11th ICCRTS: Coalition Command
and Control in the Network Era, Cambridge,
UK, 26-28 September, 2006. DOD CCRP.
Bailey, M. (2010). “From the Core to the Edge Information on Demand. The 4th Annual
Unified Cross Domain Management Office
(UCDMO) Conference (p. 1). Boston, MA:
Unified Cross Domain Management Office
(UCDMO).
Baker, S., Waterman, S., & Ivanov, G. (2009). In the
Crossfire: A global report on the threats facing
key industries. McAfee, Inc.
Barbatsis, G., & Fegan, M. (1999, September). The
Performance of Cyberspace: An Exploration
Into Computer-Mediated Reality. (M.
McLaughlin, & S. Rafaeli, Eds.) Journal of
Computer-Mediated Communications (JCMC),
5(1).
Barman, S. (2002). Writing Information Security Policies.
New Riders Publishing.
Bartkiewicz, D., & Hannes, M. (2011). Emerging Cyber
Risks: Better Visibility for the Cloud Forecast.
(V. Vasquez, Ed.) Cloudbook: The Cloud
Computing & SaaS Information Resource, 2(1).
Baskerville, R. (1993). Information systems security
design methods: implications for information
systems development.” 25(4): 375-414. ACM
Computing Surveys, 25(4), 374-414.
Bass, B. (1990, Winter). From transactional to
transformational leadership: learning to share
Page xix
Bridging the Air Gap: An Information Assurance Perspective
the vision. Organizational Dynamics, 18(3),
19-31.
Batschelet, A. W. (2007). Effects-based operations: A New
Operational Model? Carlisle, PA: USAWC
Strategy Research Project.
Baumeister, R. F., & Leary, M. R. (1995, May). The need to
belong: desire for interpersonal attachments
as a fundamental human motivation. Psychol
Bull, 117(3), pp. 497-529.
Baumeister, R. F., & Leary, M. R. (1995). The need to
belong: Desire for interpersonal attachments
as a fundamental human motivation.
Psychological Bulletin, 117, pp. 497- 529.
Bauwens, M. (2005, March 1). P2P and Human Evolution:
Peer to peer as the premise of a new mode of
civilization. Retrieved October 12, 2010, from
Foundation for P2P Alternative:
http://www.networkcultures.org/weblog/arc
hives/P2P_essay.pdf
Bayles, W. J. (2001, Spring). The Ethics of Computer
Network Attack. Parameters, 44-58.
Beard, J. (2009). Law and War in the Virtual Era.
American Journal of International Law, 409445.
Bell, D. E. (2005). Looking Back at the Bell-La Padula
Model. Proceedings of the 21st Annual
Computer Security Applications Conference.
Tucson, Arizona, USA, (pp. 337–351). Reston
VA.
Bell, D. E. (2006, November 27). Looking Back:
Addendum. Retrieved October 11, 2010, from
Selfless-Security.offthisweek.com:
http://selflesssecurity.offthisweek.com/presentations/Bell_
LBA.pdf
Bell, D. E., & LaPadula, L. J. (1973). Secure Computer
Systems: Mathematical Foundations. MITRE
Corporation.
Bellamy, M., & Gallagher, G. (2011). Data Centre Strategy
G-Cloud & Government Application Store
Programme. The Cabinet Office. London:
HMSO.
Benedict, K. (2011, August 24). Enterprise Mobility,
Netcentric Operations and Military Mobility.
Retrieved September 11, 2011, from Mobile
Enterprise Strategies:
http://mobileenterprisestrategies.blogspot.co
.uk/2011/08/enterprise-mobilitynetcentric.html
Berenger, R. D. (2006). Introduction: War in cyberspace.
(S. C. Herring, Ed.) Journal of ComputerMediated Communication, 12(1), article 9.
Berg, C. (2006). High-Assurance design: Architecting
Secure and Reliable Enterprise Applications.
Addison-Wesley, Pearson Education, Inc.
Berger, A., Brown, C., Kousky, C., & Zeckhauser, R.
(2009). The Five Neglects:Risks Gone Amiss.
In H. Kunreuther, & M. Useem (Eds.),
Mitigating and Recovering from Natural and
Unnatural Disasters. Philadelphia, PA:
Wharton School Publishing.
Berners-Lee, T., & Fischetti, M. (1999). Weaving the Web:
The Original and Ultimate Destiny of the World
Wide Web (1st ed.). London: HarperBusiness.
Bethea, J. R. (2003). Joint C4I Interoperability – A look at
the procees for Army Transformation. Carlisle
Barracks, PA: U.S. Army War College.
Bettini, C., Brdiczka, O., Henricksen, K., Indulska, J.,
Nicklas, D., Ranganathan, A., et al. (2010,
Engineering Doctorate
April). A survey of context modelling and
reasoning techniques. Pervasive Mob. Comput.,
6(2), 161--180.
Beznosov, K., & Kruchten, P. (2004). Towards agile
security assurance. Proceedings of the 2004
workshop on New Security Paradigms (pp. 4754). Nova Scotia, Canada: Association for
Computing Machinery (ACM).
Bhagyavati, Agyei-Mensah, S. O., Shumba, R., & Kearse, I.
B. (2005). Teaching hands-on computer and
information systems security despite limited
resources. Proceedings of the 36th SIGCSE
Technical Symposium on Computer Science
Education, SIGCSE 2005, St. Louis, Missouri,
USA, 23-27 February, 2005. 37, pp. 325-326.
ACM.
Bieniek, M. (2011). NATO’s new Strategic Concept and
the Military Transformation of the Alliance.
2011 Ottawa Conference on Defence and
Security. Ottawa, Canada: NATO Deputy
Supreme Allied Commander Transformation
(DSACT).
Bimrah, K. K., Mouratidis, H., & Preston, D. (2008).
iTrust: A Trust-aware Ontologyfor
Information Systems Development. Advances
in Computing and Technology, The School of
Computing and Technology 3rd Annual
Conference, 2008 (pp. 40-51). London: ICGES.
BIS. (2009). Digital Britain, Building Britain's Future.
London: Department for Business, Innovation
and Skills.
Bishop, M. (2002). Computer Security: Art and Science.
Addison Wesley Professional, Pearson
Education, Inc.
Bishop, M. (2005). Introduction to Computer Security.
Addison Wesley, Pearson Education, Inc.
Bishop, M., Engle, S., Peiser, S., Whalen, S., & Gates, C.
(2008). We have met the enemy and he is us.
Proceedings New Security Paradigms
Workshop (NSPW) appear, Lake Tahoe, CA, 2225 September 2008 (pp. 1-12). Association for
Computing Machinery (ACM).
Bloomfield, R., Buzna, L., Popov, P., Salako, K., & Wright,
D. (2010). Stochastic modelling of the effects
of interdependencies between critical
infrastructure. In E. Rome, & R. Bloomfield
(Ed.), Proceedings of the 4th international
conference on Critical information
infrastructures security (pp. 201-212). Bonn,
Germany: Springer-Verlag.
Blyth, A. J. (2001). Information Assurance in the Age of
Information Warfare. In Vanguard (Ed.), 15th
Annual Vanguard Enterprise Security
Conference, Reno, NV, USA. 3-8 June 2001.
Blyth, A. J. (2010). Cyber Defence – The Technical
Challenge. Cyber & Influence S & T Centre.
Defence Science and Technology Laboratory.
Blyth, A. J., & Beynon-Davies, P. (2000). IS Failure, Trust
and Electronic Commerce. Proceedings 5th
Annual Conference of the UK Academy for
Information Systems (UKAIS), Cardiff, UK, 2628 April 2000. McGraw Hill.
Blyth, A. J., & Kovacich, G. (2001). Information Assurance:
Surviving in the Information Environment.
Springer.
Bobbitt, M. (2000, July). (Un)Bridging the Gap.
InfoSecurity, pp. 35-37.
Page xx
Bridging the Air Gap: An Information Assurance Perspective
Borg, S. (2005, Nov.-Dec). Economically Complex
Cyberattacks. IEEE Security and Privacy, 3(6),
64-67.
Borg, S. (2005, November). Economically Complex
Cyberattacks. (O. S. Saydjari, Ed.) IEEE
Security & Privacy, 3(6), 64-67.
Borland, R. (2008). Information Assurance: The
coordinated approach to improving Enterprise
Data Quality. Swindon, UK: Nationwide
Building Society.
Bourgine, P., Johnson, J., Leskovec, J., & Lambiotte, R.
(2008). Internet Emergent Properties:Cascade
of Information in Networks. Working Group WG6, Imperial College, London.
Boyce, J. G., & Jennings, D. W. (2002). Information
assurance: managing organizational IT
security risks. Woburn, MA: ButterworthHienemann.
Boyd, C. D. (2007, May-June). Army IO is PSYOP:
Influencing more with less. Military Review,
87(3), pp. 67–75.
Boyd, C. G. (1999). New World Coming: American Security
in the 21st Century. Washington, DC: The
United States Commission on National
Security - 21st Century.
Bracken, P. (2007). Financial Warfare. Orbis - FPRI,
51(4), 685-696.
Bradley, R. V., Pridmore, J. L., & Byrd, T. A. (2006).
Information systems success in the context of
different corporate cultural types: an
empirical investigation. Journal of
Management Information Systems, 23(2), 267294.
Brass, D. J., Galaskiewicz, J., & Greve, H. R. (2004). Taking
stock of networks and organizations: A
multilevel perspective. The Academy of
Management Journal, 47(6), 795 - 817.
Braun, N., & Hooper, V. (2009). Cybersecurity Knowledge
and Safeguard Implementation: An
Exploratory Study. In G. Dhillon (Ed.),
Proceedings of the 8th Annual Security
Conference Discourses in Security Assurance &
Privacy, Las Vegas, NV, USA. 15-16 April, 2009.
Virginia Commonwealth University.
Brian, A. P. (2006). Teaching students to hack: ethical
implications in teaching students to hack at
the university level. . Proceedings of the 3rd
Annual Conference on Information Security
Curriculum Development (InfoSecCD).
Kennesaw, Georgia, USA, 22-23 September
2006 (pp. 197 - 200 ). ACM.
Broad, R. (2009, November 2). Viewing information as a
strategic asset. Guardian Professional. London,
UK: The Guardian.
Brown, J. S., & Duguid, P. (2002). The social life of
information. Havard Business School Press.
Brown, L. D., Khagram, S., Moore, M. H., & Frumkin, P.
(2000). Globalization, NGOs and Multi-Sectoral
Relations. The Kennedy School of Government.
Cambridge, MA: Harvard University.
Bryman, A. (2007). Effective Leadership in Higher
Education-Summary of Findings. University of
Leicester, School of Management. London:
Leadership Foundation for Higher Education.
Buckman, T. (2005). NATO Network Enabled Capability
Feasibility Study Executive. Brussels: NATO
Consultation Command and Control Agency,
Communications and Information Systems
Division.
Engineering Doctorate
Buda, G., Choi, D., Graveman, R. F., & Kubic, C. (2001).
Security standards for the global information
grid. Military Communications Conference,
2001. MILCOM 2001. Communications for
Network-Centric Operations: Creating the
Information Force. 1, pp. 617 - 621. Linthicum,
MD : IEEE.
Burgoon, J. K., George, J. F., Adkins, M., Kruse, J., Biros, D.,
& Nunamaker, J. F. (2007). Detecting
Deception in the Military Infosphere. In C.
Wang, S. King, R. Watchter, R. Herklotz, & C.
Arney, Information Security Research: New
Methods for Protecting Against Cyber Theats
(pp. 606-627). Indianapolis, Indiana: Wiley
Publishing, Inc.
Burns, J. S. (2002, September). Chaos theory and
leadership studies: exploring uncharted seas.
Journal of Leadership & Organisational Studies,
9(2), 42-56.
Burris, R. (2010). Future Operating Concept- Joint
Computer Network Operations. Maxwell AFB,
AL: USAF Air War College.
Busuttil, T. B., & Warren, M. J. (2005). An Approach for
Critical Information Infrastructure Protection.
4th European Conference on Information
Warfare and Security, University of Glamorgan,
UK, 11-12 July 2005 (pp. 53-62). Academic
Conferences Limited, Reading, UK.
Bynum, T. W. (2004). Ethics and the Information
Revolution. In R. A. Spinello, & H. T. Tavani
(Eds.), Readings in cyberethics (pp. 13-29).
Sudbury, MA: Jones & Bartlett Learning.
Cabanas, K. A., & Huizenga, T. (2005). Organizing SOCOM
for Cross Functional and Geographic Area
Operations in the Global War on Terrorism.
Naval War College, Department of the Joint
Military Operations. Newport, R.I.:
Department of Defense.
Cabinet Office. (2005). Transformational Government –
Enabled by Technology. London: HMSO.
Cabinet Office. (2007). A National Information Assurance
Strategy. London: HMSO.
Cabinet Office. (2009). Public Sector Network Outline
Business Case, Version 2.8. London: HMSO.
Cabinet Office. (2009a). Cyber Security Strategy 2009.
London: HMSO.
Cabinet Office. (2009b). National Security Strategy 2009.
London: HMSO.
Cabinet Office. (2010). A Strong Britain in an Age of
Uncertainty: The National Security Strategy.
London: HMSO.
Cabinet Office. (2010). Data Centre Migration, G-Cloud
and Applications Store Programme, Phase 2:
Technical Architecture Workstrand Report,
Version 1.5. London: HMSO.
Cabinet Office. (2010). Greening Government ICT.
London: HMSO.
Cabinet Office. (2010). HMG IA Maturity Model and
Assessment Framework, Version 4. London:
HMSO.
Cabinet Office. (2010). Operational Efficiency Programme
Benchmarking Report for April 2009 to May
2010 . London: HMSO.
Cabinet Office. (2010). Strategy for the High Level Design,
Version 2.5. Cabinet Office, Commercial
Strategy Team. London: HMSO.
Cabinet Office. (2010b). HMG Security Policy Framework.
London: HMSO.
Page xxi
Bridging the Air Gap: An Information Assurance Perspective
Cabinet Office. (2011). HMG Security Policy Framework:
Making Government Work Better. Cabinet
Office. London: HMSO.
Cabinet Office. (2011). PSN Service Assurance. London:
HMSO.
Cabinet Office. (2011a). THe UK Cyber Security Strategy:
Protecting and promoting the UK in a digital
world . London: The National Archives.
Calder, A. (2005). The Case for ISO 27001. Ely, UK: IT
Governance Publishing.
Calder, A., & Watkins, S. (2006). IT Governance: A
Manager’s Guide to Data Security and BS 7799/
ISO 17799 (3rd ed.). Kogan Page.
Calder, A., & Watkins, S. (2007). Information Security Risk
Management for ISO27001/ ISO 17799. Ely,
UK: IT Governance Publishing.
Campen, A. D. (1992). The First Information War: The
Story of Communications, Computers, and
Intelligence Systems in the Persian Gulf War.
AFCEA International Press.
Campen, A. D., & Dearth, D. H. (2000). Cyberwar 2.0:
Myths, Mysteries & Reality. AFCEA
International Press.
Campen, A. D., & Dearth, D. H. (2000). Cyberwar 3.0;
Human Factors in information Operations and
Future Conflict. AFCEA International Press.
Campen, A. D., Dearth, D. H., & Goodden, R. T. (1996).
Cyberwar: Security, Strategy, and Conflict in
the Information Age. AFCEA International
Press.
Candolin, C. (2005). Securing the Infrastructure in
Information Operations. 4th European
Conference on Information Warfare and
Security,University of Glamorgan, UK, 11-12
July 2005 (pp. 63-72). Academic Conferences
Limited, Reading, UK.
Carafano, J. (2005). The Future of Anti-Terrorism
Technologies. Institute for International
Studies. The Heritage Foundation.
Caralli, R. (2004). Managing for Enterprise Security.
Software Engineering Institute. Pittsburgh,
PA: Carnegie Mellon University.
Caralli, R. (2006). Sustaining Operational Resiliency: A
Process Improvement Approach to Security
Management. Software Engineering Institute,
Networked Systems Survivability Program.
Pittsburgh, PA: Carnegie Mellon University.
Carley, K. M., & Prietula, M. J. (Eds.). (1994).
Computational Organization Theory. Lawrence
Erlbaum Associates, Publishers.
Carmouche, J. (2006). IPsec Virtual Private Network
Fundamentals. CISCO systems, CISCO Press.
Carr, J. (2005). Inside Cyber Warfare: Mapping the Cyber
Underworld (1st ed.). (M. Loukides, Ed.)
Sebastopol, California, USA: O’Reilly Media.
Cartlidge, A., Hanna, A., Rudd, C., Macfarlane, I.,
Windebank, J., & Rance, S. (2007). An
Introductory Overview of ITIL® V3. London:
itSMF Ltd.
Carvey, H. (2005). Windows Forensics and Incident
Recovery. Addison-Wesley, Person Education,
Inc.
Cash, D. W., Adger, W. N., Berkes, F., Garden, P., Lebel, L.,
Olsson, P., et al. (2004). Scale and cross-scale
dynamics: governance and information in a
multi-level world. Millennium Ecosystem
Assessment Bridging Scales and Epistemologies
Conference, Alexandria Egypt,17-20 March,
2004.
Engineering Doctorate
Casola, V., Coppolino, L., & Rak, M. (2006). An
Architectural Model for Trusted Domains in
Web Services. (A. Abraham, & M.
Sambandham, Eds.) Journal of Information
Assurance and Security, 1(2), 107-118.
Castells, M. (2009). Communication Power. Oxford:
Oxford University Press.
Castonguay, F. (2011). The Cyber Environment:A
Canadian Forces Perspective. C4ISR
Symposium: Optimized Total Ownership Cost –
“Affordable & Sustainable Information
Dominance”,San Diego, CA, 1-3 May 2012.
AFCEA.
Caswell, B., Beale, J., Foster, J., & Faircloth, J. (2003).
Snort 2.0: Intrusion Detection. Rockland, MA:
Syngress.
Cebrowski, A. K., & Garstka, J. J. (1998, January).
Network-Centric Warfare: Its Origin and
Future. Retrieved March 15, 2011, from
www.kinection.com:
http://www.kinection.com/ncoic/ncw_origin
_future.pdf
Cebrowski, A., & Gartska, J. (1998). Network-Centric
Warfare: Its Origin and Future. US Naval
Institute Proceedings, January 1998. Annapolis,
MD 21402: US Naval Institute.
Cerf, V. (2007). Emerging Cyber Security Threats and
Countermeasures. Georgia Tech Information
Security Center. GTISC.
CERT Coordination Center . (2003b). Responding to
Intrusions. Pittsburgh, PA: Carnegie Mellon
University.
CERT Coordination Center. (2003a). Identify Data That
Characterize Systems and Aid in Detecting
Signs of Suspicious Behaviour. Pittsburgh, PA:
Carnegie Mellon University.
CERT Coordination Center. (2008). The "Big Picture" of
Insider IT Sabotage Across U.S. Critical
Infrastructures. Pittsburgh, PA: Carnegie
Mellon University.
CESG. (2001). HMG Infosec Standard Number 3:
Connecting Business Domains. GCHQ, CESG The National Technical Authority for
Information Assurance. Cheltenham: HMSO
(Restricted).
CESG. (2002). HMG Public Key Infrastructure - Overview.
GCHQ, CESG - The National Technical
Authority for Information Assurance.
Cheltenham: CESG Information Assurance (IA)
Bookstore, 8.1 Ed., (Restricted).
CESG. (2003). A UK Government Strategy for Information
Assurance. GCHQ, CESG - The National
Technical Authority for Information
Assurance. Cheltenham: CESG Information
Assurance (IA) Bookstore, 8.1 Ed.,
(Restricted).
CESG. (2004). Governance Framework for the GSi, Version
1.0. GCHQ, CESG - The National Technical
Authority for Information Assurance.
Cheltenham: CESG Information Assurance (IA)
Bookstore, 8.1 Ed., (Restricted).
CESG. (2005). HMG Infosec Standard Number 2: Risk
management and accreditation of information
systems. GCHQ, CESG - The National Technical
Authority for Information Assurance.
Cheltenham: HMSO (Restricted).
CESG. (2006a). CESG Infosec Memoranda 2:The Risk of
Electronic Attack Against HMG Computers and
Communications: General Factors. GCHQ, CESG
Page xxii
Bridging the Air Gap: An Information Assurance Perspective
- The National Technical Authority for
Information Assurance. Cheltenham: CESG
Information Assurance (IA) Bookstore, 8.1
Ed., (Restricted).
CESG. (2006b). CESG Infosec Memoranda 12 - Dealing
with Malicious Software. GCHQ, CESG - The
National Technical Authority for Information
Assurance. Cheltenham: CESG Information
Assurance (IA) Bookstore, 8.1 Ed.,
(Restricted).
CESG. (2006c). CESG Infosec Memoranda 28 Performance and Assurance Standards for
Biometric Systems Contributing to MultiElement Identification and Authentication.
GCHQ, CESG - The National Technical
Authority for Information Assurance.
Cheltenham: CESG Information Assurance (IA)
Bookstore, 8.1 Ed., (Restricted).
CESG. (2006d). CESG Infosec Memoranda 37 - Intrusion
Detection on Managed IT Systems. GCHQ, CESG
- The National Technical Authority for
Information Assurance. Cheltenham: CESG
Information Assurance (IA) Bookstore, 8.1
Ed., (Restricted).
CESG. (2006e). CESG Infosec Manual M - Protecting
Government Connections to the Internet Guidance on Internet Connectivity
Architectures. GCHQ, CESG - The National
Technical Authority for Information
Assurance. Cheltenham: CESG Information
Assurance (IA) Bookstore, 8.1 Ed.,
(Restricted).
CESG. (2006f). CESG Infosec Manual N - Vulnerabilities of
the TCP/IP Protocol Suite. GCHQ, CESG - The
National Technical Authority for Information
Assurance. Cheltenham: CESG Information
Assurance (IA) Bookstore, 8.1 Ed.,
(Restricted).
CESG. (2006g). CESG Infosec Manual P - Protecting
Government Connections to the Internet Firewall Installation, Configuration and
Maintenance. GCHQ, CESG - The National
Technical Authority for Information
Assurance. Cheltenham: CESG Information
Assurance (IA) Bookstore, 8.1 Ed.,
(Restricted).
CESG. (2006h). CESG Infosec Manual T - Transport Layer
Protocol - Implementation Recommendations
for HMG Protectively Marked Material. GCHQ,
CESG - The National Technical Authority for
Information Assurance. Cheltenham: CESG
Information Assurance (IA) Bookstore, 8.1
Ed., (Restricted).
CESG. (2006j). CESG Infosec Manual V - Use of IPSec in
Government Systems - Implementation
Standards. GCHQ, CESG - The National
Technical Authority for Information
Assurance. Cheltenham: CESG Information
Assurance (IA) Bookstore, 8.1 Ed.,
(Restricted).
CESG. (2006k). CESG Infosec Manual W - Secure
Information Sharing - Security Guidance for
One-way Diode Technologies. GCHQ, CESG The National Technical Authority for
Information Assurance. Cheltenham: CESG
Information Assurance (IA) Bookstore, 8.1
Ed., (Restricted).
CESG. (2006l). CESG Infosec Manual Z - Use of Tokens for
Identification and Authentication in
Engineering Doctorate
Government Systems . GCHQ, CESG - The
National Technical Authority for Information
Assurance. Cheltenham: CESG Information
Assurance (IA) Bookstore, 8.1 Ed.,
(Restricted).
CESG. (2007). HMG Infosec Standard No 4:
Communications Security & Cryptography.
GCHQ, CESG - The National Technical
Authority for Information Assurance.
Cheltenham: HMSO (Restricted).
CESG. (2009). HMG IA Standard No.1 (v3.5): Business
Impact Level Tables. London: Cabinet Office /
CESG.
CESG. (2010). HMG Information Assurance Standard No
2: Risk Management and Accreditation of
Information Systems, Issue 3.2. CESG. London:
HMSO.
Chang, S. E., & Lin, C.-S. (2007). Exploring organizational
culture for information security management.
Industrial Management & Data System, 107(3),
438 - 458.
Checkland, P. (1981). Systems Thinking, Systems Practice.
London: Wiley.
Chen, D., Doumeingts, G., & Vernadat, F. (2008,
September). Architectures for enterprise
integration and interoperability: Past, present
and future. Computers in Industry, 59(7), 647–
659.
Chen, H., & Xu, J. (2006). Intelligence and Security
Informatics. Annual Review of Information
Science and Technology, 40(1), 229-289.
Chen, T. (2009). A Comprehensive Review of Wireless
Security. Security, AssurancProceedings of the
8th Annual Security Conference Discourses in
Security Assurance & Privacy Las Vegas, NV,
USA 15-16 April, 2009, 34, pp. 1-14.
Chesebrough, D. (2006, February 7). Networks and
Netcentricity. The Net-Centric Dialog .
Choo, C. W. (2002). Information Management for the
Intelligent Organization (3rd ed.). Medford, NJ:
American Society for Information Science and
Technology.
Chopra, K., & Wallace, W. (2003). Trust in Electronic
Environments. Proceedings of the 36th Hawaii
Conference on System Sciences (HICSS'03),
Hawaii, 6-9 January, 2003 . 9, p. 331.1. Hilton
Waikoloa Village: IEEE Computer Society.
Chun, C. K. (2010). John Warden's Five Ring Model and
the Indirect Approach to War and Strategy. In
J. B. Bartholomees Jr. (Ed.), U.S. Army War
College Guide to National Security Issues, Vol I:
Theory of War and (pp. 311-322). Carlisle, PA:
Strategic Studies Institute (SSI) publications.
CISCO. (2012). Understanding Operational Security.
Retrieved June 10, 2012, from CISCO Security:
http://www.cisco.com/web/about/security/i
ntelligence/opsecurity.html
CJCSI. (2011). CJCSI6510.01F: Information Assurance (IA)
and support to Computer Network Defense
(CND). DoD. Washington, DC: Chairman of the
Joint Chiefs of Staff.
Claessen, E. (2007, May-June). Discouraging hearts and
minds: Democracies and insurgencies.
Military Review, 87(3), pp. 97–103.
Clarke, R. A., & Knake, R. K. (2010). Cyber War: The Next
Threat to National Security and What to Do
About It. New York, NY, US: ECCO Press,
Harper Collins.
Page xxiii
Bridging the Air Gap: An Information Assurance Perspective
Clevenger, G. (2006). Incorporating certification and
accreditation coursework into network
security curriculum. Proceedings of the 3rd
annual conference on Information security
curriculum development. Kennesaw, Georgia,
22-23 September, 2006 (pp. 41-43). ACM.
Clowney, P. (2009, May). Clausewitz and Network
Centric Warfare: A Beautiful Marriage. (N.
Sage, Ed.) High Frontier: The Journal for Space
& Missile Professionals, 5(3), 38-41.
Coen, M., & Cullen, D. (2007). A Framework for
Information Systems Management and
Governance. Glasgow: University of
Strathclyde.
Cole, B. E. (2009). Guiding Principles for Stablisation and
Reconstruction. Washington, DC: US Institute
of Peace.
Cole, D. R. (2005, January 3). Learning Through the
Virtual. (A. Kroker, & M. Kroker, Eds.)
CTheory, a151.
Collins, B., & Mansell, R. (2003). Cyber Trust and Crime
Prevention:A Synthesis of the State-of-the-Art
Science Reviews. Office of Science and
Technology, Department for Business,
Innovation and Skills. London: HMSO.
Colwill, C. (2010). Human factors in information security:
The insider threat e Who can you trust these
days? Britsh Telecom, BT Security. London:
Elsevier.
Committee of Public Accounts. (2011). The use of
information to manage the defence logistics
supply chain . House of Commons Committee
of Public Accounts. London: The Stationery
Office Limited.
Committee on National Security Systems. (2010).
National Information Assurance (IA) Glossary.
Washington, D.C.: Committee on National
Security Systems.
Connell, J., Lynch, C., & Waring, P. (2000). Comparing
Research Methods: Three Ways of Undertaking
Qualitative. Newcastle: University of
Newcastle.
Cook, J. M. (1986). Increasing students security
awareness: article II. What C.S. graduates
don`t learn about security concepts and
ethical standards. In J. C. Little, & L. N. Cassel
(Ed.), Proceedings of the 17st SIGCSE Technical
Symposium on Computer Science Education,
1986, Cincinnati, Ohio, USA, February 6-7, 1986
(pp. 89-96). ACM.
Cook, P. (2006, September 13). Making knowledge
management work by learning to share
knowledge, skills and experience. Retrieved
May 10, 2010, from I Heard it through the
Grapevine:
http://www.cul.co.uk/creative/grapevine.ht
m
Cornish, P., Livingstone, D., Clemente, D., & Yorke, C.
(2011). Cyber Security and the UK’s Critical
National Infrastructure. The Royal Institute of
International Affairs. London: Chatham House.
Corrin, A. (2011, January 20). DOD tackles information
security in the cloud. (B. Rosenberg, Ed.)
Defence Systems.
Corum, J. S. (2009). Future Battlespace and the US
Response. Baltic Security & Defence Review,
11(2), 21-39.
Council of the EU. (2010, April). Council of the European
Union. Retrieved Jul 4, 2011, from Consilium:
Engineering Doctorate
http://www.consilium.europa.eu/policies/inf
ormation-assurance?lang=en
Court, G. (2007). Validating the NEC Benefits Chain.
Proceedings of the 12th ICCRTS “Adapting C2
to the 21st Century” Newport, RI, 19-21 June,
2007. CCRP.
Cover, T. M., & Thomas, J. A. (2006). “Elements of
Information Theory (2nd ed.). John Wiley &
Sons.
Cover, T. M., & Thomas, J. A. (2006a). Elements of
Information Theory (2nd ed.). Wiley.
Covey, S. M., Covey , S. R., & Merrill, R. R. (2008). The
Speed of Trust: The One Thing That Changes
Everything. New York: Free Press Paperbacks.
Coyle, D. (1999). The weightless world: strategies for
managing the digital economy. Cambridge,
MA: The MIT Press.
Cranston, P., & Davies, T. (2009, January). Global Social
Networking. Future Connect.
Crocker, M. (2007). Cross-Domain Information Sharing
in a Tactical Environment. CrossTalk - The
Journal of Defence Software Engineering, 2629.
Cronin, B. (2005). Intelligence, terrorism, and national
security. Annual Review of Information Science
and Technology, 39(1), 395-432.
Crosston, M. D. (2011, Spring). World Gone Cyber MAD:
How “Mutually Assured Debilitation” is the
Best Hope for Cyber Deterrence. Strategic
Studies Quarterly, 5(1), 100-116.
CSI. (2007). CSI Computer Crime and Security Survey.
New York, NY: Computer Security Institute.
CSI. (2011). CSI Computer Crime and Security Survey.
New York, NY: Computer Security Institute.
CSIS. (2008). Securing Cyberspace for the 44th Presidency.
Center for Strategic and International Studies.
Washington, DC: CSIS.
CSIS. (2011). Cybersecurity Two Years Later. Center for
Strategic and International Studies.
Washington, DC: CSIS.
Cummins, F. A. (2009). Building the Agile Enterprise: with
SOA, BPM and MBM. Morgan Kaufmann
Publishers and the Object Management Group.
Cyber Smart. (2009, March). Guide to online safety.
Retrieved November 10, 2011, from
Commonwealth of Australia:
http://www.cybersmart.gov.au/Parents/Reso
urces%20to%20use%20with%20your%20ch
ild/Resources%20for%20use%20with%20te
enagers.aspx
Dalal, P. (2006). Cybercrime and cyberterrorism:
Preventive defense for cyberspace violations.
Zaporizhzhya, Ukraine: Computer Crime
Research Center.
Darley, W. (2007). The missing component of U.S.
strategic communications. Joint Force
Quarterly, pp. 109–113.
Davì, M. (2010). Cyber security: European strategies and
prospects for global cooperation. European
Security and Defence Forum. London:
Chatham House.
David, M. W., & Sakurai, K. (2003). Combating Cyber
Terrorism: Countering Cyber Terrorist
Advantages of Surprise and Anonymity.
Proceedings of the 17th International
Conference on Advanced Information
Networking and Applications (pp. 716-). IEEE
Computer Society.
Page xxiv
Bridging the Air Gap: An Information Assurance Perspective
Davis, P. (2001). Effects-Based Operations: A Grand
Challenge for the Analytical Community.
Project AIR FORCE, US National Defence
Research Institute, RAND.
Dawes, S. S., Cresswell, A. M., & Pardo, T. A. (2009). From
‘‘Need to Know’’ to ‘‘Need to Share’’: Tangled
Problems, Information Boundaries, and the
Building of Public Sector Knowledge
Networks. Public Administration Review,
69(3), 392-402.
Day, W.-W. (2004). Trust in Cyberspace. National ChungCheng University, Department of
Communications. Minhsiung Township,
Taiwan: National Chung-Cheng University.
DCDC. (2010). The Future Character of Conflict. London:
Development Concepts and Doctrine Centre,
Ministry of Defence.
De Capite, D. (2005). Self-defending Networks: The Next
Generation of Network Security. CISCO Press.
Dearth, D. (2002). Shaping the Information Space.
Journal of Information Warfare, 1(3).
DeLone, W. H., & McLean, E. R. (2004, Fall). Measuring eCommerce Success: Applying the DeLone &
McLean Information Systems Success Model.
International Journal of Electronic Commerce,
9(1), 31 - 47.
Denize, S., & Young, L. (2007). Concerning trust and
information. Industrial Marketing
Management, 36, .968-982.
Denning, D. (1998). Information Warfare and Security.
Addison-Wesley Professional; ACM Press.
Denning, D. E. (1976, May). A lattice model of secure
information flow. (R. L. Ashenhurst, Ed.)
Communications of the ACM, 19(5), pp. 236 243.
Desman, M. (2002). Building an Information Security
Awareness Program. Auerbach Publications,
Taylor & Francis Group, Informa plc.
DeWitt, J., & Cicalese, C. D. (2006). Contextual
integration: a framework for presenting
social, legal, and ethical content across the
computer security and information assurance
curriculum. Proceedings of the 3rd annual
conference on Information Security Curriculum
Development (InfoSecCD), Kennesaw, Georgia,
22-23 September, 2006 (pp. 30-40). ACM.
DoD. (2000). Joint Vision 2020. Washington D.C.:
Department of Defense.
DoD. (2001). Network Centric Warfare. Department of
Defense (DoD), Networks and Information
Integration (NII). Washington D.C.: US
Department of Defense.
DoD. (2003). Information Operations Roadmap.
Washington D.C.: Department of Defense.
DoD. (2005). Net-Centric Environment Joint Functional
Concept. Washington D.C.: Department of
Defence.
DoD. (2006). Stability Operations: Military Support to
Security, Transition, and Reconstruction Joint
Operating Concept 2004. Fort Belvoir, VA:
Department Technical Information Center.
DoD. (2006a). JP 3-13-3: Operations Security. Chairman of
the Joint Chiefs of Staff. Washington D.C.:
Department of Defence.
DoD. (2010). JP1 - Doctrine for the Armed Forces of the
United States. Washington, D.C.: DoD.
DoD. (2010). UAS Control Segment (UCS) Architecture.
Retrieved April 21, 2011, from
UCSArchitecture.org:
Engineering Doctorate
http://www.ucsarchitecture.org/page/techni
cal_information#architecture
DoD. (2011). DoD Strategy for Operating in Cyberspace.
Washington, D.C.: Department of Defense.
DoD CIO. (2006). Information Assurance Component of
the GIG Integrated Architecture. Chief
Information Office. Washington D.C.:
Department of Defense.
DoD CIO. (2007). Global Information Grid Architectural
Vision: Vision for a Net-Centric, ServiceOriented DoD Enterprise. Department of
Defense, Chief Information Office. Washington
D.C.: Department of Defense.
DoD JP 3-13. (2006). Information Operations. Joint
Publication 3-13.
DoD JP 3-24. (2009). Counterinsurgency Operations.
joint Publications 3-24.
Donahue, G. (2007). Network Warrior. O’Reilly.
Donlon, J. J. (2002). A Computer Model for determining
Operational Centers of Gravity. Fort
Leavenworth, KA: US Army Command and
General Staff College.
Dooley, K., & Johnson, L. (1995). TQM, Chaos, and
Complexity. Human Systems Management,
14(4), 1-16.
Dorion, E., & Boury-Brisset, A.-C. (2005). Information
Engineering in Support of Multilateral Joint
Operational Interoperability. Defence Research
and Development Center. Valcartier, Canada:
DTIC.
Drahos, P., & Braithwaite, J. (2002). Information
Feudalism: Who Owns the Knowledge
Economy? Earthscan Publications.
Dreyfus, H. L. (2008). On the internet. New York, NY:
Routledge.
Drucker, P. (1998, August 24). The Next Information
Revolution. Forbes, 46-58.
DSTL. (1997). Historical Analysis in Support of C3 systems
for the JRDF: Based on historical analysis of 79
amphibious operations. DSTL Farnborough.
Farnborough: Defence Science and
Technology Laboratory.
DSTL. (2004a). High Level ICS/ISTAR Study 2003/04.
Defence Science and Technology Laboratory.
DSTL. (2004b). A Network-centric operations case study,
US/UK coalition combat operations during
Operation Iraqi Freedom. Defence Science and
Technology Laboratory.
DSTL. (2005a). Future Headquarters Requirement Study:
Knowledge of Own Forces and Operational
Tempo. Defence Science and Technology
Laboratory.
DSTL. (2005b). Success Factors in CT/COIN Campaigns
Working paper I: State and Security Forces’
Success Factors. Defence Science and
Technology Laboratory.
DSTL. (2010). Dual-Use Technology – “Working together
Differently” Opportunities in Cyber & Influence.
Cyber & Influence S&T Centre. Defence
Science and Technology Laboratory.
DSTL. (2011). Complex, Dynamic Networks in Cyber &
Influence. Defence Science and Technology
Laboratory .
Dull, D. (2006). Implementing Network-Centric
Operations in Joint Task Forces: Changes in
Joint Doctrine. Fort Leavenworth, KS: U.S.
Army Command and General Staff College.
Dunlap, J. C. (2008). Towards a Cyberspace Legal Regime
in the Twenty-First Century: Considerations
Page xxv
Bridging the Air Gap: An Information Assurance Perspective
for American Cyber-Warriors. Air University
2008 Cyberspace Symposium, (pp. 712-723).
Maxwell AFB, AL.
Dunn, R., & Moore, S. (Eds.). (2011, February). I want us
to be proud of job we do. Desider(33).
Dunn, T. N. (2011, October 18). We’ll strike first in cyber
warfare. Retrieved October 19, 2011, from
thesun.co.uk:
http://www.thesun.co.uk/sol/homepage/ne
ws/politics/3878324/Well-strike-first-incyber-warfare.html
Dunnigan, J. (2002). The Next War Zone: Confronting the
Global Threat of Cyberterrorism. New York:
Citadel Press Books, Kensington Publishing
Corporation.
Edwards, C. (2007). National Security for the Twenty-first
Centry. London: Demos.
Efthymiopoulos, M. P. (2005). Is NATO in Need of a
Renewed Security Concept? 4th European
Conference on Information Warfare and
Security, University of Glamorgan, UK, 11-12
July 2005 (pp. 83-90). Academic Conferences
Limited, Reading, UK.
Ekelhart, A., Fenz, S., Neubauer, T., & Weippl, E. (2007).
Formal threat descriptions for enhancing
governmental risk assessment. In T. Janowski,
& T. A. Pardo (Ed.), Proceedings of the 1st
International Conference on Theory and
Practice of Electronic Governance (ICEGOV,
Macao, China, December 10-13, 2007. 232, pp.
40-43. ACM International Conference
Proceeding Series.
Ekman, P. (1999). Basic Emotions. In T. Dalgleish, & M.
Power (Eds.), Handbook of Cognition and
Emotion (pp. 45-60). Sussex, UK: John Wiley &
Sons Ltd.
Eloff, J., & Eloff, M. (2005, November). Information
security architecture. Computer Fraud and
Security(11), 10-16.
Endsley, M. (1995). Toward a Theory of Situation
Awareness in Dynamic Systems. Human
Factors , 37(1), 32–64.
Endsley, M. (1998). Design and Evaluation for Situation
Awareness Enhancement. Proceedings of the
Human Factors Society 32nd Annual Meeting,
Santa Monica, CA, 5-9 October, 1998 , (pp. 97101).
Endsley, M. (2000). Theoretical Underpinning of
Situational Awareness- a Critical Review.
Situation Analysis and Awareness.
Endsley, M. (2001). Designing for Situation Awareness in
Complex Systems. Proceedings of the Second
international workshop on symbiosis of
humans, artifacts, and environment, Kyoto
Japan, 2001, (pp. 1-13).
Engleman, E., & Strohm, C. (2012, January 31).
Cybersecurity Disaster Seen In U.S. Survey
Citing Spending Gaps. Retrieved Feb 4, 2012,
from Bloomberg.com/news:
http://www.bloomberg.com/news/2012-0131/cybersecurity-disaster-seen-in-u-ssurvey-citing-spending-gaps.html
Eovito, B. A. (2005). The Impact of Synchronous Text
Based Chat on Military Command and Control.
Fort Belvoir, VA: Defense Technical
Information Center.
Estrin, D., Culler, D., Pister, K., & Sukhatme, G. (2002, JanMar). Connecting the Physical World with
Engineering Doctorate
Pervasive Networks. IEEE Pervasive
Computing, 1(1), 59-69.
EU. (2002). Creating a Safer Information Society by
Improving the Security of Information
Infrastructure and Combating Computerrelated Crime. Commission of the European
Communities.
EU. (2005). Creating a safer information society by
improving the security of information
infrastructures and combating computerrelated crime [COM(2000) 890 final.
Commission of the European Communities.
EU. (2008). Council of Europe - ETS No. 185 - Convention
on Cybercrime. Commission of the European
Communities.
Europa. (2012, March 28). An EU Cybercrime Centre to
fight online criminals and protect econsumers. Brussels, Belgium.
European Commission. (2010). Towards a future
Internet: Interrelation between Technological,
Social and Economic Trend. DG Information
Society and Media. Bussels: European
Commission DG INFSO.
European Commission. (2012). Special Eurobarometer
390 - Cyber Security. Brussels: European
Commission, Directorate-General Home
Affairs.
Everett, C. (2009, June). Cloud computing – A question of
trust. Computer Fraud & security, 2009(6), 5-7.
Exon, S. N. (2003). Personal Jurisdiction: Lost in
Cyberspace? Computer Law Review &
Technology Journal, 21(8).
Fan, T., Sun, Y., & Zhao, Y. (2009). An Eco-Defending
Architecture for Network Security Based on
Immuninty and Mobile Agents. Proceedings of
the Fifth International Conference on
Information Assurance and Security, IAS 2009,
Xi'An, China, 18-20 August, 2009 (pp. 451454). IEEE Computer Society.
Farn, K.-J., Lin, S.-K., & Fung, A. R.-W. (2004, October). A
study on information security management
system evaluation--assets, threat and
vulnerability. Computer Standards &
Interfaces, 26(6), 501-513.
Farroha, B., Whitfield, M., & Farroha, D. (2009). Enabling
net-centricity through cross domain
information sharing. 3rd Annual IEEE Systems
Conference (pp. 116 - 121). Vancouver, BC:
IEEE.
FEA. (2005). Data Reference Model. The White House.
Washington D.C.: Federal Enterprise
Architecture.
Feltovich, P. J., Bradshaw, J. M., & Bunch, L. (2009). Policy
and social barriers to new military information
technologies. Institute for Human and Machine
Cognition. Pensacola, FL: Army Research
Laboratory Advanced Decision Architectures
Collaborative Technology Alliance.
Fenz, S., & Ekelhart, A. (2009). Formalizing Information
Security Knowledge. ACM Symposium on
Information, Computer&Communication
Security (ASIACCS 2009), Sydney, Australia; 1012 March, 2009 (pp. 183 - 194). ACM.
Fink, D. (2003). The Law of Unintended Consequences:
The ‘Real’ Cost of Top-Down Reform. JOURNAL
OF EDUCATIONAL CHANGE, 4(2), 105-128.
Fisher, U. (2001, November). Information Age State
Security: New Threats to Old Boundaries.
Journal of Homeland Security.
Page xxvi
Bridging the Air Gap: An Information Assurance Perspective
Fitzgerald, J. (2008, February 6). Portfolio positioning to
capitalise on new trends. Money Management.
Fletcher, B., & Hare, D. (2005). Multi-National
Information Sharing: Cross Domain
Collaborative Information Environment
(CDCIE) Solution. United States Joint Forces
Command Joint Futures Lab. Department of
Defense CCRP.
Forsythe, S. L. (2007). An Multi-Level Model of Command
and Control (C2). Proceedings of the 12th
ICCRTS “Adapting C2 to the 21st Century”
Newport, RI, 19-21 June, 2007. ommand and
Control Research Program.
Fourie, G. (2002). The Evolution of the Information
Security Mindset: A hypothesis of stages of
Individual and Enterprise Security
Maturation. Security Modeling, The SANS™
Institute.
Fowler, C. W. (2002). Center of Gravity - Still relevant
after all these years. Carlisle Barracks, PA: U.S.
Army War College.
Fowlie, G. (2010). Cybersecurity. New York: International
Telecommunications Union Office, United
Nations.
Fragkos, G., & Blyth, A. (2005a). Architecture for Near
Real-Time Threat Assessment using IDS Data.
Proceedings 4th European Conference on
Information Warfare and Security, University
of Glamorgan.
Fragkos, G., & Blyth, A. (2005b). Security Threat
Assessment across large network
infrastructures, Safeguarding National
Infrastructures: Integrated Approaches to
Failure in Complex Networks. University of
Glasgow.
Frank, T. M., & Eisen, J. J. (1982, Winter). Balancing
National Security and Free Speech. Journal of
International Law and Politics, 14(2), 339-420.
Franklin, J. E. (2006). FORCEnet Science and Technology
Needs with Potential Solutions. OASD-NII
International Command and Control Research
and Technology Symposium, 26-28 September,
2006. Arlington, VA: Raytheon.
Frigns, T. (2004). Keeping Secrets, Quantity, Quality and
Consequences. University of Amsterdam,
Psychology Research Institute. Amsterdam:
University of Amsterdam.
Frost & Sullivan. (2008). The 2008 (ISC)2 Global
Information Security Workforce Study. Frost &
Sullivan.
Frost & Sullivan. (2009). Growing Sophistication of Cyber
Crime Driving. London: Frost & Sullivan.
Fukuyama, F. (1995). Trust: The Social Virtues and the
Creation of Prosperity (1st ed.). New York, NY:
Free Press Paperbacks; Siomon & Schuster,
Inc.
Furnell, S. M., & Papadaki, M. (2008, May). Testing our
defences or defending our tests: the obstacles
to performing security assessment. Computer
Fraud & Security(5), 8-12.
Furnell, S. M., Papadaki, M., & Thomson, K. L. (2009a,
December). Scare tactics – A viable weapon in
the security war? Computer Fraud &
Security(12), 6-10.
Furnell, S., & Thomson, K.-L. (2009, February). From
culture to disobedience: Recognising the
varying user acceptance of IT security. (S.
Mansfield-Devine, Ed.) Computer Fraud &
Security, 2009(2), 5-10.
Engineering Doctorate
Gable, G. (1994). Integrating Case Study and Survey
Research Methods: An Example in
Information Systems. (R. Baskerville, & R.
Paul, Eds.) European Journal of Information
Systems, 3(2), 112-126.
Galliers, R. (Ed.). (1992). “Information systems research:
Issues, methods, and practical guidelines.
Oxford: Blackwell Scientific Publications.
Galliers, R. D., & Land, F. F. (1987). Choosing Appropriate
Information Systems Research Methodologies.
Communications of the ACM, 30(11), 900-902.
Galliers, R. D., Markus, M. L., & Newell, S. (Eds.). (2006).
Exploring Information Systems Research
Approaches: Readings and Reflections. London:
Routledge.
GAO. (2005). Critical Infrastructure Protection:
Department of Homeland Security Faces
Challenges in Fulfilling Cybersecurity
Responsibilities. Washington D.C.: United
States Government Accountability Office
(GAO).
Garson, G. D. (2006). Public information technology and
e-governance: managing the virtual state.
London: Jones & Bartlett Publishers, Inc.
Gasper, P. D. (2010). Cyber Threat to Critical
Infrastructure 2010-2015: Increased Control
System Exposure. Idaho National Laboratory.
Geers, K. (2008, August 27). Cyberspace and the
changing nature of warfare. SC Magazine. (I.
Armstrong, Ed.) New York, NY: Haymarket
Media, Inc. Retrieved February 22, 2009, from
http://www.scmagazine.com/cyberspaceand-the-changing-nature-ofwarfare/article/115929/
Ghosh, S. (2004, March / April). The Nature of Cyberattacks in the Future: A Position Paper.
Information Systems Security.
Gibb, R. W. (2000). A Theoretical Model to Attack the
Enemy's Decision-Making Process. Naval War
College, Joint Military Operations. Newport,
RI: DoD.
Gibson, S. D. (2007). Corporate Security Education:
Towards Meeting the Challenge. Security
Journal, 20(2), 142.
Gjelten, T. (2010, July 19). Cyberwarrior Shortage
Threatens U.S. Security. NPR News.
Washington, DC: NPR.
Glebocki Jr., J. (2008). DoD Computer Network
Operations: Time to Hit the Send Button. U.S.
Army War College. Carlisle, PA: DoD.
Gleick, J. (2011). The Information: A History, a Theory, a
Flood. New York: Pantheon.
Gooden, L. R. (2009, May). Protecting Our Most-Powerful
Weapon System: Information. (N. Sage, Ed.)
High Frontier: The Journal for Space & Missile
Professionals, 5(3), 42-43.
Goodman, S. E. (1996, December). War, information
technologies, and international asymmetries.
Commun. ACM, 39(12), 11-15.
Gordon, J. (2007). Cyber Weaponization: Analysis of
Internet Arms Development. In J. Stamey
(Ed.), Computer Security Conference, Myrtle
Beach, SC. Digital University Press.
Goucher, W. (2009, March). The reality of trust. (S.
Mansfield-Devine, Ed.) Computer Fraud &
Security, 2009(3), 14-15.
Graham, S. (2011, February 23). When Life Itself is War:
On the Urbanization of Military and Security
Page xxvii
Bridging the Air Gap: An Information Assurance Perspective
Doctrine. International Journal of Urban and
Regional Research.
Gresham, M. T., & Andrulis, J. (2002). Information value
chain. Somers, NY: IBM Institute for Business
Value.
Grimes, R. (2005). "Honeypots for Windows: Configure
and Manage Window’s Honeypots,” the Expert’s
Voice. Apress: Springer.
Grossack, V. (2012). Too Good to Be True. In D. Schraub,
& R. F. Wolf, Risk Metrics for Decision Making
and ORSA. (pp. 11-14). Schaumberg, IL:
Society of Actuaries.
Guido, B. (2007). E-government global readiness report
2008 from e-government to knowledge
management. In T. Janowski, & T. A. Pardo
(Ed.), Proceedings of the 1st international
conference on Theory and practice of electronic
governance. Macao, China, 10-13 December,
2007. 232, p. 3. ACM.
Habig, C. (2011, February 5). Cyberspace Presents
Complex Global Challenges. Retrieved March
15, 2011, from Munich Security Conference:
http://www.securityconference.de/Program.
425+M578c0183589.0.html?&L=1
Haidt, J., & Joseph, C. (2007). The moral mind: How 5 sets
of innate moral intuitions guide the
development of many culture-specific virtues,
and perhaps even modules. (P. Carruthers, S.
Laurence, & S. Stich, Eds.) The Innate Mind, 3,
367-391.
Haimes, Y. Y. (2011). On the Complex Quantification of
Risk: Systems-Based Perspective on
Terrorism. Risk Analysis.
Halle, A. M. (2009). Cyberpower as a Coercive Instrument.
The Air University, School of Advanced Air
and Space Studies. Maxwell AFB, AL: Air
University Press.
Halleen, G., & Kellogg, G. (2005). Security Monitoring with
Cisco Security MARS. Cisco Press.
Hanseth, O. (2002). From systems and tools to networks
and infrastructures - from design to cultivation.
Towards a theory of ICT solutions and its
design methodology implications. Retrieved
January 8, 2011, from Department of
Informatics, University of Oslo:
http://heim.ifi.uio.no/~oleha/Publications/ib
_ISR_3rd_resubm2.html
Harrington, J. (2005). Network Security: A practical
approach. Elsevier.
Harris, R. (2009, December 2). Introduction to Decision
Making. Retrieved February 11, 2011, from
Virtual Salt:
http://www.virtualsalt.com/crebook5.htm
Harris, S. (2008, May 31). China’s Cyber-Militia. Retrieved
Nov 20th, 2009, from
http://www.triprosec.net/pdf/china_cyber_m
ilitia.pdf.
Hayat, M. (2005). Domain Based Security Threat-Analysis.
Southampton: University of Southampton.
Hayat, Z., Reeve, J., & Boutle, C. (2005). Domain Based
Security: Improving Practices. Southampton:
BAe SYSTEMS Integrated System
Technologies.
Healey, M. (2012, February 3). 2012 State of Clould
Computing. Retrieved February 6, 2012, from
InformationWeek:
http://reports.informationweek.com/abstract
/5/8658/cloud-computing/research-2012state-of-cloud-computing.html
Engineering Doctorate
Heiser, J., & Nicolett, M. (2008). Assessing the Security
Risks of Cloud Computing. Gartner Research.
Gartner.
Hejnova, P. (2010). Beyond Dark and Bright: Towards a
more Holistic understanding of Inter-Group
networks. Public Administration, 88(3), 741763.
Held, D., & McGrew, A. (2010). Globalisation: The Global
Transformations Website. In J. Krieger (Ed.),
Oxford Companion to Politics. Oxford: Oxford
University Press.
Heller, P. S. (2009). Globalisation and the Welfare State.
Global Economic Symposium 2009. Plön Castle,
Schleswig-Holstein, Germany: Global
Economic Symposium (GES).
Heller, P. S. (2009a). Globalisation and the Welfare State.
In D. J. Snower (Ed.), Global Economic
Symposium (GES), Plön Castle, SchleswigHolstein, Germany, 10-11 September 2009. GES.
Helvik, B. (2004). Perspectives on the dependability of
networks and services. Telektronikk (100th
Anniversary Issue: Perspectives in
Telecommunications), 3, 27-44.
Henry, M. G. (2004). Trustworthy 100-year digital
objects: Evidence after every witness is dead.
ACM Trans. Inf. Syst., 22(3), 406-436.
Heylighen, F. (1994, October 17). Cyberspace. Retrieved
July 20, 2012, from The Principia Cybernetica
Web: http://pcp.lanl.gov/cybspace.html
Hjelmås, E., & Wolthusen, S. D. (2006). Full-spectrum
information security education: integrating
B.Sc., M.Sc., and Ph.D. programs. Proceedings
of the 3rd annual conference on Information
security curriculum development. Kennesaw,
Georgia,22-23 September, 2006 (pp. 5-12).
ACM.
Hjelmås, E., & Wolthusen, S. D. (2006a). Full-spectrum
information security education: integrating
B.Sc., M.Sc., and Ph.D. programs. Proceedings
of the 3rd annual conference on Information
security curriculum development. Kennesaw,
Georgia (pp. 5-12). ACM.
HM Treasury. (2004). The Orange Book: management of
risk – principles and concepts,” . London: Her
Majesty's Stationary Office. .
HMG Canada. (2008). Multi-Agency Situational
Awareness System Architecture Model.
Montreal, Canada: HMSO.
Hobbins, W. T. (2005, Spring). Airmen on the Battlefield:
Warfighting Integration in Support of Special
Operations Forces. Air & Space Power Journal,
XIX(1), 67-79.
Holden, M. (2011, February 17). Cyber crime costs UK
$43.5 billion a year: study. Retrieved February
17, 2011, from Reuters:
http://www.reuters.com/article/2011/02/17
/us-britain-security-cyberidUSTRE71G35320110217?feedType=RSS&sp
=true
Hollander, E. P., & Offerman, L. R. (1990). Power and
leadership in organizations: relationships in
transition. American Psychologist, 45(2), 179189.
Honavar, V., Miller, L., & Wong, J. (1998). Distributed
Knowledge Networks. IEEE Information
Technology Conference, Syracuse, NY , USA , 1-3
September 1998 (pp. 87 - 90 ). IEEE.
Hongladarom, S., & Entz, A. (2003). Turning Digital
Divide into Digital Dividend: Anticipating
Page xxviii
Bridging the Air Gap: An Information Assurance Perspective
Thailand's Demographic Dividend.
Demographic Dividend, College of Population
Studies, Bangkok Thailand, 6 November, 2003.
Chulalongkorn University.
Hoopes, J., Bawcom, A., Kenealy, P., Noonan, W. J.,
Schiller, C. A., Shore, F., et al. (2009).
Virtualization for Security: Including
sandboxing, Disaster Recovery, High
Availability, Forensic Analysis and
Honeypotting. (J. Hoopes, Ed.) Burlington, MA:
Syngress publishing, Inc.
Hopkins, N. (2011, May 30). UK developing cyberweapons programme to counter cyber war
threat. The Guardian. (A. Rusbridger, Ed.)
London, UK.
Howard, M., & Lipner, S. (2005). The Security
Development Lifecycle: A Process for
Developing Demonstrably More Secure
Software. Seatle: Microsoft Press, Microsoft
Corporation.
Hsiao, R.-L. (2003). Technology fears: distrust and
cultural persistence in electronic marketplace
adoption, 12 (2003), pp.. Journal of Strategic
Information Systems, 12, 169–199.
Hughes, K. J. (2002). Domain Based Security: enabling
security at the level of applications and
business processes. Farnborough: QinetiQ Ltd.
Hughes, K. J. (2002). Domain Based Security: enabling
security at the level of applications and
business processes. Malvern, UK: QinetiQ.
Hughes, K. J., & Robinson, C. L. (2001). Managing Infosec
Risk in Complex Projects. Malvern, UK.:
QinetiQ.
Huitt, W. (2007). Maslow's hierarchy of needs.
Educational Psychology Interactive, 1-5.
Hundley, H., & Anderson, R. (1995, Winter 1995-1996).
Emerging challenge: security and safety in
cyberspace. Technology and Society Magazine,
14(4), pp. 19 - 28 .
Hurley, M. (2001, April 4). Network Air Gaps Drawbridge to the back Office. Retrieved
September 22, 2009, from SANS Institute:
http://www.sans.org/infosecFAQ/firewall/ga
ps.htm
Hutchinson, W. (2005). Information Security: a
Misnomer. In C. Valli, & A. Woodward (Ed.),
Proceedings of the 3rd Australian Information
Security Management Conference, Perth,
Western Australia, 30th September 2005 (pp.
33-37). School of Computer and Information
Science, Edith Cowan University, Western
Australia.
Hutchinson, W. (2005). The 'Will' and Information
Operations. 4th European Conference on
Information Warfare and Security, University
of Glamorgan, UK, 11-12 July 2005 (pp. 151156). Academic Conferences Limited, Reading,
UK.
IATF. (2002). Defense in Depth. Washington D.C.:
Information Assurance Technical Forum.
IEFT. (2012). Request for Comments (RFC). Retrieved July
30, 2012, from The Internet Engineering Task
Force (IETF): http://www.ietf.org/rfc.html
Ilachinski, A. (1997). Towards a Science of Experimental
Complexity: An Artifical Life Approach to
Modelling Warfare. Alexandria, VA: Center for
Naval Analysis.
ISO. (1999). Industrial automation systems - Concepts and
rules for enterprise models. ISO Technical
Engineering Doctorate
Committee 184, Industrial automation
systems and integration. Geneva: The
International Organization for
Standardization.
ISTAG. (2003). Ambient Intelligence: from vision to
reality. Luxembourg: Office for Official
Publications of the European Communities.
ISTAG. (2004). Grand Challenges in the Evolution of the
Information Society. Information Society
Technologies. Luxembourg: Office for Official
Publications of the European Communities.
ISTAG. (2006). Shaping Europe's Future through ICT.
Information Society Technologies .
Luxembourg: Office for Official Publications of
the European Communities.
ISTAG. (2009). Recommendations on Future and
Emerging Technologies. Information Society
Technologies. Luxembourg: Office for Official
Publications of the European Communities.
ITU. (2006). Final Acts of the Plenipotentiary
Conference. Plenipotentiary Conference.
Antalya: International Telecommunication
Union.
ITU. (2007). Chapter 5: Challenges to building a safe and
secure Information Society. World Information
Society Report: Beyond WSIS. Retrieved June 1,
2010, from International Telecommunication
Union:
http://www.itu.int/osg/spu/publications/wo
rldinformationsociety/2007/WISR07_fullfree.pdf
ITU. (2007). Meeting Report: Regional Workshop on
Frameworks for Cyber Security and CIIP.
International Telecommunications Union,
ITU-D. Buenos Aires, Argentina: International
Telecommunications Union.
ITU. (2008, September 2). Global Cybersecurity Agenda.
ITU Corporate Strategy Division. Geneva,
Switzerland: International
Telecommunication Union (ITU). Retrieved
June 10, 2011, from
http://www.itu.int/osg/csd/cybersecurity/gc
a/
ITU. (2009a). ITU Toolkit for Cybercrime Legislation.
Geneva: International Telecommunications
Union.
ITU. (2009b). Understanding Cybercrime: A Guide for
Developing Countries. Geneva: International
Telecommunications Union.
ITU. (2009c). National Cybersecurity/CIIP Self-Assessment
Tool. Geneva: International
Telecommunications Union.
ITU. (2010). Measuring the Information Society 2010.
Geneva: International Telecommunications
Union.
ITU. (2011). ITU-D ICT Applications and Cybersecurity
(CYB): National Strategies. Geneva:
International Telecommunications Union.
ITU-T Rec. X.509. (2005). X.509 : Information technology
- Open Systems Interconnection - The Directory:
Public-key and attribute certificate
frameworks. Geneva: ITU-T Publications.
ITU-T X.805. (2005). ITU-T X.805 Security Architecture
for Systems Providing End-to-End
Communications. Geneva: ITU.
Jabbour, K. S. (2009, May). The Science and Technology
of Cyber Operations. (N. Sage, Ed.) High
Frontier: The Journal for Space & Missle
Professionals, 5(3), 11-15.
Page xxix
Bridging the Air Gap: An Information Assurance Perspective
Jabbour, K. S. (2010, August). The Time Has Come for the
Bachelor of Science in Cyber Engineering. (N.
Sage, Ed.) High Frontier: The Journal for Space
& Missile Professionals, 6(4), 20-23.
Jackson, B. A., Chalk, P., Cragin, R. K., Newsome, B.,
Parachini, J. V., Rosenau, W., et al. (2007).
Breaching the Fortress Wall. Understanding
Terrorist Efforts to Overcome Defensive
Technologies. National Defense Research
Institute, Defense Technical Information
Center. Santa Monica, CA: RAND Coporation.
Jackson, K. (2010). DOD Moves Forward with Cloud
Computing. (V. Vasquez, Ed.) Cloudbook:The
Cloud Computing & SaaS Information Resource,
1(2).
Jain, G. (2005). Cyber Terrorism: A Clear and Present
Danger to Civilized Society? Information
Systems Education Journal, 3(44).
Jakobsson, M., & Myers, S. (2007). Phishing and
Countermeasures: Understanding the
Increasing Problem of Electronic Identity Theft.
John Wiley and Sons.
Jakobsson, M., & Zulfikar, R. (2008). Crimewave:
Understanding New Attacks and Defences.
Symantec Press, Pearson Education, Inc.
Jamka, J. (2009). Capabilities Gap Analysis Status Update.
3rd Annual UCDMO Conference 2009. Adelphi,
MD: Cross Domain Management Office
(UCDMO).
Janssen, M. (2007). Adaptability and accountability of
information architectures in
interorganizational networks. Proceedings of
the 1st international conference on Theory and
practice of electronic governance (pp. 57--64).
Macao, China: ACM.
Jaquith, A. (2007). Security Metrics: Replacing Fear,
Uncertainty and Doubt. Addison-Wesley,
Pearson Education, Inc.
Jensen, M. J., Danziger, J. N., & Venkatesh, A. (2004). Civil
Society and Cyber Society: Culture Governance
and Democratic Politics. Center for Research
on Information Technology and
Organizations. Irvine, CA: University of
California.
Jewkes, Y. (2003). Chapter 2 - Policing the Net: crime,
regulations and surveillance in cyberspace. In
Y. Jewkes, Dot.Cons: Crime, Divance and
Identity on the Internet (pp. 15-35).
Cullumpton, Devon, UK: Willian Publishing.
Jiang, Y., Gan, Y., Zhou, J., & Cai, Z. (2009). A Model of
Intrusion Prevention Base on Immune.
Proceedings of the Fifth International
Conference on Information Assurance and
Security, IAS 2009, Xi'An, China, 18-20 August,
2009 (pp. 441-444). IEEE Computer Society.
Jobbagy, Z. (2003). Literary Survey on Effects Based
Operations. The Hague, NL: TNO Physics and
Electronics Laboratory.
Jog, N. (2001). The Dimensions of the Cyber Universe. In
J. Kelemen, & P. Sosík (Ed.), 6th Proceedings
European Conference, ECAL 2001 Prague,
Czech Republic, September 10–14, 2001. 2159,
pp. 681-684. Springer.
Johnson, C. W. (2006). What are Emergent Properties and
How Do They Affect the Engineering of Complex
Systems. University of Glasgow, Department of
Computing Science. Glasgow: University of
Glasgow.
Engineering Doctorate
Johnson, G., Scholes, K., & Whittington, R. (2008).
Exploring Corporate Strategy (8th ed.).
Harlow: Prentice Hall, Financial Times, Person
Education Limited.
Johnson, J. D. (2010, November 3). Never Worry About
Security. Retrieved January 4, 2011, from
Symantec Connect:
http://www.symantec.com/connect/articles/
never-worry-about-security
Jones, A. (2002). Protecting the Critical National
Infrastructure – Development of a Method for
the Measurement of Threat Agents in an
Information Environment,” 7(2), . Information
Security Technical Report, 7(2).
Jones, A. (2003). A Methodology for the Assessment of
the Capability of Threat Agents in an
Information Environment. Journal of
Information Warfare, 2(2).
Jones, A., & Ashenden, D. (2005). Risk Management for
Computer Security: Protecting your Network
and Information Assets. London: Elsevier
Butterworth-Heinemann, Elsevier Inc.
Jones, A., & Kovacich, G. L. (2002b). What InfoSec
Professionals Should Know About Information
Warfare Tactics by Terrorists. Computers &
Security, 21(2), 113-119.
Jones, A., & Kovacich, J. (2002a). What InfoSec
Professionals Should Know About Information
Warfare Tactics By Terrorists – Part 1.
Computers & Security, 21(1), 35-41.
Jones, A., Kovacich, G. L., & Luzwick, P. G. (2002a).
Everything You Wanted to Know about
Information Warfare but Were Afraid to Ask,
Part 1. Information Systems Security, 11(4), 920.
Jones, A., Kovacich, G. L., & Luzwick, P. G. (2002b). Global
Information Warfare: How Businesses,
Governments, and Others Achieve Objectives
and Attain Competitive Advantages.
Information Systems Security, 11(5), 15-23.
Jones, J. (2012). Business Drivers and Benefits of
Enterprise Architecture. Retrieved February
10, 2012, from Architecting the Enterprise:
http://www.architecting-theenterprise.com/enterprise_architecture/busi
ness_drivers_and_benefits_of_enterprise_archi
tecture.php
Jones, Q., & Rafaeli, S. (2000). What Do Virtual "Tells"
Tell? Placing Cybersociety Research into a
Hierarchy of Social Explanation. Proceedings
of the 33rd Hawaii International Conference on
System Sciences. 1, pp. 1011--. IEEE Computer
Society.
Jonsson, E. (1998). An Integrated Framework for
Security and Dependability. Proceedings of
1998 ACM workshop on New Security
Paradigms (pp. 22-29). Charlottesville:
Association for Computing Machinery.
Jormakka, J., & Mölsä, J. V. (2005). Modelling Information
Warfare as a Game. Journal of Information
Warfare, 4(2).
Jøsang, A., Keser, C., & Dimitrakos, T. (2005). Can We
Manage Trust? Trust Management: Lecture
Notes in Computer Science, 3477, 13-29.
Joseph, S., Daniel, J. R., Surdu, J. R., & Carver, C. A. (2001).
The IWAR range: a laboratory for
undergraduate information assurance
education. Proceedings of the sixth annual
CCSC northeastern conference on The journal of
Page xxx
Bridging the Air Gap: An Information Assurance Perspective
computing in small colleges. Middlebury,
Vermont (pp. 223 - 232). Consortium for
Computing Sciences in Colleges , USA.
Julisch, K. (2008). Security compliance: the next frontier
in security research. Proceedings of the 2008
workshop on New Security Paradigms (pp. 7174). Lake Tahoe, CA: Association for
Computing Machinery (ACM).
Kaempf, G. L., Klein, G. A., Thordsen, M. L., & Wolf, S.
(1996, June). Decision Making in Complex
Naval Command-and-Control Environments.
Human Factors, 38(2), 220-231.
Källqvist, L. (2008). Introduction to NCOIC. Saab,
Corporate Strategy and Business
Development. Washington, DC: NCOIC.
Kaplan, B., & Duchon, D. (1988). Combining Qualitative
and Quantitative Methods in Information
Systems Research: A Case Study. Ninth Annual
International Conference on Information
Systems, Minneapolis, MN, November 30December 3, 1988 (pp. 45-68). ACM.
Kaplan, B., & Maxwell, J. A. (1994). Qualitative Research
Methods for Evaluating Computer Information
Systems. In J. G. Anderson, C. E. Aydin, & S. J.
Jay (Eds.), Evaluating Health Care Information
Systems: Methods and Applications (pp. 45-68).
Thousand Oaks, CA: Sage.
Kaplan, B., Truex, D. P., Wastell, D., Wood-Harper, A. T., &
DeGross, J. I. (Eds.). (2004). Information
Systems Research: Relevant Theory and
Informed Practice. Norwell, MA: Kluwer
Academic Publishers.
Karatzogianni, A. (2004). The Politics of ‘Cyberconflict’.
Politics, 24(1), 46-55.
Karlsson, R., & Hägg, M. (2005). Counter-terrorism
Information Operations. Retrieved June 21,
2010, from Institute of Communication
Studies:
http://ics.leeds.ac.uk/papers/pmt/exhibits/3
123/HaeggKarlsson_Counterterrorism_IO%5
B1%5D.pdf
Katz, E., & Lazarsfeld, P. (2006). Personal influence: The
part played by people in the flow of mass
communications. Transaction Pub.
Keller, B. M. (2011). Protection Mechanisms in Security
Management. Retrieved July 3, 2012, from
Docstoc: Documents and Resources for Small
Businesses & Professionals:
http://www.docstoc.com/docs/111899542/P
rotection-Mechanisms-in-SecurityManagement
Keller, R., Carrigan, N., Atkinson, S. R., Clarkson, P. J., &
Johnson, P. (2008). Collaboration and
Information Sharing in NEC Networks.
NECTISE. Leeds: Loughborough University.
Keller, R., Carrigan, N., Atkinson, S. R., Clarkson, P. J., &
Johnson, P. (2008). Collaboration and
Information Sharing in NEC Networks”.
Realising Network Enabled Capability
(RNEC’08), Leeds, UK, 13-14 October, 2008.
NECTISE Loughborough University.
Kelley, O. (2008). Cyberspace Domain: a war fighting
substantiated operational environment
imperative. Carlisle Barracks, PA: U.S. Army
War College.
Kellner, D. (2008). Networked Centric War born out of
RMA. In A. Huhtinen, & J. Rantapelkonen,
Messy Wars (p. 205). Finn Lectura.
Engineering Doctorate
Kelly, J., & Kilcullen, D. (2006). Chaos versus
Predictability: A Critique of Effects-Based
Operations. Special Edition: Effects-Based
Strategy, Security Challenges, 2(1), 63-73.
Kelly, O. L. (2008). Cyberspace Domain: A Warfighting
substantiated Operational Environment
Imperative. U.S. Army War College. Carlisle
Barracks, PA: U.S. Army War College.
Kennedy, K., & Soligan, J. (2010). Joint, Alliance and
Coalition C2 Integration and Interoperability.
Washington D.C.: U.S. Joint Forces Command.
Keohane, R., & Nye, J. (1999). Power and
Interdependence in the Information Age. In J.
Nye, & E. Karmarck (Eds.), Technology.Gov.
USA: Hollis.
KGS. (2011). Data Maturity Model. Retrieved June 18,
2011, from KForce Government Solutions:
http://www.kforcegov.com/services/DataCo
nfidence/DataMaturityModel.aspx
Khalilzad, Z. M., & White, J. P. (1999). Strategic Appraisal:
The Changing Role of Information Warfare.
Washington D.C>: RAND.
Khalilzad, Z., & J.P., W. (1999a). The Changing Role of
Information in Warfare,” Project AIR FORCE.
US National Defence Research Institute. San
Clara, CA: RAND.
Khan, U. M., & Hussain, M. (2009). Quantification of
Cyber Security. In G. Dhillon (Ed.), Security,
Assurance and Privacy: Organizational
Challenges: Proceedings of the 8th Annual
Security Conference Discourses in Security
Assurance & Privacy Las Vegas, NV, USA 15-16
April 2009. 27, pp. 1-11. Security Conferences.
Khan, U., & Hussain, M. (2009). Quantification of Cyber
Security. Security, Assurance and Privacy:
Organizational Challenges Proceedings of the
8th Annual Security Conference Discourses in
Security Assurance & Privacy Las Vegas, NV,
15-16 April 2009. Security Conferences.
Khatri, N., & Ng, H. A. (2000). The role of intuition in
strategic decision making. Human Relations,
53(1), 57-86.
Kierkegaard, S. M. (2005). Cracking Down On
Cybercrime, Global Response: The Cybercrime
Convention. (R. Harris, Ed.) Communications
of the IIMA, 5(1), 59-66.
Killmeyer, J. (2006). Information Security Architecture:
An Integrated Approach to Security in the
Organisation (2nd ed.). London: Auerbach
Publications, Taylor and Francis Group.
King, S. B. (2010). Military Social Influence in the Global
Information Environment: A Civilian Primer. St
Francis University, Psychology Department.
Lorretto, PA: The Society for the Psychological
Study of Social Issues.
King, S., Tucek, J., Cozzie, A., Grier, C. J., & Zhou, Y. (2008).
Designing and implementing malicious
hardware. Proceeds of LEET ‘08 which was colocated with Usability, Psychology, and Security
2008. San Francisco, CA: USENIX.
Klein, G., Drury, J., Pfaff, M., & More, L. (2010). The
Evolution of C2 - COAction: Enabling
Collaborative Option Awareness. 15th ICCRTS.
DOD CCRP.
Kling, R., Rosenbaum, H., & Sawyer, S. (2005).
Understanding and Communicating Social
Informatics: A Framework for Studying and
Teaching the Human Contexts of Information
Page xxxi
Bridging the Air Gap: An Information Assurance Perspective
and Communications Technologies. Medford,
NJ: Information Today, Inc.
Klopfer, E., Osterweil, S., Groff, J., & Haas, J. (2009). The
Instructional Power of Digital Games, Social
Networking Systems. Massachusetts Institute
of Technology. Cambridge, MA.: Creative
Commons.
Knapp, K. (2009). Cyber Security and Global Information
Assurance: Threat Analysis and Response
Solutions. New York: Hershey.
Knight, D. W. (2001). The Fourth Wish: Operational
Information Management and Situational
Awarenees. Canadian Military Journal, 33-40.
Koffman, E. a. (2007). New paradigms for introductory
computing courses. In G. Lewandowski (Ed.),
Proceedings Proceedings of the 38th SIGCSE
technical symposium on Computer science
education,Covington, Kentucky, USA, 7-10
March, 2007. 39 (1), pp. 67-68. ACM.
Kolb, D. G. (2008, January). Exploring the Metaphor of
Connectivity: Attributes, Dimensions and
Duality. Organization Studies , 29(1), 127-144.
Kollock, P., & Smith, M. (1996). Managing the Virtual
Commons: Cooperation and Conflict in
Computer Communities. (S. Herring, Ed.)
Computer-Mediated Communication:
Linguistic, Social, and Cross-Cultural
Perspectives, 109-128.
Kossiakoff, A., Sweet, W. N., Seymour, S. J., & Biemer, S. M.
(2011). System Engineering: Principles and
Practice (2nd ed., Vol. Wiley Series in Systems
Engineering and Management). (A. P. Sage,
Ed.) Hoboken, NJ: John Wiley & Sons, Inc.
Kovacich, G. (2003). The Information Systems Security
Officer’s Guide. London: ButterworthHeinemann, Elsevier.
Kramer, F. D., Starr, S. H., Wentz, L., & Zimet, E. (2007).
Frameworks and Insights Characterizing
Trends in Cyberspace and Cyberpower. 12th
International Command and Control Research
and Technology Symposium - Adapting C2 to
the 21st Century. Newport, RI: The CCRP Press.
Kramer, F. W., Starr, S., & Zimit, E. (2007a). Frameworks
and Insights Characterizing Trends in
Cyberspace and Cyberpower ,”. The Center for
Technology and National Security Policy.
Washington D.C.: National Defense University.
Krämer, N. C. (2008). Theory of mind as a theoretical
prerequisite to model communication with
virtual humans. Proceedings of the Embodied
communication in humans and machines, 2nd
ZiF research group international conference on
Modeling communication with robots and
virtual humans (pp. 222--240). Bielefeld,
Germany: Springer-Verlag.
Krekel, B. (2009). Capability of the People's Republic of
China to Conduct Cyber Warfare and Computer
Network Exploitation. The US-China Economic
and Security Review Commission . McLean,
VA: Northrop Grumman Corporation .
Kubic, C. (2009). An Assured GIG Enterprise: Overview of
the IA Component of the GIG. National Security
Agency, Information Assurance Architecture
and Systems Security Engineering Group. San
Diego, CA: Unified Cross Domain Management
Office (UCDMO).
Kücklich, J. R. (2009, October). Virtual Worlds and Their
Discontents: Precarious Sovereignty,
Engineering Doctorate
Governmentality, and the Ideology of Play.
Games and Culture, 4(4), 340-352.
Kuehl, D. T. (2009). Cyberspace to Cyberpower: Defining
the Problem (1st ed.). (F. D. Kramer, S. H. Starr,
& L. K. Wentz, Eds.) Washington D.C.: National
Defence University and Potomac books.
Kueter, J. (2010, August). Cybersecurity: Challenging
Questions with Incomplete Answers. (N. Sage,
Ed.) High Frontier: The Journal for Space &
Military Professionals, 6(4), 28-30.
Landoll, D. (2006). The Security Risk Assessment
Handbook: A complete Guide for Performing
Security Risk Assessments. London: Auerbach
Publications, Taylor & Francis Group, Informa
plc.
Landree, E., Gonzales, D., Ohlandt, C., & Wong, C. (2010).
Implications of Aggregated DoD Information
Systems forInformation Assurance Certification
and Accreditation. Santa Monica: RAND
National Defence Research Institute.
Lane, J., Heus, P., & Mulcahy, T. (2008, April). Data Access
in a Cyber World: Making Use of
Cyberinfrastructure. Trans. Data Privacy, 1(1),
2-16.
Lapke, M., & Dhillon, G. (2005). Power Relationships in
Information Systems: Security Policy
Formulation and Implementation. Richmond,
VA: Virginia Commonwealth University.
Laprie, J.-C. (2008). From Dependability to Resilience.
Université de Toulouse, LAAS-CNRS,
Toulouse.
Laudon, K. C., & Laudon, J. P. (2007). Management
Information Systems (10th ed.). Prentice Hall.
Lavoie, B. F. (2004). The Reference Model for an Open
Archival Information System (OAIS). Office of
Research. Dublin, OH: OCLC Online Computer
Library Center, Inc.
Lawrence, T. E. (1920, October). The Evolution of a
Revolt. Army Quarterly and Defence Journal.
Leavitt, N. (2009, January). Is Cloud Computing Really
Ready for Prime Time. Computer Magazine,
pp. 15-20.
Lee, M. H. (2005). An Empirical Study for Cohesion of
Virtual Internet Community. Tainan City,
Taiwan (R.O.C.) : National Cheng Kung
University (NCKU).
Lehtinen, R., Russell, D., & Gangemi, G. (2006). Computer
Security Basics (2nd ed.). New York: O’Reilly.
Lekkas, D. (2003). Establishing and managing trust
within the public key infrastructure. Computer
Communications, 26, 1815-1825.
Lesser, I., Hoffman, B., Arquilla, J., Ronfeldt, D., Zanini, M.,
& Jenkins, B. (1999). Countering the New
Terrorism: Implications for Strategy. San Clara,
CA: The RAND Corporation.
Lessig, L. (2004). The Law of Cyberspace. In ,. R. Spinello,
& H. T. Tavani (Eds.), Readings in cyberethics
(pp. 134-144). Sudbury, MA: Jones and
Bartlett.
Leune, K., Papazoglou, M., & van den Heuvel, W.-J.
(2004). Specification and querying of security
constraints in the EFSOC framework.
Proceedings of the 2nd international
conference on Service oriented computing. New
York, NY, USA (pp. 125--133). ACM.
Levine, J. (2010, July). Information Realism: Quantum bit
in the Cyberspace. Retrieved October 10, 2010,
from www.digicult.it:
Page xxxii
Bridging the Air Gap: An Information Assurance Perspective
http://www.digicult.it/digimag/article.asp?id
=1852
Levine, J. (2010a). Informational Realism: Quantum bit in
the Cyberspace. Retrieved October 10, 2010,
from Digicult:
http://www.digicult.it/digimag/article.asp?id
=1852
Leweling, T., & Walters, R. (2005). The Evolution of US
Military Conceptions of Information Warfare
and Information Operations, 1979-2004: An
Initial Report. 4th European Conference on
Information Warfare and Security, University
of Glamorgan, UK, 11-12 July 2005 (pp. 195204). Academic Conferences Limited, Reading,
UK.
Lewicki, R. J., & Wiethof, C. (2006a). Trust, Trust
Development, and Trust Repair. In M. Deutsch,
P. T. Coleman, & E. C. Marcus (Eds.), he
Handbook of Conflict Resolution: Theory and
Practice (2nd ed., pp. 92-119). San Francisco,
CA: Jossey Bass.
Lewis, J. (2002). Assessing the Risks of Cyber Terrorism,
Cyber War and Other Cyber Threats.
Washington D.C.: Center for Strategic and
International Studies.
Lewis, T. G. (2006). Critical Infrastructure Protection in
Homeland Security: Defending a Networked
Nation. Wiley - Interscience.
Liang, Q., & Xiangsui, W. (2002). Unrestricted Warfare:
China's Master Plan to Destroy America. Pan
American Publishing Company.
Libicki, M. (2007a). Conquest in Cyberspace: National
Security and Information Warfare. Cambridge:
The RAND Corporation, University Press.
Libicki, M. C. (2007). Conquest in Cyperspace: National
Security and Information Warfare. New York:
Cambridge University Press.
Libicki, M., & Lt Gen Elder, R. (2010, August). Mission
Assurance in the Face of Cyber Attacks. (N.
Sage, Ed.) High Frontier: The Journal for Space
& Missile Professionals, 6(5), 24-27.
Liebeskind, J. P. (1997). Keeping Organizational Secrets:
Protective Institutional Mechanisms and their
Costs. (J. Chytry, Ed.) Industrial and Corporate
Change, 6(3), 623-663.
Liles, S., & Liles, S. (2009, November 11). Cyber warfare:
The intelligence community. Retrieved March
15, 2011, from Selil: http://selil.com/?p=1573
Lin, H. (2009, July-Aug.). Lifting the Veil on Cyber
Offense. Security & Privacy, 7(4), 15 - 21 .
Little, E. G., & Rogova, G. L. (2006). An Ontological
Analysis of Threat and Vulnerability. FUSION
2006. Buffalo, NY: Center for Cognitive
Science.
Lochart, A. (2004). Network security Hacks: 100
Industrial-Strength Tips and Tools. New York:
O’Reilly.
Logan, D. (2010, January 11). What is Information
Governance? And Why is it So Hard? Gartner.
Logeman, K. M. (2005). Effects-Based Operations: Success
Across the Spectrum of Conflict. Naval War
College, Joint Military Operations. Newport,
RI: DoD.
Lowder, J. (2008, September 4). The Difference between
Quantitative and Qualitative Risk Analysis.
Retrieved May 20, 2010, from Evident-Based
Solutions for Information Security GRC:
http://www.jefflowder.com/the-difference-
Engineering Doctorate
between-quantitative-and-qualitative-riskanalysis-and-why-it-matters-part-1/
Lt Gen Croom, C. (2010, August). The Cyber Kill Chain: a
Foundation for a New Cyber Security Strategy.
(N. Sage, Ed.) High Frontier: The Journal for
Space & Missile Professionals, 6(4).
Luiijf, H., Nieuwenhuijs, A. H., & Klaver, M. (2008).
Critical infrastructure dependencies 1-0-1.
Infrastructure Systems and Services: Building
Networks for a Brighter Future (INFRA) (pp. 13). Amsterdam: IEEE.
Lukas, A. (2000). Tax Bytes: A Primer On the Taxation of
Electronic Commerce. Washington, DC: Cato
Institute’s Center for Trade Policy Studies.
Lukasik, S. J. (2003). Vulnerabilities and Failures of
Complex Systems. International Journal of
Engineering, 19(1), 206-212.
Lund, K., Eggen, A., Hadzic, D., & Hafsoe, T. (2007,
October). Using web services to realize service
oriented architecture in military
communication networks. Communications
Magazine, 45(10), 47-53 .
Luo, Y. (2002, October). Building Trust in Cross-Cultural
Collaborations: Toward a Contingency
Perspective. (D. C. Feldman, Ed.) Journal of
Management, 28(5), 669-694.
Lupovici, A. (2011, December). Cyber Warfare and
Deterrence:Trends and Challenges in
Research. Military and Strategic Affairs, 3(3),
49-62.
Lynn, W. J. (2010, September-October). Defending a New
Domain: The Pentagon's Cyberstrategy.
Foreign Affairs, 97–108.
MacIntosh, J. P. (1998). Connectivity: The Space,Tempo
and Exploitation of Risk in the Information
Age. In A. D. Campen, & D. H. Dearth, Cyberwar
2.0: Myths, Mysteries and Reality (p. 398).
Fairfax, VA: AFCEA Press.
MacIntosh, J. P., Reid, J., & Tyler, L. R. (2011). Cyber
Doctrine: Towards a coherent evolutionary
framework for learning resilience. London:
Institute for Security and Resilience Studies.
Macklin, T., & Jenket, P. (2004). Achieving Cross-Domain
Collaboration in Heterogeneous
Environments. Coalition C4ISR Architectures
and Information Exchange Capabilities. 12, pp.
1-18. The Hague, The Netherlands: RTO IST
Symposium.
Macnamara, J. (2010). The 21st century media
(r)evolution: emergent communication
practices. New York: Peter Lang Publishing,
Inc.
Maconachy, M. V., Schou, C. D., Ragsdale, D., & Welch, D.
(2001). A Model for Information Assurance:
An Integrated Approach. Proceedings of the
2001 IEEE, Workshop on Information
Assurance and Security, US Military Academy,
West Point, NY, 5-6 June 2001. IEEE.
Madsen, W. (1999, November). Trust in Cyberspace. (S.
Mansfield-Devine, Ed.) Network Security,
1999(11), 18-19.
Maj Gen Webber, R., & Ware, M. E. (2010, August).
Cyberspace Mission Assurance: A New
Paradigm for Operations in Cyberspace. (N.
Sage, Ed.) High Frontier: The Journal for Space
& Missile Professionals, 6(4), 3-7.
Major General Baxter, R. (2005, Spring). Ned Ludd
Encounters Network-Enabled. RUSI Defence
Systems, 34-36.
Page xxxiii
Bridging the Air Gap: An Information Assurance Perspective
Major Springman, J. A. (1998). The Relationship Among
Tasks, Centers of Gravity, and Decisive Point. US
Army Command and General Staff College,
School Of Advanced Military Studies. Fort
Leavenworth, KS: Defense Technical
Information Center.
Majoris, R. (2010). Cyber Warfare as an Operational Fire.
Newport, RI : Naval War College, Joint Military
Operations Department.
Marceau, C. (2002). An evolutionary approach to cyber
security. In C. Marceau, & S. Foley (Ed.), NSPW
'02: Proceedings of the 2002 workshop on New
Security Paradigms, Virginia Beach, Virginia,
23-26 September 2002 (pp. 108 - 109). ACM.
Marchand, D. A., Kettinger, W. J., & Rollins, J. D. (2002a).
Information Orientation The Link to Business.
New York, NY: Oxford University Press.
Marks, P. (2009, Mar 14). Cyber-attack, a clear and
present danger. New Scientist, 201(2699), 1819.
Markus, M. L., & Robey, D. (1988). Information
Technology and Organizational Change:
Conceptions of Causality in Theory and
Research., 34(5), . Management Science, 34(5),
583-598.
Martinelli, F., & Quisquater, J.-J. (2005, October). Security
and Trust Management. (P. Kunz, Ed.) ERCIM
News, 63, pp. 8-9.
Maslow, A. (1943). A Theory of Human Motivation.
Psychological Review, 50(4), 370-396.
Mattis, J. N. (2008, October). USJFCOM commander's
guidance for effects-based operations. Joint
Force Quarterly (JFQ).
May, C. J., Hammerstein, J., Mattson, J., & Rush, K. (2006).
Defense in Depth: Foundations for Secure and
Resilient IT Enterprises. The Software
Engineering Institute. Carnegie Mellon
University.
Mayer-Schonberger, V. (2002, Winter). The Shape of
Governance: Analyzing the World of Internet
Regulation. Virginia Journal of International
Law, 43(1), 605.
Mazanec, B. M. (2009, Spring). The Art of (Cyber) War. (I.
Berman, Ed.) The Journal of International
Security Affairs, 16.
McConnell, J. (2010, July 14). An American Cyber Expect
on Cyberwar. (N. Gardels, Interviewer) Booz,
Allen and Hamilton.
McConnell, J. M. (2008). Vision 2015: A Globally
Networked and Integrated Intelligence
Enterprise. Washington D.C.: Director of
National Intelligence.
McCumber, J. (1991). Information Systems Security: A
Comprehensive Model. Proceedings 14th
National Computer Security Conference.
Baltimore, MD: National Institute of Standards
and Technology.
McDermott, J., Kim, A., & Froscher, J. (2003). Merging
paradigms of survivability and security:
stochastic faults and designed faults.
Proceedings of the 2003 workshop on New
Security Paradigms (pp. 19-25). Ascona,
Switzerland: Association for Computing
Machinery (ACM).
McGinnis, D. R., & Comstock, K. (2005). The Implications
of Information Assurance and Security Crisis on
Computing Model Curricula. Grand Junction,
CO: Mesa State College.
Engineering Doctorate
McHugh, J., & Gates, C. (2003). Locality: a new paradigm
for thinking about normal behavior and
outsider threat. Proceedings of the 2003
workshop on New Security Paradigms (pp. 310). Ascona, Switzerland: Association for
Computing Machinery (ACM).
McIntyre, M., & Flemming, S. (2001). Netcentric Warfare
for Dynamic Coalitions:Implications for
Secure Interoperability. RTO IST Symposium
on “Information Management Challenges in
Achieving, n Quebec, Canada, 28-30 May 2001.
21, pp. 1-12. NATO Research and Technology
Organisation.
McKnight, W. L. (2002). What is Information Assurance.
Crosstalk: The Journal of Defense Software
Engineering.
McNab, C. (2004). Network Security Assessment. New
York: O’Reilly.
McNeal, A. C. (2004). Information Assurance: Structure
From the Fog. Air & Space Power Journal.
Meiter, J. S. (2006). Network Enabled Capability: A
Theory Desperately in Need of Doctrine.
Defence Studies, 6(2), 189 - 214.
Metz, S. (2000). Armed Conflict in the 21st Century: The
Information Reveloution and Post-Modern
Warfare. Carlisle, Pennsylvania: Strategic
Studies Institute, United States Army War
College .
Metz, T. F., Garrett, M. W., & Hutton, J. (2006, May - June).
Massing Effects in the Information Domain: A
Case Study in Aggressive Information
Operations. Military Review, 2-12.
Meunier, P. (2011). Classes of Vulnerabilities and
Attacks. In J. G. Voeller, Wiley Handbook of
Science and Technology for Homeland Security.
Wiley.
Michael, D. C. (2006). Information security: examining
and managing the insider threat. Michael, D. C.
(2006). “Information Proceedings of the 3rd
annual conference on Information security
curriculum development (pp. 156-158).
Kennesaw, Georgia: ACM.
Michael, J. B., Hestad, D., & Pedersen, C. (2002, Winter).
Incorporating the Human Element of Trust
into Information Systems. (R. J. Lamb, Ed.)
IAnewsletter, 5(1), 4-8.
Microlink. (2011, May 10). SIGACT Tracking and
Operations Response Management (STORM)
Cloud. Retrieved May 10, 2011, from Microlink
Solution Briefing:
http://www.microlinkllc.com/Documents/ST
ORM%20Cloud%20Solution%20Briefing.pdf
Mikaelian, T. (2009). An Integrated Real options
Framework for model-based identification and
valuation of options under uncertainty. Dept. of
Aeronautics and Astronautics. Cambridge, MA:
Massachusetts Institute of Technology.
Mikko, T. S. (2001). A paradigmatic analysis of
conventional approaches for developing and
managing secure IS. Mikko, T. S. (2001). “A
paradigmatic analysis of conventional
approaches for developing and managing
secure IS.” Proceedings of the 16th
international conference on Information
security: Trusted information: the new decade
challenge (pp. 437-452). Paris, France : ACM.
Mikroyannidis, A., & Theodoulidis, B. (2006). Heraclitus
II: A Framework for Ontology Management
and Evolution. Proceeding of the 2006 IEEE /
Page xxxiv
Bridging the Air Gap: An Information Assurance Perspective
WIC / ACM International Conference on Web
Intelligence, Hong Kong, China, 18-22
December, 2006 (pp. 514-521). IEEE
Computer Society.
Miller, C. R. (1979). A Humanistic Rationale for Technical
Writing. College English, 40(6), 610-617.
Ministry of Defence. (2010). Securing Britain in an Age of
Uncertainty: The Strategic Defence and
Security Review. London: Ministry of Defence.
Mink, M., & Freiling, F. C. (2006). Is attack better than
defense?: teaching information security the
right way. Proceedings of the 3rd annual
conference on Information security curriculum
development (pp. 44-48). Kennesaw, Georgia:
ACM.
Minsky, N. H. (2003). Regularity-Based Trust in
Cyberspace. Trust Management Lecture Notes
in Computer Science, 1071-1072.
Minsky, N. H. (2003). Regularity-Based Trust in
Cyberspace. Rutgers University, Department of
Computer Science, New Brunswick, NJ.
Mitchell, G. W. (1998). The new math for leaders, useful
ideas from chaos theory. Carlisle, PA: USAWC
Strategy Research Project, U.S. Army War
College.
Mittrick, M., Richardson, J., & Kaste, R. (2008). A
Policy Driven Information Exchange Network.
U.S. Army Research Laboratory . Baltimore,
MD: DoD.
MoD. (2002). JWP 3-80: Information Operations. London:
The Ministry of Defence.
MoD. (2003). Delivering Security in a Changing World.
Ministry of Defence. London: The Stationary
Office (TSO).
MoD. (2005). Joint Service Publication 777: The NEC
Handbook. London: HMSO.
MoD. (2006). JDN 4/05: The Comprehensive Approach.
JDCC. London: The Ministry of Defence.
MoD. (2006). Joint Doctrine Note (JDN) 4/06: Information
Management. London: HMSO.
MoD. (2006). JSP 777: Network Enabled Capability
Handbook. Command and Battlespace
Management (Land) - CIP. London: The
Ministry of Defence.
MOD. (2007). Asset Management Strategy. London:
Ministry of Defence.
MoD. (2007). Joint Doctrine Publication 3-80.1: OPSEC,
Deception and PSYOPS. London: The Minisitry
of Defence.
MoD. (2009). JSP 747: Information Management.
Information Coherence Authority for Defence
(ICAD). The Ministry of Defence.
MoD. (2009). MoD's Information Strategy. London:
Ministry of Defence.
MoD. (2009). NEC- Understanding Network Enabled
Capability. London: Ministry of Defence.
MoD. (2009a). Understanding Network Enabled
Capability. London: The Ministry of Defence.
MoD. (2009b). Ministry of Defence Information Strategy
(MODIS). The Chief Information Office.
London: Ministry of Defence.
MoD. (2010). JSP 440: The Defence Manual of Security,
Version 3.8. DDefSy. London: The Ministry of
Defence (Restricted).
MoD. (2010). JSP 541: Alerts, Warnings and Response,
Version 3.0. Defence Security and Assurance
Services (DSAS) . London: The Ministry of
Defence, (Restricted).
Engineering Doctorate
MoD. (2010). Strategic Defence and Security Review
(SDSR). London: Ministry of Defence.
MoD. (2010). The Defence Green Paper, Adaptability and
Partnership: Issues for a Strategic Defence
Review. London: Ministry of Defence.
MoD. (2010c). Army Doctrine Publications- Operatations.
London: British Army’s Electronic Battle Box,
DCDC.
MoD. (2011). MOD Information Strategy 2011: Better
Informed, Better Defence. London: Ministry of
Defence.
MoD. (2012). JSP 822: The Governance and Management
of Defence Training & Education. The Royal Air
Force, Training Education Skills and
Resettlement Division . London: HMSO.
Moffat, J. (2003). Complexity Theory and Network Centric
Warfare (Vol. Information Age
Transformation Series). Washington D.C.:
CCRP Publications.
Mora, E. (2012, June 13). Panetta Warns of Cyber Pearl
Harbor. CNSNews.com. (T. P. Jeffrey, Ed.)
Alexandria, VA. Retrieved June 14, 2012, from
http://cnsnews.com/news/article/panettawarns-cyber-pearl-harbor-capabilityparalyze-country-there-now
Morabito, A. J., & Gatchel, T. L. (2001). NATO command
and Control: Bridging the Gap. Newport, Rhode
Island: US Naval war College.
Morris, E., Levine, L., Meyers, C., Place, P., & Plakosh, D.
(2004). System of Systems Interoperability
(SOSI):Final Report. Software Engineering
Institute. Pittsburgh, PA: Carnegie Mellon
University.
Morris, E., Levine, L., Meyers, C., Place, P., & Plakosh, D.
(2004). System of Systems Interoperability
(SOSI): Final Report. The Software Engineering
Institute. Pittsburgh, PA : Carnegie Mellon
University.
Murphy, D. (2010, May-June). Attack or defend? Levering
information and balancing risk in cyberspace.
Military Review, pp. 88–96.
Nain, D., Donaghy, N., & Goodman, S. (2007). The
International Landscape of Cyber Security. (D.
W. Straub, S. Goodman, & R. L. Bask, Eds.)
Advances in Management Information Systems,
11, 196 - 227.
Nain, D., Donaghy, N., & Goodman, S. (2008). The
International Landscape of Cyber Security. In
D. Straub, S. Goodman, & R. Baskerville,
nformation Security: Policy, Processes, and
Practices. New York: M.E. Sharpe.
NATO. (2002). Vulnerability of the Interconnected Society.
Oslo, Norway: North Atlantic Treaty
Organisation.
NATO. (2003). NATO C3 Technical Architecture Reference
Model for Interoperability. NATO
Communications and Information (NCI)
Agency, NC3A. Brussels: North Atlantic Treaty
Organisation (NATO).
NATO. (2006). NEC Vision and Concept. The North
Atlantic Treaty Organisation, The Military
Committee. Brussels: The North Atlantic
Treaty Organisation.
NATO. (2007). Cyber-Terrorism - a serious threat to peace
and security in the 21st Century. Brussels:
North Atlantic Treaty Organisation.
NATO. (2007). Management Approach to NATO Network
Enabled Capability. Brussels, Belgium: North
Atlantic Treaty Organisation.
Page xxxv
Bridging the Air Gap: An Information Assurance Perspective
NATO. (2007a). Introduction to Network Enabled
Capability Security Research Strategy. Rome,
NY: US Air Force Research Laboratory,
Information Directorate.
NATO. (2007b). RTO-TR-IST-045 - NEC Security Research
Strategy. Neuilly-sur-Seine, France: NATO
Research and Technology Organisation.
NATO. (2008). Defending against Cyber Attacks. North
Atlantic Treaty Organisation.
NATO. (2010). The New Strategic Concept. Lisbon: North
Atlantic Treaty Organisation.
NCIOC. (2008). NCOIC Interoperability Framework.
Washington, D.C.: Network Centric Operations
Industry Consortium - NCOIC.
NECSI. (2004). Characteristics of Systems of Systems.
Cambridge, MA : New England Complex
Systems Institute.
Neugent, B. (2009). Reciprocity. 3rd Annual UCDMO
Conference. Los Angeles: Unified Cross
Domain Management Office (UCDMO).
Newman, R. C. (2006). Cybercrime, identity theft, and
fraud: practicing safe internet - network
security threats and vulnerabilities.
Proceedings of the 3rd annual conference on
Information security curriculum development.
Kennesaw, Georgia, 22-23 September, 2006
(pp. 68-78). ACM.
Newman, R. C. (2006). Cybercrime, identity theft, and
fraud: practicing safe internet - network
security threats and vulnerabilities.
Proceedings of the 3rd Annual Conference on
InformationSecurity Curriculum Development,
InfoSecCD 2006, Kennesaw,Georgia, USA, 22-23
September, 2006 (pp. 68-78). ACM.
Nichiporuk, B. (1999). U.S. Military Opportunities:
Information-Warfare Concepts of Operation.
In Z. Khalilzad, & J. White (Eds.), Strategic
Appraisal: The Changing Role of Information in
Warfare (pp. 179-215). Santa Monica, CA:
RAND.
Nightingale, D. J., & Rhodes, D. H. (2004). Enterprsie
Systems Architecting: Emerging Art and
Science. MIT Engineering Systems Symposium
(pp. 1-13). Cambridge, MA: Massachusetts
Institute of Technology.
Nikander, P. (2001). Users and Trust in Cyberspace.
Security Protocol Lecture Notes in Computer
Science, 2133/2001, 36-42.
NISCC. (2004a). NISCC Policy and Good Practice: Good
Practice Guide to Telecommunications
Resilience. National Infrastructure Security CoOrdination Centre. London: NISCC.
NISCC. (2004b). NISCC Assurance Report for “The CNI
Organisation”. National Infrastructure
Security Co-ordination Centre. London: NISCC.
NIST. (1994). Federal Information Processing Standards
Publication 186: Digital Signature Standard
(DSS). Computer Systems Laboratory, U.S.
Department of Commerce. Gaithersburg, MD :
National Institute of Standards and
Technology.
NIST. (2001). NIST Special Publication 800-32:
Introduction to Public Key Technology and the
Federal PKI Infrastructure. Information
Technology Laboratory, Computer Security
Division. Gaithersburg, MD: National Institute
of Standards and Technology.
NIST. (2003). SP800-59 Information Security: Guideline
for Identifying an Information System as a
Engineering Doctorate
National Security System. Gaithersburg, MD:
National Institute of Standards and
Technology.
NIST. (2003a). NIST Special Publication 800-50: Building
an Information Technology Security Awareness
and Training Program. National Institute of
Standards and Technology, Computer Security
Division . Gaithersburg, MD: Computer
Security Resource Center, Information
Technology Laboratory, NIST.
NIST. (2003b). NIST Special Publication 800-59: Guideline
for Identifying an Information System as a
National Security System. National Institute of
Standards and Technology, Computer Security
Division . Gaithersburg, MD: Computer
Security Resource Center, Information
Technology Laboratory, NIST.
NIST. (2005). NIST Special Publication 800-52: Computer
Sercurity. Information Technology Laboratory,
Computer Security Division. Gaithersburg,
MD: National Institute of Standards and
Technology.
NIST. (2006a). NIST Special Publication 800-89: Guide to
Intrusion Detection and Prevention Systems
(IDPS). National Institute of Standards and
Technology, Computer Security Division .
Gaithersburg, MD: Computer Security
Resource Center, Information Technology
Laboratory, NIST.
NIST. (2006b). NIST Special Publication 800-100:
Information Security Handbook: A Guide for
Managers. National Institute of Standards and
Technology, Computer Security Division .
Gaithersburg, MD: Computer Security
Resource Center, Information Technology
Laboratory, NIST.
NIST. (2007). NIST Special Publication 800-94:
Recommendation for Obtaining Assurances for
Digital Signature Applications. National
Institute of Standards and Technology,
Computer Security Division . Gaithersburg,
MD: Computer Security Resource Center,
Information Technology Laboratory, NIST .
NIST. (2008). NIST Special Publication 800-64: Security
Considerations in the System Development Life
Cycle. National Institute of Standards and
Technology, Computer Security Division .
Gaithersburg, MD: Computer Security
Resource Center, Information Technology
Laboratory, NIST .
NIST. (2009a). NIST Special Publication 800-16:
Information Security Training Requirements: A
Role- and Performance-Based Model. National
Institute of Standards and Technology,
Computer Security Division. Gaithersburg,
MD: Computer Security Resource Center,
Information Technology Laboratory, NIST.
NIST. (2009b). NIST Special Publication 800-53:
Recommended Security Controls for Federal
Information Systems and Organizations.
National Institute of Standards and
Technology , Computer Security Division.
Gaithersburg, MD: Computer Security
Resource Center, Information Technology
Laboratory, NIST.
NIST. (2009c). NIST Special Publication 800-117: DRAFT
Guide to Adopting and Using the Security
Content Automation Protocol (SCAP). National
Institute of Standards and Technology ,
Page xxxvi
Bridging the Air Gap: An Information Assurance Perspective
Computer Security Division. Gaithersburg,
MD: Computer Security Resource Center,
Information Technology Laboratory, NIST.
NIST. (2009d). NIST Special Publication 800-127: DRAFT
Guide to Security for Worldwide
Interoperability for Microwave Access (WiMAX)
Technologies. National Institute of Standards
and Technology , Computer Security Division.
Gaithersburg, MD: Computer Security
Resource Center, Information Technology
Laboratory, NIST.
NIST. (2010a). NIST Special Publication 800-119: DRAFT
Guidelines for the Secure Deployment of IPv6.
National Institute of Standards and
Technology, Computer Security Division.
Gaithersburg, MD: Computer Security
Resource Center, Information Technology
Laboratory, NIST.
NIST. (2010b). NIST Special Publication 800-125: DRAFT
Guide to Security for Full Virtualization
Technologies. National Institute of Standards
and Technology , Computer Security Division.
Gaithersburg, MD: Computer Security
Resource Center, Information Technology
Laboratory, NIST.
NIST. (2010c). NIST Special Publication 800-128: DRAFT
Guide for Security Configuration Management
of Information Systems. National Institute of
Standards and Technology , Computer
Security Division. Gaithersburg, MD:
Computer Security Resource Center,
Information Technology Laboratory, NIST.
Norman, A., & Lucas, P. (2000). Information Architecture
and the Emergent Properties of Cyberspace.
MAYA Design Group, Inc.
Norman, A., & Lucas, P. (2005). Information Architecture
and the Emergent Properties of Cyberspace.
InterJournal Complex Systems.
Norquist, B. (2004). Governmental Effects upon the
Cyber Security Decision Making Cycle. Security
Modelling, 18.
Norton. (2011). Internet Security Threat Report (ISTR),
Volume 16. Mountain View, CA: Symantec.
NPIA Information Assurance Capability Team. (2010).
Police Service IA Strategy 2010 - 2013.
Association of Chief Police Constables of
Scotland (ACPOS), National Policing
Improvement Agency. London: NPIA National
Police Library.
Nucci, A., & Papagiannaki, K. (2009). Design,
Measurement and Management of Large-scale
IP Networks: Bridging the gap between theory
and practice. Cambridge: University Press,
Cambridge.
Nunes, M. (1995, June). Jean Baudrillard in cyberspace:
Internet, virtuality, and postmodernity. Style,
29(2), 1-13.
O’Rourke, C., Fishman, N., & Selkow, W. (2003).
Enterprise Architecture: Using the Zachman
Framework. London: Thomson Course
Technology.
Obama, P. (2009a). Assuring a Trusted and Resilient
Information and Communications
Infrastructure. Washington D.C.: The US
President, White House.
Obama, P. (2009b). U.S. Cyber Security Plan. The US
President, White House: Washington D.C.
Engineering Doctorate
Obama, P. (2010). The Comprehensive National
Cybersecurity Initiative. Washington, D.C.: The
White House.
Obama, P. (2010). U.S. Cyber Security Progress.
Washington D.C.: The US President, White
House.
Obama, P. (2011). International Strategy for Cyberspace.
Washington, DC: The Office of the President of
the United States, White House.
OECD . (1992). The recommendations of the Council
concerning Guidelines for the Security of
Information Systems; GD(92)10. Paris, France:
The Organisation for Economic Co-operation
and Development.
OECD. (1986). Computer-related Crime: Analysis of Legal
Policy. Paris, France: The Organisation for
Economic Co-operation and Development.
OECD. (2002). Guidelines for the Security of Information
Systems and Networks. Paris, France: The
Organisation for Economic Co-operation and
Development.
OECD. (2005). The definition and Selection of Key
Competencies. Paris: Organisation for
Economic Co-operation and Development.
OECD. (2006). The Development of Policies for the
Protection of Critical Information
Infrastructures (CII):
DSTI/ICCP/REG(2006)15/FINAL. Paris,
France: The Organisation for Economic Cooperation and Development.
OECD. (2007). Malicious Software (Malware): A Security
Threat to the Internet Economy. Paris, France:
The Organisation for Economic Co-operation
and Development.
OECD. (2008a). The Future of the Internet Economy: A
Statistical Profile. Paris, France: The
Organisation for Economic Co-operation and
Development.
OECD. (2008b). Recommendation of the Council on the
Protection of Critical Information. Paris,
France: The Organisation for Economic Cooperation and Development.
OGC. (2007). Management of Risk: Guidance for
Practitioners. London: Office of Government
Commerce, The Stationary Office.
OGC. (2008). Best Management Practice: ITIL V3 and
ISO/IEC 20000. London: Office of Government
Commerce.
Ohta, T. (1999). he Japanese Way of Management: A
Reminiscence of Professor Takehiko Matsuda.
Invited Paper at the Meeting of the
International Federation of Operations
Research Societies (IFORS'99), Beijing, China,
1999. Operations Research Society of China .
Ohta, T. (1999a). The Japanese Way of Management: A
Reminiscence of Professor Takehiko Matsuda.
Invited Paper at the Meeting of the
International Federation of Operations
Research Societies (IFORS'99), Beijing, China,
1999. Operations Research Society of China.
Ohta, T. (1999b). A Cyber Commons: An Exploration of
Social Information Systems in a Digital
Society. Technical Report of Information
Processing Society of Japan, 99(60), pp. 17-22.
Ohta, T., & Yamamoto, T. (1995). A Theory of Social
Information Systems and its Basic Models.
Journal of the Japan Society for Management
Information, 4(2), 85-98.
Page xxxvii
Bridging the Air Gap: An Information Assurance Perspective
Ohta, T., Kazunari, I., & Isamu, O. (2001). A Viable Cyber
Commons: An Auto-Genesis World.
Proceedings of the 5th World Multiconference
on Systemics, Cybernetics and Informatics (SCI
2001), VIII, pp. 376-381.
Omand, D. (2010). Securing the State. London: Hurst &
Co.
Oracle. (2010). Sun OpenSSO Enterprise 8.0 Technical
Overview > Part II Access Control Using
OpenSSO Enterprise. Retrieved May 10, 2011,
from Sun OpenSSO Enterprise 8.0:
http://download.oracle.com/docs/cd/E1968
1-01/820-3740/ggqxm/index.html
Orbe, M. P. (1998). onstructing Co-Cultural Theory: An
Explication of Culture, Power, and
Communication. London: Sage Publications,
Inc.
Orlikowski, W. J., & Iacono, C. S. (2001). Research
commentary: Desperately seeking "IT" in IT
research - A call to theorizing the IT artifact.,
12(2), 121. Information Systems Research,
12(2), 121.
Ostadzadeh, S. S., & Shams, F. (2011). An Architectural
Framework for the Improvement of the UltraLarge-Scale Systems Interoperability.
WORLDCOMP'11,The 2011 World Congress in
Computer Science, Las Vagas, Nevada, 18-21
July 2011. Tehran: Universal Conference
Management Systems & Support (UCMSS).
Palaoro, H. F. (2010). Information Strategy: The Missing
Link. Joint Forces Quarterly, 59(4), 83-85.
Palmisano, S. (2008). A Smarter Planet Instrumented,
Interconnected and Intelligent. IBM Business
Leadership Forum, Istanbul, Turkey, 12
November, 2008. IBM.
Pamulai, J., Ammann, P., Jajodia, S., & Ritchey, R. (2006).
A Framework for Establishing, Assessing, and
Managing Trust in Inter–Organizational
Relationships. Pamula, J., Ammann, P., Jajodia,
S. and Ritchey, R. (2006). “A Framework for
Establishing, Assessing, and MProceedings of
the 3rd ACM workshop on Secure web services
SWS’06, Alexandria, Virginia, 3 November 2006
(pp. 23-32). ACM.
Papadaki, M. (2008). Social Engineering: How vulnerable
are we? Special Financial Investigation Service
for Electronic Trade & Electronic Crime (YPEE),
Ministry of Economy and Finance, Athens,
Greece, 31 March 2008. YPEE.
Paquet, C., & Saxe, W. (2005). The Business Case for
Network Security: Advocay, Governance and
ROI (Vols. Network Business Series, CISCO
Systems). Indianapolis, IN : CISCO Press.
Paquette, S., Jaeger, P. T., & Wilson, S. C. (2010, July).
Identifying the security risks associated with
governmental use of cloud computing.
Government Information Quarterly, 27(3), 245253.
Parmet, J. (2008, January 30). Bloom's Taxonomy.
Retrieved July 15, 2010, from Portfolio of
Janene Parmet: www.jparmet.com/masters
Pattee, P. G. (2008, Spring). Network-Centric Operations:
A Need for Adaptation and Efficiency. Air and
Space Power Journal.
Paul, C. (2008). Information Operations: Doctrine and
Practice (Vols. Contemporary Military,
Strategic and Security Issues). Westport CT:
Praeger Security International.
Engineering Doctorate
Peltier, T. (2005). Information Security Risk Analysis (2nd
Ed ed.). London: Auerbach Publications,
Taylor & Francis Group, Informa plc.
Peltier, T. R., Peltier, J., & Blackley, J. (2005). Information
Security Fundamentals. London: Auerbach
Publications, Taylor & Francis Group, Informa
plc.
Pentland, A., & Liu, A. (1999). Modeling and Prediction of
Human Behavior. Neural Computation, 11,
229–242.
Perlo-Freeman, S., Cooper, J., Ismail, O., Sköns, E., &
Solmirano, C. (2011). Chapter 4. Military
Expenditure. In SIPRI, Stockholm International
Peace Research Institute Yearbook 2011 (42nd
ed., pp. 158-229). Stockholm, Sweden: Oxford
University Press.
Perrone, L. F., Aburdene, M., & Meng, X. (2005).
Approaches to Undergraduate Instruction in
Computer Security. Proceedings of the
American Society for Engineering Education
Annual Conference & Exposition. American
Society for Engineering Education.
Perry, W., Signori, D., & Boon, J. (2004). Exploring
Information Superiority: A Methodology for
Measuring the Quality of Information and its
Impact on Shared Awareness. National Defense
Research Institute. Santa Monica, CA: RAND
Corporation.
Pfitzmann, A. (2006). Multilateral Security: Enabling
Technologies and their Evaluation. In G.
Muller, Emerging Trends in Information and
Communication Security (pp. 1-13). Berlin:
Springer-Verlag.
Phillips, C. E., Ting, T. C., & Demurjian, S. A. (2002).
Information Sharing and Security in Dynamic
Coalitions. Storrs, CT: The University of
Connecticut.
Phillips, J. C., Ting, T. C., & Dem, S. A. (2002). Information
sharing and security in dynamic coalitions.
Proceedings of the seventh ACM symposium on
Access control models and technologies (pp.
87-96). New York: Association for Computing
Machinery (ACM).
Piepenbrock , T. F. (2004). Enterprise design for dynamic
complexity : architecting & engineering
organizations using system & structural
dynamics. Sloan School of Management, Dept.
of Civil and Environmental Engineering.
Cambridge, MA: Massachusetts Institute of
Technology.
Pilgermann, M., Vidalis, S., Morakis, E., & Blyth, A. (2005,
December). Security in Heterogeneous Large
Scale Environments Using GRID Technology.
(P. Shi, & J.-S. Pan, Eds.) International Journal
for Innovative Computing, Information and
Control (IJICIC), 1(4), 715—725.
Pironti, J. (2006, May). Key Elements of a Threat and
Vulnerability Management Program . ISACA
Journal, 3.
Police National Accreditor. (2009). IAM Code of
Connection. Police PKI Policy Management
Authority (P3MA). London: National Policing
Improvement Agency.
Pollock, N. (2002). Knowledge Management and
Information Technology. Belvoir, VA: Defense
Acquisition University Press.
Porter, B. (2007). Approaching Zero: A Study in Zero-Day
Exploits, Origins, Cases, and Trends. Norwich
Page xxxviii
Bridging the Air Gap: An Information Assurance Perspective
University Journal of Information Assurance,
3(1), 1-28.
Porter, M. E. (2001). Strategy and the Internet. Havard
Business Review, 63-78.
Portnoy, M., & Goodman, S. (2009). The International
Landscape of Cyber Security. In M. Portnoy, K.
Minor, A. Howard, W. Lee, R. Givens, I. Liscano,
et al., M. Portnoy, & S. Goodman (Eds.), Global
Initiatives to Secure Cyberspace (Vol. 42, pp. 13). New York, NY: Springer Science+Business
Media, LLC.
Potgieser, P. (2012, March 13). Financial services
messaging - Business benefits boosted by
interoperability. Retrieved June 10, 2012, from
International Organization for
Standardization:
http://www.iso.org/iso/home/news_index/n
ews_archive/news.htm?refid=Ref1536
Powell, A. L. (2009). Is Cyberspace a source of Global
Insecurity and is a reaction-based strategy
really able to harness it for greater effect?
Royal College of Defence Studies. HMSO.
Powell, R. (1990). Nuclear Deterrence Theory: The Search
for Credibility. Cambridge: Cambridge
University Press.
Powell, T., & Dent-Micallef, A. (1997, May). Information
technology as competitive advantage: The role
of human, business, and technology resources.
Strategic Management Journal, 18(5), 375405.
Poynter, K. (2008). Review of information security at HM
Revenue and Customs -Final report. London:
Her Majesty’s Stationery Office.
Price, R. D., Beltz, T. W., & McKinnon, N. (2006).
Automating command post and battle staff
operations at the USAF 45th space wing.
MILCOM'06 Proceedings of the 2006 IEEE
Conference on Military Communications (pp.
3544-3550). Piscataway, NJ: IEEE Press.
Price, S. M. (2008, September). Extending the McCumber
Cube to Model Network Defence. ISSA Journal,
9, 14-18.
PricewaterhouseCoopers LLP (UK). (2010). Revolution or
evolution? Information Security 2020. London:
Technology Strategy Board.
Proctor, R. W., & Van Zandt, T. (2008). Human Factors in
Simple and Complex Systems. Washington D.C.:
CRC Press, Taylor and Francis Group.
Provos, N., & Holz, T. (2008). Virtual Honeypots: From
Botnet Tracking to Intrusion Detection.
Addison-Wesley, Pearson Education.
Puran, R. (2003). Beyond Convential Terrorism...Cyber
Assualt. The SANS Institute. Bethesda, MD:
SANS GIAC.
Qian, Y., Joshi, J., Tipper, D., & Krishnamurthy, P. (2008).
Information Assurance. In Y. Qian, J. Joshi, D.
Tipper, & P. Krishnamurthy, Information
Assurance: Dependability and Security in
Network Systems (pp. 1-14). Burlington:
Morgan Kaufmann Publishers.
Ragsdale, D. J., Lathrop, S. D., & Dodge, R. C. (2003).
Enhancing Information Warfare Education
Through the Use of Virtual and Isolated
Networks. Journal of Information Warfare,
2(3).
Raines, G. (2009). Service-Oriented Architecture (SOA)
Series: Cloud Computing and SOA. System
Engineering. MITRE.
Engineering Doctorate
Rannenberg, K. (2001). Multilateral Security: A concept
and examples for balanced security.
Cambridge, UK: Microsoft Research.
Rathmell, A. (2003). Controlling Computer Network
Operations. Studies in Conflict & Terrorism,
26(3), 215-232.
Rattray, G. (2001). Strategic Warfare in Cyberspace.
Cambridge, MA: The MIT Press.
Rattray, G. J. (2001). Strategic Warfare in Cyberspace.
Cambridge, MA: The MIT Press.
Rawlinson, D. (2005). Ministry of Defence Information
Assurance Review. London: Director General
Information, MoD. (Restricted).
Raymond, J. C., & Campbell, D. E. (2003). Building a
Global Information Assurance Program.
Auerbach Publications, Taylor & Francis
Group, Informa plc.
Redman, J., Warren, M. J., & Hutchinson, W. (2005).
System survivability: a critical security
problem. (S. M. Furnell, Ed.) Information
Management & Computer Security, 13(3), 182188.
Richards, G. (2010). Let Battle Connect. Engineering &
Technology, IET, 5(6), 36-39.
Richards, G. (2010a). Let Battle Connect. Engineering and
Technology, 5(6), 36-38.
Richardson, C. J. (2007). Security: a necessary
compromise? NATO Conference, Bletchley
Park, 26 June 2007. Telindus.
Richardson, C. J. (2008). Bridging an IA Capability Gap.
Realising Network Enabled Capability
(RNEC’08), NECTICE, Leeds, UK, 13 October
2008. NECTISE Loughbourgh University.
Richardson, C. J. (2008). Managing Information Security
and its Assurance. Blandford Forum: Defence
College of Communications & Information
Systems (DCCIS).
Richardson, C. J. (2008). The IA Professional Framework Draft White Paper. Defence College of
Communication and Information Systems
(DCCIS), ICT Faculty. Blandford Forum:
Cabinet Office.
Richardson, C. J. (2008b, October 20). Cyber Situational
Awareness: The Assurance of Information
Operations. CISM MSc Lecture. Blandford
Forum, Dorset, UK: Defence College of CIS
(DCCIS).
Richardson, C. J. (2009). A Holistic Approach to Effective
Information Assurance Education. Military
Information Assurance and Security
Symposium, MoD Abbey Wood, 16 April 2009.
Cobham Technical Services.
Richardson, C. J. (2009b, November 10). Computer
Network Operations: Military Cyber
Operations in Theatre. CISM MSc Lecture.
Blandford Forum, Dorset, UK: Defence College
of CIS (DCCIS).
Richardson, C. J. (2011). Cyberspace: The 5th Domain.
Cyber Security 2011, Brussels, Beliguim, 31
May- 1 June 2011. IQPC.
Richardson, C. J. (2012, June 5). The Assurance of SocioTechnical Enterprise Operations. MSc
Information Assurance Module 2. London, UK.
Rickards, D. A. (2010). NO AIR: Cyber Dependency and the
Doctrine Gap. Naval War College, Joint Military
Operations. Newport, RI: Defense Technical
Information Center (DTIC).
Rid, T. R., & McBurney, P. (2012). Cyber-Weapons. The
RUSI Journal, 157(1), 6-13.
Page xxxix
Bridging the Air Gap: An Information Assurance Perspective
Riechmann, T., & Hauck, F. J. (1998). Meta objects for
access control: a formal model for role-based
principals. Proceedings of the 1998 ACM
Workshop on New Security Paradigms (pp. 3038). Charlottesvillie, Virginia: Association for
Computer Machinery (ACM).
Riggs, C. (2003). Network Perimeter Security: Building
Defence-In-Depth. Auerbach Publications,
Taylor & Francis Group, Informa plc.
Robb, J. (2007). Brave New World. John Wiley.
Robinson, C. L., Hughes, K. J., Staniforth, I., & Wiseman, S.
(2003). Classes of Security Functions for use
with an Infosec Architecture Model. Malvern,
UK: QinetiQ,.
Robinson, M. (2012, June 26). Cyber terror threat to the
UK. DailyMail.co.uk/news. London: The Daily
Mail Online. Retrieved June 26, 2012, from
http://www.dailymail.co.uk/news/article2164780/Cyber-terror-threat-UK-industrialscale--says-MI5-chief-reveals-company-lost800-MILLION-result-state-sponsoredespionage.html
Rogers, J. (1997). Sixteen Personality Types at Work in
Organisations. Management Futures Ltd.
Rogers, R. (1995). The psychological contract of trust –
part II. Executive Development, 8(2), 7 - 15.
Rogers, R., & Devost, M. G. (2005). Hacking a Terror
Network: The Silent Threat of Covert Channels.
Syngress.
Ross, J. W., Weill, P., & Robertson, D. (2006). Enterprise
Architecture As Strategy: Creating a
Foundation for Business Execution. Cambridge,
MA: Harvard Business School Press.
Rossel, P., & Finger, M. (2007). Conceptualizing eGovernance. In T. Janowski, & T. A. Pardo
(Ed.), Proceedings of the 1st International
Conference on Theory and Practice of
Electronic Governance (pp. 399-407). Macao,
China: ACM.
Rowley, B. (1995, April). The Future Is Not What It Used
To Be. Retrieved March 15, 2011, from USAF
Center for Strategy and Technology:
http://www.au.af.mil/au/awc/awcgate/awcofut.htm
Rowlingson, R. (2005). Inside and out? The Information
Security Threat From Insiders. 4th European
Conference on Information Warfare and
Security, University of Glamorgan, UK, 11-12
July 2005 (pp. 293-302). Academic
Conferences Limited, Reading, UK.
Rubel, T. (2010, September). Charting the Course of
Government Transformation. Retrieved April
18, 2011, from IDC Government Insights:
http://www.emc.com/collateral/analystreports/10547-idc-charting-course-govttrans-ar.pdf
Rubin, E. (2010). The Hidden Costs of Internal Clouds. (V.
Vasquez, Ed.) Cloudbook: The Cloud Computing
& SaaS Information Resource, 1(4).
Russell, G., & Russell, N. (1999). Cyberspace and School
Education. International Journal of Research &
Method in Education, 22(1), 7-17.
Salmela, H. (1997). From information systems quality to
sustainable business quality. Information and
Software Technology, 39(12), 819-825.
Sandhu, R. (2000). Engineering authority and trust in
cyberspace: the OM-AM and RBAC way. RBAC
'00 Proceedings of the fifth ACM workshop on
Role-based access control (pp. 111 - 119). New
Engineering Doctorate
York, NY: Association for Computing
Machinery (ACM).
Sanes, K. (2008). The Age of Stimulation. Retrieved
January 12, 2009, from Transparency now:
http://www.transparencynow.com/
Savola, R. (2007). Towards a taxonomy for information
security metrics. Proceedings of the 2007 ACM
workshop on Quality of protection (pp. 28-30).
ACM.
Saydjari, O. S. (2004, March). Cyber Defence: Art to
Science. Communications of the ACM, 47(3),
53-57.
Scheffran, J. (2008). The complexity of security.
Complexity, 14(1), 13-21.
Schiller, C. A., Binkley, J., Harley, D., & Evron, G. (2007).
Botnets: the Killer Web App. Syngress
Publishing, Inc., Elsevier.
Schiller, C. A., Binkley, J., Harley, D., Evron, G., Bradley, T.,
Willems, C., et al. (2007). Botnets: The Killer
Web App. (C. A. Schiller, & J. Binkley, Eds.)
Burlington, MA, USA: Syngress Publishing, Inc.
Elsevier.
Schjolberg, S. (2005a). Law Comes to Cyberspace.
Proceedings Eleventh United Nations Congress
on Crime Prevention and Criminal Justice,
Bangkok, Thailand, 18-25 April, 2005. United
Nations Office on Drugs and Crime.
Schmidt, H. A. (2008). Emerging Cyber Threats Report for
2009. Georgia Tech Information Security
Center.
Schneider, F. (1998). Trust in Cyberspace. Washington
D.C.: National Academy Press .
Schneier, B. (1994). Applied Cryptography. John Wiley &
Sons.
Schneier, B. (1996). Applied Cryptography: Protocols,
Algorithms and Source Code in C J (2nd ed.).
ohn Wiley and Sons.
Schneier, B. (2000). Secrets and Lies: Digital Security in a
Networked World. John Wiley & Sons.
Schneier, B. (2006). Beyond Fear:Thinking Sensibly About
Security in an Uncertain World. Springer
Science.
Schneier, B. (2008). Schneier on Security. John Wiley &
Sons.
Schneier, B., & Banisar, D. (1997). The Electronic Privacy
Papers. John Wiley & Sons.
Schoder, D. (1999). Navigation in Cyberspace -Using
Multi-Dimensional Scaling to create threedimensional navigational maps. Institute for
Information and Gesellschaft (IIG). Freiburg,
Germany: University of Freiburg.
Schou, C. D., Kuehl, D., & Armistead, E. L. (2005).
Information Operations Education: Lessons
Learned from Information Assurance. 4th
European Conference on Information Warfare
and Security, University of Glamorgan, UK, 1112 July 2005 (pp. 325-334). Academic
Conferences Limited, Reading, UK.
Schuler, D., & Day, P. (2004). Shaping the network society:
the new role of civil society in cyberspace.
Cambridge, MA: The MIT Press.
Schwartau, W. (1996a). Chaos on the Electronic
Superhighway: Information Warfare. New
York, NY: Thunder’s Mouth, Press.
Schwolow, S., & Jungfalk, M. (2010). The Information
Value Chain: Strategic Information
Management for Competitive Advantage.
Copenhagen, Denmark: Copenhagen Business
School.
Page xl
Bridging the Air Gap: An Information Assurance Perspective
Senge, P. (1990). The Fifth Discipline: The Art & Practice
of the Learning Organisation. New York:
Doubleday.
Senge, P. M., Kleiner, A., Roberts, C., Ross, R. B., & Smith,
B. J. (1994). The Fifth Discipline Fieldbook:
Strategies and Tools for Building a Learning
Organisation. London: Nicholas Breadley
Publishing.
Senge, P., Kleiner, A., Roberts, C., Ross, R., & Smith, B.
(1994). The Fifth Discipline: Strategies and
tools for building a learning organization.
London: Brealey.
SFIA. (2010). The Skills Framework for the Information
Age, Version 4G. London: SFIA Foundation .
Shannon, C. (1948, July & October). A Mathematical
Theory of Communication. Bell System
Technical Journal, 27(3 & 4), 379–423 & 623–
656.
Sharma, D. (2010, April). Integrated Network Electronic
Warfare: China's new concept of Information
Warfare. (N. S. Sisodia, Ed.) Journal of Defence
Studies, 4(2), 36-49.
Sharma, D. (2010b). Integrated Network Electronic
Warfare: China’s New Concept of Information
Warfare. (N. S. Sisodia, Ed.) Journal of Defence
Studies, 4(2), 36-49.
Shatchman, N. (2010, June 21). Darpa Taking Fire for Its
Cyberwar Range. Retrieved May 10, 2012,
from Wired:
http://www.wired.com/dangerroom/2010/0
6/darpa-taking-fire-for-its-cyberwar-range/
Shedroff, N. (1999). Information Interaction Design:
Unified Theory of Design. In R. Jacobson,
Information Design (pp. 267-292). Cambridge,
MA: The MIT Press.
Shelton, C., & Darling, J. (2003). From Chaos to Order:
Exploring New Frontiers in Conflict
Management. (Presented at the Midwest
Academy of Management Conference, Kansas
City (pp. 1-17). Midwest Academy.
Shinder, D. (2011, February 28). Cybercrime: Why it's the
new growth industry. Retrieved February 28,
2011, from TechRepublic:
http://www.techrepublic.com/blog/security/
cybercrime-why-its-the-new-growthindustry/5131
Sikich, G. W. (2003). Integrated business continuity:
maintaining resilience in uncertain times.
Tulsa: PennWell Corporation.
Singel, R. (2010, March 4). White House Cyber Czar:
‘There Is No Cyberwar’. Retrieved March 5,
2010, from Wired:
http://www.wired.com/threatlevel/2010/03
/schmidt-cyberwar/
Skoudis, E. (2002). Counter Hack: A step-by-step Guide to
Computer Attacks and Effective Defenses.
Prentice Hall series in Computer Networking
and Distributed Systems, Prentice Hall PTR.
Sledge, C. (2006). Information Assurance: Building
Educational Capacity. The Software
Engineering Institute. Pittsburgh, PA:
Carnegie Mellon University.
Smart, P. R., & Shadbolt, N. R. (2007). The Semantic
Battlespace Infosphere: A Knowledge
Infrastructure for Improved Coalition
Interoperability. International Conference on
Integration of Knowledge Intensive Multi-Agent
Systems, KIMAS 2007, 30 April- 3 May, 2007
(pp. 390-395). Waltham, Massachusetts: IEEE.
Engineering Doctorate
Smith, D. B. (2005). Introducing a Guide to
Interoperability. Software Engineering
Institute. Pittsburg: Carnegie Mellon
University.
Smith, E. (2003). Effects Based Operations: Applying
Network Centric Warfare in Peace, Crisis, and
War. Office of the Assistant Secretary of
Defense. Washington DC.: Command and
Control Research Program (CCRP), DoD.
Snyder, R. (2006). Ethical hacking and password
cracking: a pattern for individualized security
exercises. Proceedings of the 3rd annual
conference on Information security curriculum
development. Kennesaw, Georgia, 22-23
September, 2006 (pp. 13--18). ACM.
Söderström, E. (2009). Trust Types: An Overview. In G.
Dhillon (Ed.), Proceedings of the 8th Annual
Security Conference Discourses in Security
Assurance & Privacy Las Vegas, NV, USA, 15-16
April, 2009. 12, pp. 1-14. Virginia
Commonwealth University.
Sogge, D. (2011). New organisational frameworks: the
importance of joint action. Coordinadora de
ONG para el Desarrollo-España, 17-18 May,
(pp. 1-10). Madrid.
Soliman, K. S., & Janz, B. D. (2004, July). An exploratory
study to identify the critical factors affecting
the decision to establish Internet-based
interorganizational information systems.
Information & Management, 41(6), 697-706.
Solomon, M. G., & Chapple, M. (2005). Information
Security Illuminated. Jones and Bartlett
Illuminated Series, Jones and Bartlett
Publishers, Inc.
Sommer, P., & Brown, I. (2011). Reducing Systemic
Cybersecurity Risk. Paris, France: The
Organisation for Economic Co-operation and
Development.
Spar, D. (1999). The Public Face of Cyberspace. In I. Kaul,
I. Grunberg, & M. A. Stern (Eds.), Global Public
Goods - International Cooperation in the 21st
Century (pp. 344-353). Oxford, UK: The Oxford
University Press.
Spivack, N. (2007). Making Sense of the Semantic Web.
2007-10-21). Retrieved June 10, 2009, from
2009-10-20 http://novaspivack. typepad.
com/nova_spivacks_weblog/files/nova_spivac
k_semantic_web_talk. ppt.
Srimoolanathan, B. (2011). Cyber Security – From Luxury
to Necessity. London: Frost & Sullivan.
Stahl, B. C. (2005). Chapter X: Responsibility for
Information Assurance and Privacy. In M. A.
Mahmood, Advanced Topics in End User
Computing (Vol. 4, pp. 186-207). London, UK:
Idea Group Publishing.
Stallings, W. (2000a). Business Data Communications
(5th ed.). Prentice Hall, Pearson Education,
Inc.
Stallings, W. (2000b). Local and Metropolitan Area
Networks (6th ed.). Prentice Hall, Pearson
Education, Inc.
Stallings, W. (2001). High-Speed Networks and Internets
(2nd ed.). Prentice Hall, Pearson Education,
Inc.
Stallings, W. (2003). Computer Networks with Internet
Protocols and Technology. Prentice Hall,
Pearson Education, Inc.
Page xli
Bridging the Air Gap: An Information Assurance Perspective
Stallings, W. (2004). Wireless Communications and
Networks (2nd ed.). Prentice Hall, Pearson
Education, Inc.
Stallings, W. (2005). Computer Organisations and
Architecture (7th ed.). Prentice Hall, Pearson
Education, Inc.
Stallings, W. (2006a). Cryptography and Network
Security: Principles and Practices (4th ed.).
Prentice Hall, Pearson Education, Inc.
Stallings, W. (2006b). Network Security Essentials (2nd
ed.). Prentice Hall, Pearson Education, Inc.
Stallings, W. (2007). Operating Systems (5th ed.).
Prentice Hall, Pearson Education, Inc.
Stallings, W. (2010). Data and Computer Communications
(9th ed.). Prentice Hall, Pearson Education,
Inc.
Starr, S. (2008). Towards a Preliminary Theory of
Cyberpower. In F. D. Kramer, S. H. Starr, & L.
Wentz (Ed.), Proceedings International
Command and Control Research and
Technology Symposia (ICCRTS 2008), Seattle,
WA., 17-19 June, 2008 (pp. 43-90). National
Defence University and Potomac Books.
Starr, S. H. (2009). Toward a Preliminary Theory of
Cyberpower. (F. D. Kramer, S. H. Starr, & L. K.
Wentz, Eds.) Washington D.C.: National
Defense University Press and Potomac Books.
Stavridis, J. G., & Parker, E. C. (2012, April). Sailing the
Cyber Sea. Retrieved May 15, 2012, from Joint
Forces Quarterly:
http://www.ndu.edu/press/jfq-65.html
Steane, A. (1998). Reports on Progress in Physics.
Quantum Computing, 119.
Steele, R. D. (2006, February). Information Operations:
Putting the “I” back into DIME. U.S. Army War
College, Strategic Studies Institute. Carlisle,
PA: The Strategic Studies Institute.
Steinberg, A. N., Bowman, C. L., & White, F. E. (1999).
Revisions to the JDL Data Fusion Model.
Arlington, VA: Environmental Research Inst of
Michigan.
Sterner, E. (2011, Spring). Retaliatory Deterrence in
Cyberspace. Strategic Studies Quarterly, 5(1),
62-80.
Sterner, E. (2011). Wikileaks and Cyberspace Cultures in
Conflict. The George C. Marshall Institute,
Arlington, VA.
Stevens, T. (2009). Cyberspace and Security: Issues and
Concerns. World Defence Systems, 248-251.
Strang, T., & Linnhoff-Popien, C. (2004). A Context
Modeling Survey. In D. De Roure, & J. Indulska
(Ed.), 1st Int. Workshop on Advanced Context
Modelling, Reasoning and Management,
Nottingham, UK, 7-8 September 2004.
Stvilia, B., Twidale, M. B., & Smith, L. C. (2006). Assessing
information quality of a community-based
encyclopedia. Champaign, IL: University of
Illinois.
Suler, J. (2004, June). The Online Disinhibition Effect. (B.
K. Wiederhold, Ed.) CyberPsychology and
Behavior, 7(3), 321-326.
Suri, N., Benincasa, G., Formaggi, S., Winkler, R., Choy, S.,
Kovach, J., et al. (2008). DisService: A Peer to
Peer Information Dissemination Service for
Tactical Environments. Proceedings of the
2008 Meeting of the Military Sensing Symposia
(MSS), Nellis AFB, NV, February, 2008.
Speciality Group on Battlespace Accoustic and
Seismic Sensing (BAMS 2008).
Engineering Doctorate
Sushil, J., Liu, P., Swarup, V., & Wang, C. (2010). Overview
of Cyber Situational Awareness. Cyber
Situational Awareness: Advances in
Information Security, 46, 15-35.
Suzić, R., & Yi, C.-h. (2008). Information Exchange
Requirements (IER) and Information
Exchange Models (IEM). In J.-P. Bourey, & R. G.
Seguer (Ed.), Proceedings of MDISIS,
Montpellier, France, 16 June 2008. 340, pp. 3145. CEUR Workshop Proceedings.
Swanson, M., & Guttman, B. (1996). NIST SP 800-14:
Generally Accepted Principles and Practices for
Securing Information Technology Systems.
National Institute of Standards and
Technology Technology Administration, U.S.
Department of Commerce. Gaithersburg, MD:
NISP.
Tait, A. (2010). G-Cloud Founding Principles. London:
Cabinet Office.
Talevski, A., Chang, E., & Dillon, T. S. (2005, May).
Reconfigurable Web service integration in the
extended logistics enterprise. Industrial
Informatics, 1(2).
Tapscott, D., Williams, A. D., & Herman, D. (2008,
January). Government 2.0: Transforming
Government and Governance for the TwentyFirst Century. Retrieved March 15, 2011, from
Google Academia:
http://google.academia.edu/DanHerman/Pap
ers/378095/Government_2.0_Transforming_
Government_and_Governance_for_the_Twenty
-First_Century
Task Force on National Security in the Information Age.
(2002). ProtectingAmerica's Freedom in the
Information Age. New York, NY: The Markle
Foundation.
Taylor, B., & Azadegan, S. (2006). Threading secure
coding principles and risk analysis into the
undergraduate computer science and
information systems curriculum. Proceedings
of the 3rd annual conference on Information
Security Curriculum Development (InfoSecCD).
Kennesaw, Georgia, USA, 22-23 September,
2006 (pp. 24-29). ACM.
The Economist. (2010, July 1). Cyberwar: It is time for
countries to start talking about arms control
on the internet. Retrieved July 15, 2010, from
The Economist:
http://www.economist.com/node/16481504
?story_id=16481504&source=features_box1
The US National Security Council. (2008). The
Comprehensive National Cybersecurity
Initiative. Washington, D.C.: The White House.
The US National Security Council. (2011). The
International Strategy for Cyberspace.
Washington, D.C.: The White House.
The White House. (2011). The Strategy to Combat
Transnational Organised Crime: Addressing
Converging Threats to National Security.
Washington, DC: The White House.
Thomas, S. (2009a). Collaboration without Boundaries,
Cross-Domain Solutions for Network-Centric
Operations. Fairfax, VA: Trident Systems Inc.
Thomson, K. (2009). Information Security Conscience: a
precondition to an Information Security
Culture? In G. Dhillon (Ed.), Security,
Assurance and Privacy: Organizational
Challenges Proceedings of the 8th Annual
Security Conference Discourses in Security
Page xlii
Bridging the Air Gap: An Information Assurance Perspective
Assurance & Privacy Las Vegas, NV, USA April
15-16, 2009.
Tipton, H. F., & Krause, M. (2008). Information Security
Management Handbook (6th ed.). Auerbach
Publications, Taylor & Francis Group, Informa
plc.
Toffler, A., & Toffler, H. (1980). The Third Wave. New
York: William Morrow and Co.
Tolk, A. (2001). Computer Generated Forces –Integration
into the Operational Environment. Simulation
of and for Military Decision Making, Rome,
Italy, 15-16 October 2001. 9, pp. 1-18. NATO
Research and Technologies Organisation.
Tolk, A. (2003). Beyond Technical Interoperability –
Introducing a Reference Model for Measures
of Merit for Coalition Interoperability.
Proceedings of the 8th International Command
and Control Research and Technology
Symposium, National Defense University,
Washington, DC, 17-19 June, 2003. (pp. 1-24).
DoD CCRP.
Tolk, A. (2003). Beyond Technical Interoperability –
Introducing a Reference Model for Measures
of Merit for Coalition Interoperability. 8th
International Command and Control Research
and Technology Symposium, National Defense
University. Washington, 17-19 June, 2003 (pp.
1-47). Defense Technical Information Center
(DTiC).
Tolk, A. (2003). Beyond Technical Interoperability:
Introducing a Reference Model for Measures
of Merit for Coalition Interoperability.
Proceedings of the Command and Control
Research and Technology Symposium (CCRTS).
Washington, DC: CCRP Press.
Tolk, A., & Kunde, D. (2010, November 25). Decision
Support Systems - Technical Prerequisites and
Military Requirements. Computing Research
Repository (CoRR).
Tolk, A., & Muguira, J. (2003). The Levels of Conceptual
Interoperability Model (LCIM). Proceedings
IEEE Fall Simulation Interoperability
Workshop. Orlando, Fl.: IEEE CS Press.
Tremaine, R. L. (2010, August). Demonstrating
Cyberspace Superiority in an Acquisition
World. (N. Sage, Ed.) High Frontier: The
Journal for Space & Missile Professionals, 6(4),
62-65.
Trist, E. (1981). The Sociotechnical Perspective: The
Evolution of Sociotechnical Systems as a
Conceptua Framework and as an Action
Research Program. In A. H. Van de Ven, & W. F.
Joyce, Perspectives on organization design and
behavior (pp. 19-75). New York: John Wiley &
Son.
Trost, R. (2010). Practical Intrusion Analysis: Prevention
and Detection for the Twenty-First Century.
Addison-Wesley, Pearson Education, Inc.
Tudor, J. (200). Information security architecture: An
integrated approach to security in the
organisation. Auerbach Publications, Taylor &
Francis Group, Informa plc.
Tullao, T. S. (2003). Education & Globalization. Makati
City, Philippines: Philippine Institute for
Development Studies (PIDS).
Twitchell, D. P. (2006). Social engineering in information
assurance curricula. Proceedings of the 3rd
annual conference on Information security
Engineering Doctorate
curriculum development, Kennesaw, Georgia,
23-24 September 2006 (pp. 191--193). ACM.
UKAS. (2002). UKAS Guidance for bodies operating
certification of Trust Service Providers seeking
approval under tScheme. London: The United
Kingdom Accreditation Service (UKAS).
UN. (2004). A more secure world: Our shared
responsibility. United Nations, International
Coalition for the Responsibility to Protect.
New York: United Nations Department of
Public Information.
United Nations. (2004). A More Secure World: Our Shared
Responsibility. New York, NY: UN.
United Nations. (2010). Cyber security: emerging threats
and challenges, ECOSOC General Segment
briefing. New York, NY: UN.
US Congress. (2012). Cyber Security. Congressional
Record, US Senate, Washington, DC.
USAF. (2008). Air Force Doctrine Document 2-11:
Cyberspace Operations. Air Force Doctrine
Center. Maxwell AFB, AL: Air University Press.
USN. (2010). Computer Network Defense . Proactive
Computer Network Defense and Information
Assurance (CND/IA) Programme, Department
of the Navy: Science and Technology.
Arlington, VA: Office of Naval Research.
VADM Brown, N. E. (2009, May). Difficulties encountered
as we evolve the Cyber Landscape for the
military. (N. Sage, Ed.) High Frontier: The
Journal for Space & Missile Professionals, 5(3),
6-8.
van den Berg, R. (2010). The 21st Century Battlespace:
The Danger of Technological Ethnocentrism.
(D. Bashow, Ed.) Canadian Military, 10(4).
Van Grembergen, W. (2004). Strategies for information
technology governance. London: Idea Group
Inc.
Van Grembergen, W., & Dehaes, S. (2007). Implementing
Information Technology Governance: Models,
Practices and Cases. Hershey, PA: IGI
Publishing.
Van Oranje-Nassau, C., Krapels, J., Botterman, M., & Cave,
J. (2009). The Future of the Internet Economy.
Cambridge: RAND Europe.
van Swaay, M. (1992). How shall we manage cyberspace
and its growing population? CSC '92
Proceedings of the 1992 ACM annual
conference on Communications (pp. 559--).
Kansas City, Missouri: The Association for
Computing Machinery (ACM).
VanVactor, J. D., & Gill, T. (2010, March). Comparing
military and civilian critical thinking and
information processes in operational risk
management: What are the lessons? Journal of
Business Continuity & Emergency Planning,
4(2), 97-112.
Vatis, M. (2001). Cyber Attacks During the War on
Terrorism: A Predictive Analysis. Institute for
Security and, Technology Studies. Dartmouth
College.
Vego, M. N. (2006). Effects Based Approach. (M. E.
Krause, Ed.) Joint Force Quarterly (JFQ), 2(41),
51-57.
Vego, M. N. (2006). Effects Based Operations: A critique.
Joint Forces Quarterly, 41, 51-57.
Verkhovsky, B. (2008). Information assurance protocols:
Efficiency analysis and implementation for
secure communication. Journal of Information
Page xliii
Bridging the Air Gap: An Information Assurance Perspective
Assurance and Security, Dynamic Publishers
Inc.
Vice Adm. Cebrowski, A., & Gartska, J. (1998, January).
Net-Centric Warfare: Its Origin and Future.
Proceedings Magazine, 124(1), pp. 28-35.
Vidalis, S., Jones, A., Blyth, A., & Thomas, P. (2004).
Assessing Cyber Threats in the Information
Environment. Journal of Network Security, 11,
10-11.
Vidanage, H. (2009). The Sri-Lankan Case. In A.
Karatzogianni (Ed.), Cyber-Conflict and Global
Politics: (pp. 146-161). Abingdon, Oxon, UK:
Routledge.
Vietmeyer, R. (2004). Net-centric Enterprise Services.
Boundaryless Information Flow Conference.
Boston, MA: DoD DISA.
Wacker, A., Schiele, G., Schuster, S., & Weis, T. (2008,
December). Towards an authentication
service for Peer-to-Peer based Massively
Multiuser Virtual Environments . Int. J. Adv.
Media Commun., 2(4), 364--379.
Waltz, E. (1999). Information Warfare: Principles and
Operations. Artech House Publishers.
Wang, R. Y. (2005a). Information Quality (Advances in
Management Information Systems). (R. Wang,
E. Pierce, S. Madnick, & C. Fisher, Eds.) M.E.
Sharpe.
Wang, Y. D., & Emurian, H. (2005). An overview of online
trust: Concepts, elements, and implications.
Computers in Human Behaviour, 21, 105-125.
Watts, B. (2008). What are today’s social evils? York:
Joseph Rowntree Foundation.
Weaver, N., Paxson, V., Staniford, S., & Cunningham, R.
(2003). A Taxonomy of Computer Worms.
Proceedings of the 2003 ACM Workshop on
Rapid Malcode (WORM), Washington DC, 27
October 2003 (pp. 11-18). ACM.
Weckert, J. (2005). Five: Trust in Cyberspace. In R. J.
Cavalier, The impact of the Internet on our
moral lives (pp. 95-120). Albany, NY: State of
University New York Press.
Wentz, L. K., Barry, C. L., & Starr, S. H. (2009). Military
Perspectives on Cyber Power. Washington, DC:
Center for Technology and National Security
Policy at the National Defense University.
WFS. (2009). The Erice Declaration on Principles for
Cyber Stability and Cyber Peace. 42nd Session
of the International Seminars on Planetary
Emergencies, Erice, Sicily, 20 August,2009.
Permanent Monitoring Panel on Information
Security of the World Federation of Scientists.
Wheatley, M. J. (2006). Leadership and the new science:
discovering order in a chaotic world. San
Francisco, CA: Berrett-Koehler.
Wheatley, M. J. (2006a). Leadership and the New Science:
Discovering Order in a Chaotic World (3rd ed.).
Berrett-Koehler Publishers, Inc.
Whitaker, A., Evans, K., & Voth, J. B. (2009). Chained
Exploits: Advanced Hacking Attacks from Start
to Finish. Addison-Wesley, Pearson Education,
Inc.
Whitman, M. E. (2004). In defense of the realm:
understanding the threats to information
security. (P. Hills, Ed.) International Journal of
Information Management, 24(1), 43-45.
Whitman, M. E., & Mattord, H. J. (2006). Hands-on
Information Security Lab Manual (2nd ed.).
Course Technology, Cengage Learning.
Engineering Doctorate
Whitman, M. E., & Mattord, H. J. (2006). Readings and
Cases in the Management of Information
Security. Course Technology, Cengage
Learning.
Whitman, M. E., & Mattord, H. J. (2008). Management of
Information Security (2nd ed.). Course
Technology, Cengage Learning.
Whitman, M. E., & Mattord, H. J. (2009). Principles of
Information Security (3rd ed.). Course
Technology, Cengage Learning.
Wikipedia. (2011, May 5). Information Technology
Infrastructure Library. Retrieved May 10,
2011, from Wikipedia:
http://en.wikipedia.org/wiki/Information_Te
chnology_Infrastructure_Library
Wiles, J. (2007). Techno Security’s Guide to E-Discovery
and Digital Forensics. Syngress Publishing,
Inc., Elsevier.
Willett, K. D. (2008). Information Assurance Architecture.
Boca Raton, FL: CRC Press, Taylor & Francis
Group.
Williams, B. T. (2002). Effects-Based Operations:Theory,
Application and the Role of Airpower. USAWC
Strategy Research Project. Carlisle Barrack,
PA: U.S. Army War College.
Williams, D. G. (1969). Official Secrecy in England.
Federal Law Review , 3(1).
Wilson, C. (2006). Information Operations and Cyberwar:
Capabilities and Related Policy Issues. The
Library of Congress. Washington, DC:
Congressional Research Service.
Wilson, C. (2007). Network Centric Operations:
Background and Oversight Issues for Congress.
Congressional Research Services, Technology
and National Security, Foreign Affairs,
Defense, and Trade Division. Washington D.C.:
US House of Congress.
Wilson, C. (2007). Network Centric Operations:
Background and Oversight Issues for Congress.
Congressional Research Services, Technology
and National Security, Foreign Affairs,
Defense, and Trade Division. Washington D.C.:
US House of Congress.
Wilson, T. D. (2002a). Strangers to Ourselves: Discovering
the Adaptive Unconscious. Cambridge, MA:
Belknap Press.
Winkler, V. J. (2011). Operating a Cloud. Securing the
cloud, 253-277.
Winn, J. K. (1997). Open Systems, Free Markets, and
Regulation of Internet Commerce. Tulane Law
Review, 72, 1177.
World Economic Forum. (2012). Global Risks 2012 Seventh Edition. Geneva: The World Economic
Forum.
Wray, S. (2011). Tyrants and Hackers. Bournemouth, UK.
Wu, B., Wu, J., Fernandez, E. B., & Magliveras, S. (2005).
Secure and Efficient Key Management in
Mobile Ad Hoc Networks. roceedings of the
19th IEEE International Parallel and
Distributed Processing Symposium (IPDPS'05) Workshop 17. 18, pp. 288.1-. Washington D.C.:
IEEE Computer Society.
Wylder, J. (2004). Strategic Information Security.
Auerbach Publications, Taylor & Francis
Group, Informa plc.
Yeung, R. W. (2002). A First Course in Information Theory.
(J. K. Wolf, Ed.) New York, NY: Kluwer
Academic, Springer.
Page xliv
Bridging the Air Gap: An Information Assurance Perspective
YÖN, H., & Aydinli, E. (2011). Transgovernmentalism
Meets Security: Police Liaison Officers,
Terrorism, and Statist Transnationalism.
Governance, 24(1), 55-84.
Zachman, J. (2002). The Zachman Framework™: The
Official Concise Definition. Zachman
International.
Zack, M. H. (1999, Summer). Managing Codified
Knowledge. MIT Sloan Management Review,
40(4), 45-58.
Zakaria, O. (2005). Information Security Culture and
Leadership. 4th European Conference on
Information Warfare and Security, University
of Glamorgan, UK, 11-12 July 2005 (pp. 415-).
Academic Conferences Limited, Reading, UK.
Zegura, E., Calvert, K., & Bhatta, S. (1996). How to Model
an Internetwork. Proceedings IEEE INFOCOM
'96, The Conference on Computer
Communications, Fifteenth Annual Joint
Conference of the IEEE Computer and
Communications Societies, Networking the
Next Generation, San Francisco, CA, 24-28
March, 1996. 2, pp. 594--602. IEEE.
Zeilinger, A. (2002, March 25). Zeilinger, A. (2002), “Why
the Quantum? It from Bit? A Participatory
Engineering Doctorate
Universe?,” The Global Spiral, Metanexus
Online, March 25, 2002, p.3. (J. Levine, Ed.)
Retrieved November 15, 2010, from
Information Realism: Quantum Bit in the
Cyber space:
http://www.digicult.it/digimag/article.asp?id
=1852
Zimet, E., Barry, C. L., Smith, J. G., Brown, M. A., Hare, F. B.,
Zimmerman, G., et al. (2009). Military
Perspectives on Cyberpower. (L. K. Wentz, C. L.
Barry, & S. H. Starr, Eds.) Washington, D.C.:
Institute for National Strategic Studies (INSS).
Zittrain, J. (2008). The Future of the Internet—And How
To Stop It. London: Allen Lane.
Zohar, D. (1997). Rewiring the Corporate Brain: Using the
New Science to Rethink How We Structure and
Lead Organizations (1st ed.). Berrett-Koehler
Publishers.
Zohar, D., & Marshall, I. N. (1990). The Quantum Self Human Nature And Consciousness Defined By
The New Physics. William Morrow & Co, Inc.
Zorz, Z. (2011, April 21). Why do governments have
trouble retaining cyber warriors? Help Net
Security.
Page xlv