Next Generation Enterprise Network Business Continuity: Maintaining Operations in a Compromised Environment - COOP, Navy, Operation Rolling Tide, Command and Control (C2), Virtualization Technology Next Generation Enterprise Network Business Continuity: Maintaining Operations in a Compromised Environment - COOP, Navy, Operation Rolling Tide, Command and Control (C2), Virtualization Technology

Next Generation Enterprise Network Business Continuity: Maintaining Operations in a Compromised Environment - COOP, Navy, Operation Rolling Tide, Command and Control (C2), Virtualization Technology

    • $5.99
    • $5.99

Publisher Description

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. Operation Rolling Tide, and the events that led up to its initiation, highlighted certain areas in Navy network operations that needed improvement, including maintenance of command and control (C2) of a compromised network. The current continuity of operations plan for NGEN does not detail a contingency providing high-fidelity C2 of the enterprise in the event of an intentional compromise.
Evaluating published literature on virtualization, available technology products currently on the market, and tactics for employing virtualized environments, this research explores whether virtualization is able to provide options allowing network operators to maintain positive C2 during a compromise. It also examines if virtualization will scale appropriately for use in enterprise networks in terms of monetary and manpower costs, and any return on investment that may be realized. Using virtualization technology to create a tailored space capable of collaboration and network modelling provides an option for maintaining secure and useful C2 of the network. The costs involved, if implemented in the current NGEN contract, equate to approximately one-tenth of one percent of the contract award. The primary return on investment is increased readiness.

CHAPTER I - INTRODUCTION * A. CONTINUITY OF OPERATIONS * B. RESILIENCY * 1. Cyber Resiliency Engineering * 2. Resilience Engineering * a. Anticipate * b. Withstand * c. Recover * d Evolve * C. VIRTUALIZATION * 1. Types of Virtualization * a. Server Virtualization * b. Application Virtualization * c. Presentation Virtualization * d. Network Virtualization * e. Storage Virtualization. * 2. Virtualization Security * D. PROBLEM STATEMENT * E. RESEARCH QUESTIONS * F. BENEFITS * G. METHODS * H. LIMITATIONS * I. THESIS ORGANIZATION * 1. Chapter II: Continuity of Operation Strategies * 2. Chapter III Costs of Adopting Virtualization Technology * 3. Chapter IV: Results * CHAPTER II - CONTINUITY OF OPERATIONS STRATEGIES * A. NATURAL DISASTER VERSUS ADVERSARIAL ACTION * 1. Planning for Intentional Disasters * B. DODIN AVAILABLE OPTIONS * 1. Information Operations Condition * 2. Rerouting/Backhauling * 3. Isolation * 4. Alternate Sites * a. Hot Site * b. Warm Site * c. Cold Site * d. Mobile Site * e. Mirrored Site * f. Portable Network Infrastructure * 5. Consolidated Afloat Networks and Enterprise Services * C. VIRTUALIZATION AND COOP * D. VIRTUALIZATION TACTICS AND OPPORTUNITIES * 1. Virtual Maritime Operations Center * 2. Virtual Honeypot * a. Obfuscate * b. Delay * c. Analyze * d. Attribute * E. TACTICS FOR SECURING VIRTUALIZED ENVIRONMENTS DEPLOYED IN THE EVENT OF A COMPROMISE * 1. Virtual DMZ * 2. Moving Target Defense * CHAPTER III - COSTS OF ADOPTING VIRTUALIZATION TECHNOLOGY * A. COSTS * 1. Capabilities * 2. Personnel * a. Users * b. Virtual Network Managers * c. Network Modeler * 3. Organizations * B. AREAS OF INCURRED COST * 1. Up-Front Costs * 2. Facilities and Utilities * 3. Training * C. RETURN ON INVESTMENT * D. RETURN ON KNOWLEDGE * a. Core Areas * b. Difficulty * c. Relative Learning Time * d. Number of Personnel * e. Percentage of Automation * f. Amount of Knowledge Embedded in Automation * g. Total Amount of Knowledge * h. Percentage of Knowledge Allocation * i. Annual Expense * j. Readiness * k. Return on Knowledge * E. DRAWBACKS TO IMPLEMENTING VIRTUALIZATION INTO COOP PLANS * CHAPTER IV - CONCLUSION * A. RESULTS * 1. Is Virtualization Technology a Viable Option for COOP in the Event of a Compromise? * 2. In what Capacity could Virtualization Work to an Advantage in the Stage between Detection and Mitigation? * 3. Will a Virtualized Environment Scale Appropriately? * 4. What Are the Costs of Adopting Virtualization Technology? * B. FUTURE WORK

GENRE
History
RELEASED
2016
October 29
LANGUAGE
EN
English
LENGTH
95
Pages
PUBLISHER
Progressive Management
SELLER
Draft2Digital, LLC
SIZE
208.2
KB

More Books Like This

Cyberspace Command and Control Model: The Nature of Cyberspace, Computer Networks, Information Environment, Internet, Data Manipulation, Legal Authorities, Cyber Attack, Cybernetics, Systems Theory Cyberspace Command and Control Model: The Nature of Cyberspace, Computer Networks, Information Environment, Internet, Data Manipulation, Legal Authorities, Cyber Attack, Cybernetics, Systems Theory
2016
Cybersecurity Risk Management Process for Unmanned Aerial Systems (UAS) at the Strategic Level - Increasing Use of Commercial Off-the-Shelf (COTS), Joint Risk Analysis Methodology (JRAM) Process Cybersecurity Risk Management Process for Unmanned Aerial Systems (UAS) at the Strategic Level - Increasing Use of Commercial Off-the-Shelf (COTS), Joint Risk Analysis Methodology (JRAM) Process
2019
Leveraging Social Networks to Enhance Innovation: Department of the Navy's ATHENA Project, TANG Initiative to Capture New Ideas from Sailors and Officers, Recommendations to Eliminate Barriers Leveraging Social Networks to Enhance Innovation: Department of the Navy's ATHENA Project, TANG Initiative to Capture New Ideas from Sailors and Officers, Recommendations to Eliminate Barriers
2018
WMD Proliferation WMD Proliferation
2009
Dominant Battlespace Knowledge Dominant Battlespace Knowledge
2020

More Books by Progressive Management

21st Century U.S. Military Manuals: Sniper Training - FM 23-10 - Marksmanship, Equipment, Ballistics, Weapon Capabilities, Sniping Techniques (Value-Added Professional Format Series) 21st Century U.S. Military Manuals: Sniper Training - FM 23-10 - Marksmanship, Equipment, Ballistics, Weapon Capabilities, Sniping Techniques (Value-Added Professional Format Series)
2011
21st Century U.S. Military Manuals: U.S. Marine Corps (USMC) Leading Marines - Marine Corps Warfighting Publication (MCWP) 6-11 21st Century U.S. Military Manuals: U.S. Marine Corps (USMC) Leading Marines - Marine Corps Warfighting Publication (MCWP) 6-11
2012
The Smell of Kerosene: A Test Pilot's Odyssey - NASA Research Pilot Stories, XB-70 Tragic Collision, M2-F1 Lifting Body, YF-12 Blackbird, Apollo LLRV Lunar Landing Research Vehicle (NASA SP-4108) The Smell of Kerosene: A Test Pilot's Odyssey - NASA Research Pilot Stories, XB-70 Tragic Collision, M2-F1 Lifting Body, YF-12 Blackbird, Apollo LLRV Lunar Landing Research Vehicle (NASA SP-4108)
2012
U.S. Navy Equipment Encyclopedia: Aircraft, Ships, Weapons, Programs, and Systems - Fighter Jets, Aircraft Carriers, Submarines, Surface Combatants, Missiles, plus the Navy Program Guide U.S. Navy Equipment Encyclopedia: Aircraft, Ships, Weapons, Programs, and Systems - Fighter Jets, Aircraft Carriers, Submarines, Surface Combatants, Missiles, plus the Navy Program Guide
2011
21st Century U.S. Military Manuals: Infantry Rifle Platoon and Squad Field Manual - FM 7-8 (Value-Added Professional Format Series) 21st Century U.S. Military Manuals: Infantry Rifle Platoon and Squad Field Manual - FM 7-8 (Value-Added Professional Format Series)
2011
21st Century Essential Guide to U.S. Navy SEALs (Sea, Air, Land), Special Warfare Command, Special Operations Forces, Training, Weapons, Tactics, Dogs, Vehicles, History, bin Laden Killing 21st Century Essential Guide to U.S. Navy SEALs (Sea, Air, Land), Special Warfare Command, Special Operations Forces, Training, Weapons, Tactics, Dogs, Vehicles, History, bin Laden Killing
2011