Spring 2012

Puzzle Key

Puzzle Key Click here to return to Crosslink Crossword.   Spring 2012 Table of Contents  More »

The Crosslink Crossword

The Crosslink Crossword   Across 2. ________fund baby: rich kid4. Moving sculpture7. One should be designated8. Source, as of water or youth11. The end of the moviemaking12. Copy cash13. Tequila creature16. Overcaffeinated18. Butter or marmalade19. Someone with issues20. Runaway rebel22. Baggage ID23. Toughen up25. SNL send-up27. Unwelcome visit28. Fifties teen dance29. Type of trading Down […]  More »

The Back Page, Cyber Terminology: Toward a Common Lexicon

The Back Page Cyber Terminology: Toward a Common Lexicon Frank Belz   The terms used to describe cyberspace and the conduct of adversarial activities in that arena are often new and colorful word inventions. Sometimes these words derive from preexisting terms and phrases in the field of computer science that have taken on new meaning […]  More »

Crosslink Spring 2012 Contributors

Crosslink Spring 2012 Contributors   Achieving Mission Resilience for Space Systems   Jandria S. Alexander, Principal Director, Cyber Security Subdivision, joined Aerospace in 1992. She leads cyber and information assurance architecture definition, technology assessments, vulnerability and countermeasures experiments, cyber command and control and security engineering and acquisition for DOD, the intelligence community, and civil customers. […]  More »

Bookmarks

Bookmarks Recent Publications, Papers, and Patents by the Technical Staff Publications   L. R. Abramowitz et al., “U.S. Air Force’s SMC/XR SENSE NanoSat Program,” AIAA SPACE 2011 Conference and Exposition (Long Beach, CA, 2011). K. L. Bellman, “Model-Based Design, Engineering, and Development: Advancements Mean New Opportunities for Space System Development,” AIAA SPACE 2011 Conference and […]  More »

Research Horizons

Research Horizons Securing Computer and Data Networks Internet and military data networks are under constant assault by a wide range of cyberattacks. One such attack on the networks of a large U.S. defense contractor demonstrates the magnitude of this problem: Its networks were compromised after adversaries replicated the rotating passwords of RSA-SecurID hardware tokens used […]  More »

Enhancing Customers’ Cyber Situational Awareness

Enhancing Customers’ Cyber Situational Awareness Aerospace Technologists Characterize Advanced Cyber Environments at the Unclassified Aerospace Collaboration Center Aerospace, as the FFRDC for national security space, must continuously develop capabilities to provide unbiased, trusted-agent services to its customers working on the leading edge of technology. The Unclassified Aerospace Collaboration Center (UACC) supports this mission as an […]  More »

Aerospace and the NSA Collaboration on Information Systems Security

Aerospace and the NSA Collaboration on Information Systems Security The Aerospace Corporation has worked closely with the NSA since the 1980s to assess the security of computer information systems and space cryptography equipment. Today, the broader focus is on the protection of critical information and systems with the need to operate through potential cyber incidents. […]  More »

Cyber Challenges in National Security Space

Cyber Challenges in National Security Space Tactics, techniques, and procedures used by the authors of the Stuxnet computer worm that attacked Iran’s nuclear program can be used by advanced persistent threat actors in attacking other targets, including national security space systems. Architects must consider these capabilities as they design and implement modern space systems. Kenneth […]  More »

The Risk Management Framework

The Risk Management Framework In 2002, Congress passed the Federal Information Security Management Act (FISMA). As part of the implementation effort, the National Institute of Standards and Technology released Special Publication 800-37, which replaces the traditional certification and accreditation process with a six-step risk-management framework. The first step is to categorize the information system. Next, […]  More »

Next Page »