Notable Technical Inquiries (TIs)

Notable TIs are some of the most recent and impactful research efforts done by CSIAC in response to technical inquiries that were submitted by the cybersecurity and information systems community members. They are intended to give a sampling of the wide range of questions presented and responses produced by CSIAC under the free 4 hours of information research support.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Filter by Article Types

Critical Infrastructure Linkage and Dependency Modeling for Homeland Defense

What existing tools and techniques could be applied to modeling the linkages and dependencies between critical US infrastructure components?

CUI Security Controls: Physical Access Control

Relating to requirement 3.10 in NIST 800-171r1, is it sufficient to have an audit log of physical access with entry events but not exit events?

Security-Conscious Password Behavior From the End-User’s Perspective

How do end-users perceive their own password security practices, and how does this behavior differ from acceptable standards?

Cybersecurity Maturity Model Certification (CMMC): The Road to Compliance

What are the major requirements of the Cybersecurity Maturity Model Certification for DoD contractors and subcontractors?

Privacy Impact Assessment: The Foundation for Managing Privacy Risk

What is the industry standard for performing a privacy impact assessment?

Assessing the Operational System Risk Imposed by the Infrastructure Deployment Pipeline Workflow

What is the operational system risk imposed by the infrastructure deployment pipeline workflow?

Smart Cities, Smart Bases, and Secure Cloud Architecture for Resiliency by Design

How can the smart city concept be applied to military bases, and what security concerns would need to be assessed?

Challenges in Applying the Law of Armed Conflict to Cyberwar

Given the United States-Russian bilateral recommendation from the 47th Munich Security Conference, what are some of the foreseen challenges in applying the law of armed conflict to cyberwar?

Commercially Available Firewalls

Which firewalls are currently available commercially?

Commercially Available Vulnerability Assessment Tools

Which vulnerability assessment tools are currently commercially available?

Current Malware Threats and Mitigation

What are the current malware threats we are facing, and how can we mitigate against them?

Ready to submit a technical inquiry?

Receive free information research on technical topics