Integrating information towards Digital ATM Cyber Situational Awareness Presented By: David M. Petrovich Date:August 28, 2013.

Slides:



Advertisements
Similar presentations
Practical Database Design Methodology and Use of UML Diagrams
Advertisements

Supporting New Business Imperatives Creating a Framework for Interoperable Media Services (FIMS)
Visual Scripting of XML
2009 – E. Félix Security DSL Toward model-based security engineering: developing a security analysis DSML Véronique Normand, Edith Félix, Thales Research.
VERS Development and Thinking Howard Quenault and Nicholas Leask.
Multi-Mode Survey Management An Approach to Addressing its Challenges
The Engine Driving Business Management in Project Centric Environments MAGSOFT INTERNATIONAL LLC.
Mike Goffin and Wesley Shields Approved for Public Release; Distribution Unlimited. Case Number
CCMDB 7.2.
Project presentation Name - Institution The ImREAL project is supported by the European Commission, in the theme ICT-2009 Digital Libraries and technology-enhanced.
Systems Engineering in a System of Systems Context
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
Mike Goffin Who am I? Mike Goffin Lead DeveloperProject Manager Senior Cyber Security Research Engineer The MITRE Corporation.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 4 Slide 1 Software Processes.
Course Instructor: Aisha Azeem
User Centered Design Lecture # 5 Gabriel Spitz.
ÆKOS: A new paradigm for discovery and access to complex ecological data David Turner, Paul Chinnick, Andrew Graham, Matt Schneider, Craig Walker Logos.
Applying MDA in the ATM: A practical approach Teodora Bozheva, Terry Bailey (ESI) Julia Reznik, Tom Ritter (Fraunhofer FOKUS)
Presented to: By: Date: Federal Aviation Administration Enterprise Information Management SOA Brown Bag #2 Sam Ceccola – SOA Architect November 17, 2010.
UML - Development Process 1 Software Development Process Using UML (2)
Software Project Management Lecture # 8. Outline Chapter 25 – Risk Management  What is Risk Management  Risk Management Strategies  Software Risks.
Nurjana Technologies Company Presentation. Nurjana Technologies (NT) is a small business enterprise founded in 2012 and operating in Aerospace and Defence.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
FirstEnergy / Jersey Central Power & Light Integrated Distributed Energy Resources (IDER) Joseph Waligorski FirstEnergy Grid-InterOp 2009 Denver, CO November.
The Engine Driving Purchasing Management in Complex Environments MAGSOFT INTERNATIONAL LLC.
Software Processes Sumber dari : cc.ee.ntu.edu.tw/~farn/courses/SE/ch4.ppt.
1 Process Engineering A Systems Approach to Process Improvement Jeffrey L. Dutton Jacobs Sverdrup Advanced Systems Group Engineering Performance Improvement.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 4 Slide 1 Software Processes.
Introduction to MDA (Model Driven Architecture) CYT.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 10Slide 1 Architectural Design l Establishing the overall structure of a software system.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
Delivering business value through Context Driven Content Management Karsten Fogh Ho-Lanng, CTO.
OOI CI LCA REVIEW August 2010 Ocean Observatories Initiative OOI Cyberinfrastructure Architecture Overview Michael Meisinger Life Cycle Architecture Review.
11 CORE Architecture Mauro Bruno, Monica Scannapieco, Carlo Vaccari, Giulia Vaste Antonino Virgillito, Diego Zardetto (Istat)
1 Introduction to Software Engineering Lecture 1.
L6-S1 UML Overview 2003 SJSU -- CmpE Advanced Object-Oriented Analysis & Design Dr. M.E. Fayad, Professor Computer Engineering Department, Room #283I College.
An Introduction to Software Engineering
March 2004 At A Glance NASA’s GSFC GMSEC architecture provides a scalable, extensible ground and flight system approach for future missions. Benefits Simplifies.
PROAGE PROAGE – PROSESSIAUTOMAATION AGENTTIPOHJAISET INFORMAATIOPALVELUT Agent-Based Information Services for Process Automation Semantic Web.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
11 CORE Architecture Mauro Bruno, Monica Scannapieco, Carlo Vaccari, Giulia Vaste Antonino Virgillito, Diego Zardetto (Istat)
Eurostat SDMX and Global Standardisation Marco Pellegrino Eurostat, Statistical Office of the European Union Bangkok,
August 2003 At A Glance The IRC is a platform independent, extensible, and adaptive framework that provides robust, interactive, and distributed control.
Foundational Program Overview September  2004 Copyright RosettaNet. RosettaNet Foundational Programs Program Overview ProgramPhase InvestigateDesignImplement.
© Drexel University Software Engineering Research Group (SERG) 1 The OASIS SOA Reference Model Brian Mitchell.
Virtual Information and Knowledge Environments Workshop on Knowledge Technologies within the 6th Framework Programme -- Luxembourg, May 2002 Dr.-Ing.
Advisory Services from cdms Management Advisory Services.
Software Engineering, 8th edition. Chapter 4 1 Courtesy: ©Ian Sommerville 2006 FEB 13 th, 2009 Lecture # 5 Software Processes.
Be in the know Visual Intercept Project from Elsinore Technologies David Hershman Regional Sales Manager
EMEA Beat Schwegler Architect Microsoft EMEA HQ Ingo Rammer Principal Consultant thinktecture
March 2004 At A Glance The AutoFDS provides a web- based interface to acquire, generate, and distribute products, using the GMSEC Reference Architecture.
 Copyright 2005 Digital Enterprise Research Institute. All rights reserved. SOA-RM Overview and relation with SEE Adrian Mocan
© 2015 IBM Corporation Introducing. © 2015 IBM Corporation 2 SELF-SERVICE Covers a wide spectrum of users Power users Consumers Creators Level of Management.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
© 2013 TM Forum | 1 V Catalysts and Innovation Projects Rapid Technology Innovation Projects The Hub at Management World 2013.
SysML v2 Model Interoperability & Standard API Requirements Axel Reichwein Consultant, Koneksys December 10, 2015.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 10Slide 1 Chapter 5:Architectural Design l Establishing the overall structure of a software.
National Immunization Conference March 2006 Integrating Immunization Registries with a Disease Surveillance and Management System Michael L. Popovich
Status of SysML v2 Planning & Requirements Berlin, Germany June 16, roadmap:sysml_assessment_and_roadmap_working_group.
Enabling Flexible Laboratory Processes – Designing the Laboratory Information System of the Future
Object-Oriented Analysis and Design
River Information Services Enterprise (RISE)
Software Processes.
FDA Objectives and Implementation Planning
Presentation to the INTOSAI Working Group on IT Audit Systems assurance and data analytics for continued audit quality and improved efficiency of audits.
Engineering Autonomy Mr. Robert Gold Director, Engineering Enterprise
Systems Architecture & Design Lecture 3 Architecture Frameworks
Software Development Process Using UML Recap
Status of SysML v2 Planning & Requirements
Presentation transcript:

Integrating information towards Digital ATM Cyber Situational Awareness Presented By: David M. Petrovich Date:August 28, 2013

1 What will be presented: A “lessons learned” case study involving a Mission Driven, Semantically Enabled and User Defined Cyber Situational Awareness Framework & Implementation.  The Why  The Approach  The What  The Lessons  Conclusion The Presentation

2 The Why – Within a Complex Cyber Domain We need to:  Understand - capture our understanding of the domain  Be aware of - what is occurring at that point in time  Communicate - share, collaborate and disseminate  Anticipate - plan and prepare  React - command & control, mitigate, affect. We base this on:  Information, data and derived data – this is a given  Obvious relationships – easy but critical Non-obvious relationships – this is hard  Non-obvious relationships – this is hard   Obvious consequences – common sense  Unintended consequences – this is really hard

3 The Approach Incremental  Plan, Design, Develop and Deploy “Status Demos”  “Status Demos” – Challenge and validate assumptions and designs.  Socialize and listen – “What do you think ?” “All-Hazards” perspective – It’s all related Integrated models  Integrated models: Physical, Logical, and Social type themes. Standards - Adherence to and awareness of  Comm. protocols, Exchange formats, Enumerations, Controls, etc. Flexible threats  Understanding the evolving missions, threats and domains. Allow the user to define their own needs

4 The What Cyber The Cyber Information System (CIS) is Mission Driven, Semantically Enabled and User Defined. The CIS integrates advanced visualizations, provides automated data ingest from “Data contributors”, includes multi-tool logic, supports complex visual analytics and a “drag and drop” media wall implementation.

5 The What - Cont’d Mission Driven  Multiple visualizations support specific missions Inter-related schema(s) / model(s)  Inter-related schema(s) / model(s) support the execution of complex mission threads. Semantically Enabled  Mission schemas are represented within a Resource Description Framework (RDF) - easily redefined and managed.  Inferred visualizations  Inferred visualizations are linked to specific mission capability needs User Defined  The User Interface (UI) contains tabs or panels that can be “popped- out” and dragged onto an unlimited number of monitors.  An unlimited UI landscape accommodates multiple visualizations that user defined perspectives support user defined perspectives – filter and view data in multiple ways

6 The Lessons “All-Hazards” ingest & structuring mechanism Standards An “All-Hazards” approach requires multiple “Data Contributors” to populate the repository. - The ingest & structuring mechanism should align and leverage, as best as possible, with the available Standards in order to normalize the data and minimize “stove piping”. really context and user dependent commonality is leveraged, Situational Awareness (SA) is context and user dependent - Cyber SA is really context and user dependent, so designing the CIS to be mission neutral and generic seems to be working. Missions that require SA have shared common capabilities, features and data. The commonality is leveraged, which is making for more effective SA. “Linked Data” - “Linked Data” (Semantic Technology) - is extremely powerful. Comparing “Apples to Oranges” can mitigate risk. Identifying non- obvious relationships can more easily uncover the real threats faster.

7 The Lessons - Cont’d Filtering Filtering data – The ability to easily filter and visualize the results effectively and in multiple ways is critical. The means to visualize the filtered data from a users perspective, removes the constraint on who can use the system and how they are going to use it. socializing the concepts vetted Continually socializing the concepts – Rolling vetted concepts into the engineering process improves performance by reducing false starts. Periodic “Status Demos” Periodic “Status Demos” - are excellent for managing expectations. “Linked Data” - “Linked Data” (Semantic Technology) - is extremely powerful. Comparing “Apples to Oranges” can mitigate risk. Identifying non- obvious relationships can more easily uncover the real threats faster.

8 Conclusion The deployed Cyber Information System prototype is intended to support the following sectors: commercial, industrial, institutional and defense. The Cyber Information System enhancements and refinements are continuing. For example, near real-time mission capabilities are currently being added.

Questions 9

Contact Information 10 David M. Petrovich Principal Investigator & Integrated Product Team Lead Cyber Situational Awareness - Cyber Defense, Research & Development. Phone (727)