Summaries - Office of Research & Innovation
Back Fleet Cyber Strategic Deterrence Studies
|Division||Graduate School of Operational & Information Sciences|
Runde, Sharon M.
Boger, Dan C.
|Sponsor||U.S. Fleet Cyber Command /U.S. Tenth Fleet (Navy)|
Purpose: The Naval Postgraduate School (NPS) – Cyber Academic Group (CAG) is pleased to offer this proposal to support the U.S. Fleet Cyber Command/U.S. Tenth Fleet for cyber strategic deterrence studies. These studies will involve an interdisciplinary approach which is at the core of the cyber environment including opportunities as well as vulnerabilities. Studies may address the broad range of the potential threats that demand a comprehensive, multidisciplinary approach to cyber operations education and research. The Cyber Academic Group’s composition reflects this diversity and includes participating faculty from departments including Computer Science, Defense Analysis, Electrical and Computer Engineering, Information Sciences, Mathematics, and Operations Research.
Background: The NPS CAG has a long and distinguished background in complex research and education for the Department of Defense (DoD) as well as the National Security Agency (NSA). As an independent third party, the NPS CAG group has four track-specific Master’s programs in Cyber Systems and Operations (CSO) as well as multiple graduate certificate programs that are offered in residence and via distance learning. Under the CSO Master’s degree, the following tracks are available: Master of Science in Systems and Operations Track, Master of Science in Computer Science, Master of Science in Electrical Engineering, or Master of Science in Engineering Science.
To coordinate and manage the research, the NPS CAG will oversee the research activities as the central entity for cyber activities conducted for U.S. Fleet Cyber Command/U.S. Tenth Fleet with a central vision in mind. The CAG Chair or designee will be the central point of contact for periodic reviews and progress on deliverables.
The NPS CAG has a broad range of personnel that have extensive military and academic credentials. This unique combination of military and academic credentials provides for a higher level of understand for the technology assessed as well as its military utility.
|Keywords||Cyber Deterrence Modification SATCOM-denied Strategic Strategy ingestion signatures vulnerabilities|
|Publications||Publications, theses (not shown) and data repositories will be added to the portal record when information is available in FAIRS and brought back to the portal|
|Data||Publications, theses (not shown) and data repositories will be added to the portal record when information is available in FAIRS and brought back to the portal|