Cyber Environment Simulation Paper

Improved Essays
The second concern is the RMF and how protecting the network makes it difficult to introduce a cyber environment simulation. Risk Management Framework is the unified information security framework for the entire federal government with the goal to improve information security and strengthen risk management processes (Department of Defense [DoD], 2014). It protects networks and systems from outside vulnerabilities through implementation and constant assessment of security controls. Through the assessment and authorization process, an authorizing official authorizes each network (DoD, 2014). It does not matter the classification nor whether it is an actual or simulation network. This makes it particularly difficult to introduce a system that models adversarial cyber attacks.
Workarounds and a Way Ahead. The challenges addressed make it problematic to add cyber requirements, but not impossible. Ideally, simulation specialists should use computer simulations to create a virtual network that the training audience operates on and presents models for DoS, vulnerability exploitation, virus attacks and a host of other cyber related
…show more content…
In this case, there is no cyber simulation system, but the cyber requirements remain. Some methods used by planners include: shutting down internet services for DoS, or adding bogus entries to a command chat room to replicate network penetration. Although not ideal, it forces the training audience to adjust and move to a secondary communication plan. It, however, does not prepare the Cyber Network Defender and Cyber Operations Specialists embedded in the TOC. Additionally, these low fidelity workarounds provide unrealistic results, “and training audiences quickly lose focus and confidence in the value of their training” (Vonthoff, 2017). So, workarounds are short term fixes. For long term, productive solutions, the Army must alter its current mindset on cyber and its

Related Documents

  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Joint Force 2020

    • 1383 Words
    • 6 Pages

    Issues that pose risk to missions are: “providing sufficient enabling capabilities, building partnership capacity, and securing DoD systems in cyberspace.” In example, an ally or partner’s lack of ability or willingness to support common goals may present an operational risk. When it comes to cyberspace, a failure to secure systems would pose a major risk to operations, personnel, and mission accomplishment. In such cases operational risk may be mitigated through the development of bilateral and multilateral capacity to improve interoperability to protect common interests through security cooperation, agreements, and…

    • 1383 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Few articles have been proven patients and caregiver’s simulation education has a great outcome. Considering, it will help them to be knowledgeable to new skills…

    • 205 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Denial-Of-Service Attack

    • 756 Words
    • 4 Pages

    “Denial-of-Service attacks are the cyber equivalent of vandalism. Rather than seek to break into the target system, the perpetrator simply wishes to render the target system unusable” (Easttom, Taylor, 2011). This type of cybercrime prevents the end users from attaining the resource accessibility. Denial-of-Service is also known as a DOS. An attack was launched in Santa Cruz County website in California that caused “county’s government entities and programs, including Emergency Services, Law Enforcement, the Courts, Social Services, Agricultural Extension, Employment, Surplus Sales, Vendor Registration, and Construction Projects and Proposals”( U.S. Attorney’s Office,2011).…

    • 756 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    full mission simulation, and debriefing. The reflective period after a simulation describes debriefing that involves a discussion of the enacted scenario. The components of debriefing utilizing the Ee-chats includes emotion, experience, communication, higher order of thinking, acceptance of the activity and the time and structure (Billings and Halstead, 2012). Furthermore, locating a significant knowledge deficit among the learners concerning particular aspects of the experience include reviewing the curriculum and determining the area of the knowledge gap (Reed, 2013).…

    • 690 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Capssim Virtual Team

    • 1129 Words
    • 5 Pages

    We felt that some of the threats in using the simulator were possible legal and labor disputes, rapid shift in market supply and demand, and new competition. Upon completion of the simulator competition, our team had some positive take-aways in that we are able to apply theoretical approaches to work practice, reflect on personal, social, and emotional practical issues in working as a team, and are able to develop logical plans to s research in action problem and evaluate the consequences of our decisions as a team. Overall, our team was impressed by the Capsim simulator because it gave us real time, hands on experience to handle a business in all segments, without any real-life risks. In addition, we were able to learn from our mistakes and the program offered us knowledge in order to assist us in successful decision making, teamwork, and to help us to possibly run our own business in the…

    • 1129 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Simulation is a flexible teaching method that can be adopted to meet both the programme requirements and students learning needs. A stimulated environment provides conducive learning that enables students to repetitively practice until competence is attained. One challenge my students had was course overload. With so much information in a short period of time they were unable to link the theory to the practical environment. As such, I have realized it was not the actual learning of the skills that was the problem for the students, it was the application of them.…

    • 252 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Simulation can provide massive amounts of practice with feedback, exposing individuals or teams to realistic situations that in real-world settings would range from the impracticable to the…

    • 1673 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    The world is experiencing rapid changes in the security sector and this has alarmed the United States Army to seek various ways through which it can transform itself to meet the global security needs. More operations have been carried out in the previous decade and therefore this is a clear evidence that global environment is changing and even tighter operations shall be required in the near future. In this regard, the position of the US Army could be best understood using the contemporary operational environment (COE) (Ott & U.S. 2002). COE is basically the operational environment including the composite conditions that influence the employment of the military forces for the sake of the current and the near future. The COE defines the potential…

    • 1114 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Right now I’m going to talk about the first simulation I remember doing. I forget the name of the simulation, but what I don’t forget is what the simulation was about. First off, the simulation took place when I was in 4th grade (closer to the beginning of the year). We got to simulate leaving England and going to the United States of America. The class was separated into groups of four based on our tables.…

    • 298 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    ENGINEERING TECHNICAL DEFINITION PAPER Name Institution Date Annotated bibliography Harknett, R. J. and Stever, J. A. (2011), The New Policy World of Cybersecurity. Public Administration Review, 71: 455–460. doi: 10.1111/j.1540-6210.2011.02366.x…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Test Evaluation Vs Mop's

    • 1020 Words
    • 5 Pages

    Live simulations are enactments or reenactments in real-time by real performers to conduct the event—in T&E, so that the operational effectiveness and suitability of a solution can be determined through the measurements of the parameters associated with the live enactment of events and use of the solution/system. A virtual simulation is similar to a live simulation with the exception that parts of the environment are created and injected into the simulation by artificial means—e.g., a computer program is used to simulate (during the simulation, in real or near-real time) a system’s actions or a portion of the simulation environment during the simulation. Constructive simulations are non-real-time functions (almost exclusively conducted by computers because of the complexity of data manipulation and measurement) that take input associated with the simulation and provide output about the simulation—e.g., take environmental information about the simulation and determine a system’s state and/or output based on that…

    • 1020 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The new technologies have integrated many sectors of combat system industries which needs a high level of qualification. Naomi Verdugo and Nehama E. Babin write in “The Impact of Advanced Technology on the U.S. Military”, that it is mandatory to adapt the skills of manpower to the requirements of new technologies. It will demand greater knowledge and more sophisticated skills than are presently. For instance, computer systems and networks remain advanced technology which is used now in the majority of telecommunication systems thus radically changing the profile of the users of these systems from soldiers to operators. This also will generate the need for skilled personnel in the maintenance sector because of the greater sophistication of new systems.…

    • 1300 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Protecting the Internet is a difficult task. Cybersecurity can be obtained only through systematic development;…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Next the paper will examine whether the national organizational structure tasked with cyber operations needs to be reorganized and subsequently require a change to the United States Code (USC). Finally, the paper will discuss that if a reorganization is required, which agency should be in charge of cyber security for the United States. Cyber Geography The emergence of the cyber domain has been uniquely different than the traditional domains of air, land, and maritime. Theories about both the cyber and space domains have at times been very similar, treating the domains and purely functional rather than having a physical geography.…

    • 1692 Words
    • 7 Pages
    Great Essays