Chapter One: Introduction Problem and Purpose Focus Chapter Two: The Information Warfare Threat and the MEII Response The Threat The MEII as a Structure or Process Steps of the MEII Process Chapter Three: Vulnerabilities Focus on Evolving Global Command, Control, Communications, and Intelligence Systems Illustrative Vulnerabilities Generic Vulnerabilities Relative Importance of Different Vulnerabilities From Generic to Specific A Concluding Observation Chapter Four: Responsive Security Techniques Heterogeneity Static Resource Allocation Dynamic Resource Allocation Redundancy Resilience and Robustness Rapid Recovery and Reconstitution Deception Segmentation, Decentralization, and Quarantine Immunologic Identification Self-Organization and Collective Behavior Personnel Management Centralized Management of Information Resources Threat/Warning Response Structure Protect, Detect, React From Generic to Specific Chapter Five: Identifying Security Techniques Matching Security Techniques to Vulnerabilities Refining the Applicable Set of Security Techniques Testing Applied Security Techniques Trading Security Off Against Other Valued Attributes Chapter Six: Distribution of Research Effort Approach Results Chapter Seven: Recommendations Use Our Methodology as a Checklist Develop a Test Set of Scenarios Involving IW Attacks Develop Case Studies of Our Proposed Methodology Explore Biological Analogies in More Detail Consider R&D on Survivability Techniques to Fill the Gaps Appendix A. HISTORICAL NOTE ON THE U.S. MINIMUM ESSENTIAL EMERGENCY COMMUNICATIONS NETWORK (MEECN) B. HOW THREATS RELEVANT TO AN MEII DIFFER FROM HACKER NUISANCE ATTACKS C. BIOLOGICAL ANALOGIES FOR INFORMATION SYSTEM SURVIVABILITY D. PRIORITIZATION IN INFORMATION SYSTEMS E. ON DECEPTION F.
MAPPING SECURITY SOLUTION TECHNIQUES TO VULNERABILITIES G. INFORMATION ASSURANCE RESEARCH PROJECTS EXAMINED References ------------------------------------------------------------------------------- -.