Home > Open Access Journals > JSS > Vol. 4 > Volume 4, No. 2, Summer 2011: Strategic Security in the Cyber Age
Author Biography
Dr. Kamal T. Jabbour, ST, (B.E. Electrical Engineering with Distinction, American University of Beirut; Ph.D. Electrical Engineering, University of Salford), a member of the scientific and technical cadre of senior executives, is the Air Force Senior Scientist for Information Assurance, Information Directorate, Air Force Research Laboratory, Rome, N.Y. He serves as the principal scientific authority and independent researcher in the field of information assurance, including defensive information warfare and offensive information warfare technology. He conceives, plans, and advocates major research and development activities, monitors and guides the quality of scientific and technical resources, and provides expert technical consultation to other Air Force organizations, Department of Defense and government agencies, universities, and industry. Dr. Sarah L. Muccio (B.S. Mathematics, Summa Cum Laude, Youngstown State University; M.S., Ph.D. Applied Mathematics, North Carolina State University) is a mathematician for the Cyber Science Branch of the Information Directorate, Air Force Research Laboratory, Rome, NY. In the field of information assurance, Dr. Muccio works with scientists to mathematically model systems and analyze information. She conducts research on emerging technologies and maps mission-essential functions to their cyber assets. Dr. Muccio enjoys educating future cyber security leaders through several Syracuse University graduate courses that she co-created, as well as through the Advanced Course in Engineering (ACE) program.
DOI
http://dx.doi.org/10.5038/1944-0472.4.2.4
Abstract
The intent of this article is to describe—and prescribe—a scientific framework
for assuring mission essential functions in a contested cyber environment.
Such a framework has profound national security implications
as the American military increasingly depends on cyberspace to execute
critical mission sets. In setting forth this prescribed course of action, the
article will first decompose information systems into atomic processes
that manipulate information at all six phases of the information lifecycle,
then systematically define the mathematical rules that govern mission
assurance.
Recommended Citation
Jabbour, Kamal , Ph.D. and Muccio, Sarah , Ph.D.. "The Science of Mission Assurance." Journal of Strategic Security 4, no. 2 (2011)
: 61-74.
DOI: http://dx.doi.org/10.5038/1944-0472.4.2.4
Available at:
https://digitalcommons.usf.edu/jss/vol4/iss2/5