What existing tools and techniques could be applied to modeling the linkages and dependencies between critical US infrastructure components?
Notable TIs are some of the most recent and impactful research efforts done by CSIAC in response to technical inquiries that were submitted by the cybersecurity and information systems community members. They are intended to give a sampling of the wide range of questions presented and responses produced by CSIAC under the free 4 hours of information research support.
Relating to requirement 3.10 in NIST 800-171r1, is it sufficient to have an audit log of physical access with entry events but not exit events?
How do end-users perceive their own password security practices, and how does this behavior differ from acceptable standards?
What are the major requirements of the Cybersecurity Maturity Model Certification for DoD contractors and subcontractors?
What is the industry standard for performing a privacy impact assessment?
What is the operational system risk imposed by the infrastructure deployment pipeline workflow?
How can the smart city concept be applied to military bases, and what security concerns would need to be assessed?
Given the United States-Russian bilateral recommendation from the 47th Munich Security Conference, what are some of the foreseen challenges in applying the law of armed conflict to cyberwar?
Which vulnerability assessment tools are currently commercially available?
Ready to submit a technical inquiry?
Receive free information research on technical topics