HOME

TheInfoList



OR:

Cyber Security and Information Systems Information Analysis Center (CSIAC) is a United States Department of Defense (DoD) Information Analysis Center (IAC) sponsored by the Defense Technical Information Center (DTIC). The CSIAC is a consolidation of three predecessor IACs: the Data & Analysis Center for Software (DACS), the Information Assurance Technology IAC (IATAC) and the Modeling & Simulation IAC (MSIAC), with the addition of the
Knowledge Management Knowledge management (KM) is the collection of methods relating to creating, sharing, using and managing the knowledge and information of an organization. It refers to a multidisciplinary approach to achieve organisational objectives by making ...
and
Information Sharing Information exchange or information sharing means that people or other entities pass information from one to another. This could be done electronically or through certain systems. These are terms that can either refer to bidirectional ''informa ...
technical area. CSIAC, one of three IACs sponsored by DTIC, performs the Basic Center of Operations (BCO) functions necessary to fulfill the mission and objectives applicable to the DoD Research, Development, Test and Evaluation (RDT&E) and Acquisition communities’ needs. These activities focus on the collection, analysis, synthesizing, processing and dissemination of Scientific and Technical Information (STI). The BCO functions, specifically the collection and dissemination of STI, produce several valuable resources (e.g., reports, tool databases, data collections, etc.) in the CSIAC's core technology areas (
Cybersecurity Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, th ...
,
Information Assurance Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information. Information assurance includes protection of the integrity, availability, authenticity, ...
,
Software Engineering Software engineering is a systematic engineering approach to software development. A software engineer is a person who applies the principles of software engineering to design, develop, maintain, test, and evaluate computer software. The term ' ...
,
Modeling & Simulation Modeling and simulation (M&S) is the use of models (e.g., physical, mathematical, or logical representation of a system, entity, phenomenon, or process) as a basis for simulations to develop data utilized for managerial or technical decision maki ...
and
Knowledge Management Knowledge management (KM) is the collection of methods relating to creating, sharing, using and managing the knowledge and information of an organization. It refers to a multidisciplinary approach to achieve organisational objectives by making ...
/
Information Sharing Information exchange or information sharing means that people or other entities pass information from one to another. This could be done electronically or through certain systems. These are terms that can either refer to bidirectional ''informa ...
). CSIAC's mission is to provide the DoD with a central point of access for Information Assurance and Cybersecurity to include emerging technologies in system vulnerabilities, R&D, models and analysis to support the development and implementation of effective defense against information warfare attacks. The CSIAC is chartered to leverage best practices and expertise from government, industry and academia on cyber security and information technology.


History

The United States may be vulnerable to
Information Warfare Information warfare (IW) (as different from cyber warfare that attacks computers, software, and command control systems) is a concept involving the battlespace use and management of information and communication technology (ICT) in pursuit of ...
attacks due to the dependence of various infrastructures on timely and accurate information services. This is further complicated by the reliance of DoD information systems on commercial or proprietary networks that are accessible to both authorized users and potential adversaries. Identifying critical paths and vulnerabilities within the
information infrastructure An information infrastructure is defined by Ole Hanseth (2002) as "a shared, evolving, open, standardized, and heterogeneous installed base" and by Pironti (2006) as all of the people, processes, procedures, tools, facilities, and technology whic ...
is a complex undertaking, and recent advances in
information technology Information technology (IT) is the use of computers to create, process, store, retrieve, and exchange all kinds of data . and information. IT forms part of information and communications technology (ICT). An information technology system ...
have made
information systems An information system (IS) is a formal, sociotechnical, organizational system designed to collect, process, store, and distribute information. From a sociotechnical perspective, information systems are composed by four components: task, people ...
easier to use, less expensive and more available to a wide spectrum of potential adversaries. The security of the nation depends on the
survivability Survivability is the ability to remain alive or continue to exist. The term has more specific meaning in certain contexts. Ecological Following disruptive forces such as flood, fire, disease, war, or climate change some species of flora, fauna, ...
, authenticity and continuity of DoD information systems. These systems are vulnerable to external attacks, due in part to their necessary dependence on commercial systems and the increased use of the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a ''internetworking, network of networks'' that consists ...
. The survivability, authenticity, and continuity of DoD information systems are crucial for the
Warfighter A soldier is a person who is a member of an army. A soldier can be a conscripted or volunteer enlisted person, a non-commissioned officer, or an officer. Etymology The word ''soldier'' derives from the Middle English word , from Old Fre ...
. With the increasing amount of concern and Information Warfare activities requiring rapid responses, it is challenging to ensure that all appropriate agencies and organizations have the knowledge and tools to protect from, react to and defend against Information Warfare attacks. CSIAC has been established under the direction of the
Defense Technical Information Center The Defense Technical Information Center (DTIC, pronounced "Dee-tick") is the repository for research and engineering information for the United States Department of Defense (DoD). DTIC's services are available to DoD personnel, federal govern ...
and the integrated sponsorship of the
Assistant Secretary of Defense for Research and Engineering The Under Secretary of Defense for Research and Engineering, abbreviated USD (R&E), is a senior official of the United States Department of Defense. The USD (R&E) is charged with the development and oversight of technology strategy for the DoD. T ...
(ASDR&E)
Assistant to Secretary of Defense/Networks and Information Integration
and the
Joint Chiefs of Staff The Joint Chiefs of Staff (JCS) is the body of the most senior uniformed leaders within the United States Department of Defense, that advises the president of the United States, the secretary of defense, the Homeland Security Council and t ...
. CSIAC provides centralized Cyber Security vulnerability data, information, methodologies, models, and analyses of emerging technologies to support the survivability, authenticity, and continuity of operation of Information Systems critical to the nation's defense. It serves as a specialized subject focal point, supplementing DTIC services within DoD Directive 3200.12, DoD Scientific and Technical Information Program (STIP), dated February 11, 1998.


Summarized Version

The United States is vulnerable to Information Warfare attacks due to its reliance on timely and accurate information services and recent advances in technology have made it easier for potential adversaries to access critical infrastructure. The security of the nation depends on the survivability, authenticity and continuity of DoD information systems, which are vulnerable to external attacks. CSIAC provides centralized Cyber Security vulnerability data and support to ensure the continuity of critical Information Systems for the nation's defense. # Reliance on Timely and Accurate Information Services: In the modern era, timely and accurate information is crucial for various aspects of society, including government operations, financial systems, and communication networks. This dependence on information systems makes the country vulnerable to attacks that disrupt or manipulate these systems. Disinformation campaigns and cyberattacks on critical infrastructure can have far-reaching consequences. # Advances in Technology: Technological advancements have provided both opportunities and challenges for national security. While technology has improved communication, efficiency, and convenience, it has also opened up new avenues for potential adversaries to exploit vulnerabilities. Cyberattacks can be launched remotely, making it easier for malicious actors to target critical infrastructure without a physical presence. # Security of DoD Information Systems: The Department of Defense (DoD) operates a vast network of information systems that are essential for national defense. These systems contain sensitive and classified information, making them attractive targets for cyberattacks. Ensuring the security, authenticity, and continuity of DoD information systems is paramount to national security. # External Attack Vulnerability: DoD information systems are susceptible to external cyberattacks, including those launched by state-sponsored hackers, cybercriminals, and hacktivists. These attacks can disrupt military operations, compromise classified information, and undermine national defense efforts. # Role of CSIAC: The Cyber Security and Information Systems Information Analysis Center (CSIAC) plays a crucial role in centralizing cybersecurity vulnerability data and providing support to maintain the continuity of critical information systems for national defense. By collecting and analyzing threat intelligence, identifying vulnerabilities, and disseminating best practices, organizations like CSIAC contribute to strengthening the nation's cybersecurity posture. To address these vulnerabilities and threats, the United States employs a multi-faceted approach that includes cybersecurity policies, defense strategies, threat intelligence sharing and investments in technology and personnel. Continuous vigilance, collaboration among government agencies, private sector cooperation and international partnerships are essential to protect against information warfare attacks and ensure national security.


DTIC Realignment and Restructuring

Given the evolving Defense environment, as well as recent congressional guidance, the Defense Technical Information Center (DTIC) recognized an opportunity to reshape the IACs to better respond to DoD mission needs. As a result, DTIC is realigning and consolidating the IAC program structure to achieve several objectives: * Expand the IAC program scope and increase synergy across related technology areas * Increase opportunities for small business * Expand the industrial base accessible through the IACs ''See
United States Cyber Command United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integr ...
'' To achieve these objectives, DTIC is forming new, consolidated IAC Basic Centers of Operation (BCOs). The BCOs are managed by both industry and academia. The DoD establishes IAC BCOs in areas of strategic importance, such as cyber security and information systems. An IAC BCO serves as the center for its technical community, and, as such, must maintain a connection with all of the key stakeholders within that community, to understand ongoing activities, current information, future strategies, and information needs. This mission remains unchanged in the new IAC structure. However, what the new approach brings is expanded scope, increased focus on technical information needs, and enhanced agility, as the Defense environment continues to evolve. BCOs will still analyze and synthesize scientific and technical information (STI). However, they are also to take on an expanded role in program analysis and integration by assessing and shaping nearly $6 billion in Technical Area Tasks (TATs). TATs are a companion offering of the IAC Program, through which DTIC leverages industry and academia's best and brightest to conduct research and analysis, developing innovative solutions to the most challenging requirements. IAC BCOs will ensure consistency with and reduce duplication of prior or other ongoing work by helping to ensure TATs are more responsive both to customer needs and broader DoD imperatives. BCOs are also required to ensure that TAT results are properly documented and made available for broad dissemination. This approach both achieves cost savings and reduces risks, ensuring that in this time of shrinking budgets and evolving requirements, the Defense community leverages all available knowledge to identify and implement innovative solutions.


Creation of CSIAC

The CSIAC BCO represents the first awarded BCO under the new DTIC structure. As its name suggests, CSIAC's main technical focus is on Cyber Security and Information Systems. CSIAC merges the software engineering technology area of the DACS, the modeling & simulation technology area of the MSIAC, and the information assurance technology area of the IATAC together. It will also address two new technology focus areas: knowledge management and information sharing. Additionally, CSIAC will expand into other areas of importance and closely monitor new technologies as they emerge.


Steering Committee

CSIAC operates under the direction of our Government Steering Committee. The committee is made up of 19 individuals from the Government, DoD, and the
research and development Research and development (R&D or R+D), known in Europe as research and technological development (RTD), is the set of innovative activities undertaken by corporations or governments in developing new services or products, and improving existi ...
(R&D) communities, including representation from the Defense Information Assurance Program (DIAP),
Joint Task Force for Global Network Operations A joint or articulation (or articular surface) is the connection made between bones, ossicles, or other hard structures in the body which link an animal's skeletal system into a functional whole.Saladin, Ken. Anatomy & Physiology. 7th ed. McGra ...
(JTF-GNO),
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
(NSA),
Naval Postgraduate School The Naval Postgraduate School (NPS) is a public graduate school operated by the United States Navy and located in Monterey, California. It offers master’s and doctoral degrees in more than 70 fields of study to the U.S. Armed Forces, DOD ci ...
(NPS),
Office of the Secretary of Defense The Office of the Secretary of Defense (OSD) is a headquarters-level staff of the United States Department of Defense. It is the principal civilian staff element of the U.S. Secretary of Defense, and it assists the Secretary in carrying out aut ...
(OSD), and th
Navy Information Operations Command - Norfolk
to name a few. The steering committee meets once a year and provides input and feedback to CSIAC's operations, particularly our information collection and dissemination efforts. Additionally, the topics of the technical reports that CSIAC authors write are dictated by the Steering Committee.


Sponsors

The Cyber Security and Information Systems Information Analysis Center (CSIAC) is a U.S. Department of Defense Information Analysis Center (IAC) sponsored by the
Defense Technical Information Center The Defense Technical Information Center (DTIC, pronounced "Dee-tick") is the repository for research and engineering information for the United States Department of Defense (DoD). DTIC's services are available to DoD personnel, federal govern ...
(DTIC), and
Assistant Secretary of Defense for Research and Engineering The Under Secretary of Defense for Research and Engineering, abbreviated USD (R&E), is a senior official of the United States Department of Defense. The USD (R&E) is charged with the development and oversight of technology strategy for the DoD. T ...
(ASDR&E). CSIAC is hosted b
Quanterion Solutions Incorporated


Team Members

The CSIAC team members consist of a BCO, Tier 1 team members, and Tier 2 team members.


BCO

Quanterion Solutions Incorporated
a small business in
Utica, New York Utica () is a city in the Mohawk Valley and the county seat of Oneida County, New York, United States. The tenth-most-populous city in New York State, its population was 65,283 in the 2020 U.S. Census. Located on the Mohawk River at the foot ...
was awarded the CSIAC contract in fall of 2012.


Tier 1 Team Members



Egis Technologies
Assured Information Security
(AIS)
SRC
*
Syracuse University Syracuse University (informally 'Cuse or SU) is a Private university, private research university in Syracuse, New York. Established in 1870 with roots in the Methodist Episcopal Church, the university has been nonsectarian since 1920. Locate ...
*
George Mason University George Mason University (George Mason, Mason, or GMU) is a public research university in Fairfax County, Virginia with an independent City of Fairfax, Virginia postal address in the Washington, D.C. Metropolitan Area. The university was orig ...
*
The University of Southern California , mottoeng = "Let whoever earns the palm bear it" , religious_affiliation = Nonsectarian—historically Methodist , established = , accreditation = WSCUC , type = Private research university , academic_affiliations = , endowment = $8. ...


Tier 2 team members

In addition to the Tier One team members, the CSIAC team includes Tier Two organizations, that provide reach-back support with subject matter experts (SMEs) that assist with technical inquiries, State-of-the-Art reports (SOARs), and core Analysis Tasks (CATs). The Tier 2 organizations of the CSIAC team include: * Survice Engineering Company * Wet Stone * Aptima * Minerva Engineering * The Griffiss Institute *
State University of New York Institute of Technology The State University of New York Polytechnic Institute (SUNY Polytechnic Institute or SUNY Poly) is a public university with campuses in Marcy and Albany, New York. It is part of the State University of New York (SUNY) system. Founded in 1966 u ...
(SUNY IT) *
Utica College Utica University is a private university in Utica, New York. The university dates back to the 1930s when Syracuse University began offering extension courses in the Utica area. In 2016, the university enrolled 3,084 undergraduate students and ...


Services


Community of Practice

CSIAC's strategy to address the broadened scopes of the three IACs ( DACS, IATAC, MSIAC), as well as the new areas of knowledge management and information sharing is to build and facilitate a
Community of Practice A community of practice (CoP) is a group of people who "share a concern or a passion for something they do and learn how to do it better as they interact regularly". The concept was first proposed by cognitive anthropologist Jean Lave and educat ...
(CoP) for the cyber security and information systems community. The CSIAC website (www.thecsiac.com) provides the infrastructure for the CoP and serves as the catalyst. The CSIAC website is member driven and encourages participation from the CSIAC community supported by CSIAC resources and activities. The website emphasizes unifying CSIAC resources and its members by supporting conversions and collaborations. The CoP supports the entire operation of the CSIAC, including information collection, analysis, and dissemination.


Subject Matter Expert (SME) Network

CSIAC's
Subject Matter Expert A subject-matter expert (SME) is a person who has accumulated great knowledge in a particular field or topic and this level of knowledge is demonstrated by the person's degree, licensure, and/or through years of professional experience with the s ...
(SME) Network is one of the most valuable resources to the user community. They provide a wealth of knowledge and information to the center through a variety of means. For example, SMEs are the main contributors of journal articles and webinar presentations. They are also available to respond to inquiries, assist with State-of-the-Art reports (SOARs), and perform research and analysis to support Core Analysis Tasks (CATs).


SME qualifications

CSIAC SMEs are those individuals who are considered to be experts in the fields that fall within the CSIAC's technical domain (i.e., cybersecurity, information assurance, software engineering, Modeling & Simulation, and Knowledge Management/Information Sharing). No single criterion provides the basis for being considered an expert, but instead it is based on a combination of factors, including an individual's: * Education (i.e., undergraduate, graduate and doctoral degrees) * Work experience (years in the field, positions held, past programs, etc.) * Publications The database consists of a wide range of SMEs from various backgrounds. Among those are members of the CSIAC's technical staff, key individuals from team member organizations, retired senior military leaders, leading academic researchers, and industry executives.


Technical inquiries

The CSIAC provides up to four hours of free technical inquiry research to answer users’ most pressing technical questions. Technical inquiries submitted online are sent directly to an analyst who identifies the staff member, CSIAC team member, or Subject Matter Expert (SME) that is best suited to answer the question. The completed response will be sent to the user, and can take up to 10 working days; though they are typically delivered sooner.


Core Analysis Task (CAT) program

Challenging technical problems that are beyond the scope of a basic inquiry (i.e., require more than four hours of research) can be solved by initiating a Core Analysis Task (CAT). CATs are separately funded work efforts over and above basic CSIAC products and services. Through the CAT program, the CSIAC can be utilized as a contracting vehicle, enabling the DoD to obtain specialized support for specific projects. These projects, however, must be within the CSIAC's technical domain (cybersecurity, Information Assurance, Software Engineering, Modeling & Simulation, and Knowledge Management/Information Sharing). Some of the advantages of the IAC CAT program include: * Minimal start-work delay – Not only does the CSIAC provide DoD and other agencies with a contract vehicle, but it is also a pre-competed single award CPFF IDIQ. Work can begin on a project in as little as 4–6 weeks after the order is placed. * Expansive Technical Domain – the CSIAC's broad scope (Cybersecurity, Information Assurance, Software Engineering, Modeling & Simulation and Knowledge Management/Information Sharing) provides numerous resources for potential projects, and is especially valuable for efforts that cross multiple domains. * Subject Matter Expert (SME) Network – The CSIAC is able to leverage reach-back support from its expansive SME Network, including technical experts from the CSIAC staff, team members, or the greater community, to complete CATs and other projects. * Scientific and Technical Information (STI) Repositories – As a consolidation of three predecessor IACs, the CSIAC has a wealth of data and information to support the completion of CATs. * Apply the Latest Findings – Draw from the most recent studies performed for agencies across the DoD, as the results from all CSIAC CATs and SNIM Technical Area Tasks (TATs) are collected, stored and used to support future efforts by the CSIAC.


Scientific and Technical Information (STI) Program

CSIAC collects IA/DIO related STI to share with the DoD, other federal agencies, their contractors, and the research and engineering (R&E) community. The STI program is governed by DoD Directive 3200.12, DoD STI Program. CSIAC has thousands of IA/DIO-related documents in their technical repository. This collection is a combination of both classified and unclassified material. All of CSIAC's documents are uploaded t
DTIC Online Access Control (DOAC)
which is an online repository of STI from all of DTIC's IAC's. CSIAC's library facilitates knowledge sharing between diverse groups and organizations, and all STI is readily accessible to the IA/DIO community within the classification and secondary distribution instructions. All STI collected by CSIAC is relevant to IA/CS research, development, engineering, testing, evaluation, production, operation, use, or maintenance. STI is collected in many forms including text-based documents, multimedia, and rich media files. Some topic areas include:
Biometrics Biometrics are body measurements and calculations related to human characteristics. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify ...
, Computer Network Attack, Computer Network Defense,
Cyber Terrorism Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Acts of deliberate, la ...
, Hacking,
Information Warfare Information warfare (IW) (as different from cyber warfare that attacks computers, software, and command control systems) is a concept involving the battlespace use and management of information and communication technology (ICT) in pursuit of ...
,
Network-centric Warfare Network-centric warfare, also called network-centric operations or net-centric warfare, is a military doctrine or theory of war that aims to translate an information advantage, enabled partly by information technology, into a competitive advant ...
,
Malicious Code Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depr ...
, Product Evaluations, among others. CSIAC collects unclassified submissions from across all of the IA/CS community.


Events Calendar

The CSIAC maintains an online calendar of events related to the interests of its members. The Events Calendar is also available as an RSS feed or a HTML viewable from the CSIAC website.


Products


S2CPAT

Software & Systems Cost & Performance Analysis Toolkit (S2CPAT)
is a web-based toolkit with the goal of capturing and analyzing software engineering data from completed software projects that can be used to improve: * the quality of software–intensive systems * the ability to predict the development of software–intensive systems with respect to effort and schedule S2CPAT currently allows users to search for similar software projects and use the data to support: * Rough order of magnitude estimates for software development effort and schedule * Project planning and management: life cycle model information, key risks, lessons learned, templates, estimation heuristics * Software engineering research The S2CPAT repository contain
Software Resources Data Report (SRDR)
data provided by the US Air Force. This data has been sanitized for public release by DoD and validated by a DoD-funded academic research team.


Reports

CSIAC publishes three types of reports on current Cyber Security and Information Systems topics: # State-of-the-art Reports (SOAR) investigate developments in IA issues. Past SOAR topics include: Insider Threat, Software Security Assurance, Risk Management for the Off-the-Shelf Information Communications Technology Supply Chain, and Measuring Cyber Security and Information Assurance. # Critical Reviews and Technology Assessments (CR/TA) evaluate and synthesize the latest available information resulting from recent R&D findings. They offer comparative assessments of technologies and/or methodologies based on specific technical characteristics. Topics include Wireless Wide Area Network (WWAN) Security, Network-Centric Warfare, and
Biotechnology Biotechnology is the integration of natural sciences and engineering sciences in order to achieve the application of organisms, cells, parts thereof and molecular analogues for products and services. The term ''biotechnology'' was first used b ...
. # Tools Reports outline a current technology and provide an objective listing of currently available products. Topics for tools reports include firewalls,
vulnerability assessment A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system. Examples of systems for which vulnerability assessments are performed include, but are not limited to, informati ...
,
Intrusion Detection System An intrusion detection system (IDS; also intrusion prevention system or IPS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically rep ...
s, and
malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, de ...
.


Journal

CSIAC's ''Journal of Cyber Security & Information Systems'' is a quarterly technical journal written from a DoD perspective and contains the following: synopses and critiques of significant, newly acquired reports and/or journal articles; summaries of the initiation of new R&D programs; listing or calendar of future conferences, symposia, etc.; and summaries of significant technological breakthroughs and significant new technological applications and highlights of any other outstanding developments. News from various DoD CSIAC programs that would be of interest to other DoD organizations may also be included. The journal is distributed in print and electronic format to registered CSIAC subscribers free of charge and is available for viewing and download from the CSIAC website. Journal sources are direct invitations, publishing "Call for Papers", and unsolicited submissions. Direct invites are the most common method, usually by contacting conference presenters and asking if they could write something based on their presentation. Authors are solicited for their expertise or experience relative to the theme of the journal issue.


IA Digest

The CSIAC's Information Assurance (IA) Digest is a semi-weekly news summary for information assurance and software reliability professionals protecting the
Global Information Grid The Global Information Grid (GIG) is a network of information transmission and processing maintained by the United States Department of Defense. More descriptively, it is a worldwide network of information transmission, of associated processes, a ...
(GIG). It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cyber security, information assurance, and information systems topics.


Webinars


References

{{Reflist


External links


CSIAC Home Page

DoD Information Analysis Center Home Page



DoD Chief Information Officer Home Page

Korean War Air Loss Database
United States Department of Defense Computer security organizations Cyberwarfare in the United States