Skip to main content

Resilient Cyber-Secure Systems and System of Systems: Implications for the Department of Defense

  • Conference paper
  • First Online:
Disciplinary Convergence in Systems Engineering Research

Abstract

Over the past two decades, the United States has continued to modify and improve upon its cyber strategy as a result of a constantly evolving and asymmetric cyber threat. As the dependency on networked systems and connectivity has increased, so have the complexity and vulnerability of these systems within US critical infrastructure. For this reason, resilience, affordability, and collaboration between the government and private industry will be imperative in maintaining the cyberspace advantage as cyber threats groups continue to target systems and system-of-systems (SoS) within the Department of Defense (DoD) (Syst Eng 15:95–107; Wheaton MJ (2016) Affordable resilient systems. Engineered resilient systems and system-of-systems. University of Southern California, Olin Hall, Los Angeles, 4 Apr 2016, Lecture). Systems engineering concepts such as trade-space analysis and systems thinking, in concert with an emphasis on resilience at critical system nodes and boundaries, can help reduce system vulnerability when confronted by a constantly adapting cyber landscape. Given the perpetual and rapid evolution of cyber threats due to technological advances and network reliance, designing critical infrastructure systems for survivability is no longer sufficient. This paper identifies current limitations in the nation’s cyber strategy and recommends approaches to fill those gaps.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Exec. Order No. 13010: Critical Infrastructure Protection, 3 C.F.R. (1996)

    Google Scholar 

  2. Exec. Order No. 13636: Improving Critical Infrastructure Cybersecurity, 3 C.F.R. (2013)

    Google Scholar 

  3. Emerging Cyber Threats, Homeland Security Cong., 7 (2016) (testimony of Michael McCaul, R-TX)

    Google Scholar 

  4. Carter A (2015) United States of America. The Department of Defense. The Department of Defense Cyber Strategy. Washington DC, April 2015

    Google Scholar 

  5. Madni AM (2017) Transdisciplinary systems engineering: exploiting convergence in a hyperconnected world, Springer, 2017 January Release

    Google Scholar 

  6. Madni AM, Jackson S (2009) Towards a conceptual framework for resilience engineering. IEEE Syst J 3(2):181–191

    Article  Google Scholar 

  7. Madni AM (2016) Course review. Engineered resilient systems and system-of-systems. University of Southern California, Olin Hall, Los Angeles, 25 Apr 2016, Lecture

    Google Scholar 

  8. Leonard WM (2016) SAE 599 midterm. University of Southern California, 11 Apr 2016

    Google Scholar 

  9. Elkus A (2015) The devastating breach of US government data highlights an illusory cybersecurity paradox. Business Insider. Business Insider, Inc, 18 June 2015

    Google Scholar 

  10. United States of America. Department of Defense. Office of The Secretary of Defense. Department of Defense Cybersecurity Culture and Compliance Initiative (DC3I). By Michael L. Bruhn, General Martin E. Dempsey, and Ash Carter. Washington, DC, 30 Sept 2015

    Google Scholar 

  11. Emerging Cyber Threats, Homeland Security Cong., 7 (2016) (testimony of Jennifer Kolde, Technical Director, FireEye, Inc.)

    Google Scholar 

  12. About the Department of Defense (DoD). U.S. Department of Defense, 27 Aug 2015. Web. http://www.defense.gov/About-DoD

  13. Special Report: Cyber Strategy. U.S. Department of Defense, Apr 2015. Web http://www.defense.gov/News/Special-Reports/0415_Cyber-Strategy

  14. Senate Testimony: Cyber Security as a Strategic Concern. Senate testimony: cyber security as a strategic concern. Headline News, 2 Feb 2012. Web. http://www.infosecisland.com/blogview/19888-Senate-Testimony-Cyber-Security-as-a-Strategic-Concern.html

  15. Office of the Director of National Intelligence. Unclassified statement for the record on the worldwide threat assessment of the US Intelligence Community for the Senate Select Committee on Intelligence, at 8 (Jan 31, 2012)

    Google Scholar 

  16. Department of Defense. Chief Information Officer. DoD strategy for defending networks, systems, and data. 13 Nov 2013

    Google Scholar 

  17. The DoD Cybersecurity Policy Chart. CSIAC – information assurance. 27 Oct 2015. http://iac.dtic.mil/csiac/ia_policychart.html

  18. Madni AM (2016) Resilience concepts and current limitation. Engineered resilient systems and system-of-systems. University of Southern California, Olin Hall, Los Angeles, 25 Jan 2016, Lecture

    Google Scholar 

  19. Rsignia Inc. Rsignia Inc. and Air Force Research Laboratory Enter Agreement to Research Cyber Security Capabilities. PRNewswire, 7 June 2016. http://www.prnewswire.com/news-releases/rsignia-inc-and-air-force-research-laboratory-enter-agreement-to-research-cyber-security-capabilities-582135071.html

  20. Reports Reveal Four Cyber Security Trends–and the Need for Better Cyber Security Training & Awareness. Cybersecurity Bulletin (May 2016)

    Google Scholar 

  21. Rawlins LK (2016) The ‘Big Five’ national cyber security projects. ITWeb Security. 18 May 2016. http://www.itweb.co.za/index.php?option=com_content&view=article&id=152608

  22. Wheaton MJ (2016) Affordable resilient systems. Engineered resilient systems and system-of-systems. University of Southern California, Olin Hall, Los Angeles, 4 Apr 2016, Lecture

    Google Scholar 

  23. Madni AM (2016) Systems thinking. Engineered resilient systems and system-of-systems. University of Southern California, Olin Hall, Los Angeles, 8 Feb 2016. Lecture

    Google Scholar 

  24. Why fireeye: the premier cyber security company that protects you before, during and after a breach. FireEye. Web. https://www.fireeye.com/company/why-fireeye.html

  25. Emerging Cyber Threats, Homeland Security Cong., 7 (2016) (testimony of Michael McCaul, R-TX)

    Google Scholar 

  26. Leonard WM (2016) Introducing resilience into the command and control of joint operations. University of Southern California, 17 May 2016, SAE 599 Final Term Paper

    Google Scholar 

  27. Publication, Joint. 3–0 (1995) Doctrine for joint operations. Joint Chiefs of Staff, Washington, DC

    Google Scholar 

  28. Madni AM (2012) Adaptable platform-based engineering: key enablers and outlook for the future. Syst Eng 15(1):95–107

    Article  Google Scholar 

  29. Clapper JR (2016) United States of America. Office of the Director of National Intelligence. Statement for the Record: Worldwide Threat Assessment of the US Intelligence Community, 9 Feb 2016

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wendy Leonard .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Leonard, W. (2018). Resilient Cyber-Secure Systems and System of Systems: Implications for the Department of Defense. In: Madni, A., Boehm, B., Ghanem, R., Erwin, D., Wheaton, M. (eds) Disciplinary Convergence in Systems Engineering Research. Springer, Cham. https://doi.org/10.1007/978-3-319-62217-0_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-62217-0_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-62216-3

  • Online ISBN: 978-3-319-62217-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics