Vic ictory ry Over and Across Domains: Training for Tomorrow’s Battlefie ields SENEDIA March Tech Talk: Women in Science and Engineering Jennifer McArdle Salve Regina University Center for Strategic and Budgetary Assessments Image from: Army News Service
What’s After Joint? Image from: Army University Press
LVC Training
The Battle for Information Control
From Information Assurance to Mission Assurance Two overarching factors determine the impact of a cyber or informationized attack on a military system: 1. System degradation 2. Mitigation measures Image from: Software Engineering Institute, Carnegie Mellon University
Current Training for a Contested and Complex Battlespace LVC Scenario: Image from CAE
The Chall llenges Associated wit ith Modelin ing and Sim imula latin ing the Effects of a Cyber Attack on a Mil ilit itary ry System
Current Training for Integrated Operations
Initial Integrated Multi-Domain Training Environments Cyber Kinetic Effects Integrator: Images from Carnegie Mellon University, Software Engineering Institute
Simulating • Confidentiality: Preventing Unauthorized Access Cyber and and Disclosure of Information • Integrity: Guarding Against Adversarial Information Informationized Modification or Destruction Effects for • Availability: Ensuring Timely and Reliable Access to Information Tactical Training
Simulating Adversarial Cyber and Informationized Operations for Scenario Development
Training Scenarios for the Test and Evaluation of Integrated Synthetic Training Architectures Cyber Operational Architectural Training System (COATS) High Level Operational Concept Graphic
For inquiries and information: jennifer.mcardle@salve.edu
Recommend
More recommend