Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Practical Industrial Control System (ICS) Cybersecurity: IT and OT Have Converged – Discover and Defend Your Assets

More than half of respondents to a recent Industrial (Internet of Things) IoT security survey use connected devices in Industrial…

Applying Cyber Threat Intelligence to Industrial Control Systems

THE PURPOSE OF CYBER THREAT INTELLIGENCE (CTI) IS TO HELP PROTECT NETWORK INFRASTRUCTURES. Threat intelligence platforms (TIPs) have been created…

Gaining Endpoint Log Visibility in ICS Environments

Security event logging is a base IT security practice and is referenced in Industrial Control Security (ICS) standards and best…

Data Manipulation: Attacks and Mitigation

Confidentiality, Integrity, and Availability In terms of cybersecurity, the Confidentiality, Integrity, and Availability, also known as the CIA Triad, is…

Artificial Intelligence: The Next “Nuclear Arms Race” – “Space Race to the Edge”

Figuring out where and how Artificial Intelligence (AI) and its various sub-types (Machine Learning, Deep Learning, etc.) fit into our…

Staying Ahead of the Race – Quantum Computing and Cybersecurity

Cryptography is an integral part of a cybersecurity professional’s toolkit. It is used for Confidentiality, Integrity, Non-repudiation and more. Cryptosystems…

Features and Operation of an Autonomous Agent for Cyber Defense

An ever-increasing number of battlefield devices that are capable of collecting, processing, storing, and communicating information are rapidly becoming interconnected….

Cloud Security Monitoring With AI-ML Infused Technologies

This article discusses how to apply security log monitoring capabilities for Amazon Web Services (AWS) Infrastructure as a Service (IaaS)…

Reducing Your Digital Footprint

Every activity a person carries out on the Internet leaves behind a trail of data commonly known as a digital…

Launching Innovation through Medical Modeling and Simulation Technologies

The field of medical simulation originated in ancient times, where simple models of human patients were portrayed in clay and…

5th Generation (5G) Technology Explained

How would you like to download a 2GB movie in six seconds or less? Well, this next-generation wireless technology will…

What is Malvertising?

Malvertising is a malicious form of online advertisement used to inject malware into legitimate online advertising networks and webpages. Advertisements…