Advanced search Help
Searching for terms: EXACT: "Yannakogeorgos, Panayotis A." in: author
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Human Side of Cyber Conflict: Organizing, Training, and Equipping the Air Force Cyber Workforce
"On 18 March 2013, the chief of staff of the Air Force tasked the Air Force Research Institute (AFRI) to review the training and development of the USAF cyber forces to take stock of current Air Force cyber force development. AFRI was to determine whether structural changes were required to ensure the successful organizing, training, and equipping of the Air Force's cyber workforce. This study is the culmination of research AFRI conducted to examine the USAF's cyber human capital planning and management strategies and to recommend improvements where needed. The goal of this study was to examine how we should recruit, educate, train, and develop cyber operators from the time they are potential accessions until they become senior leaders in the enlisted and officer corps."
Air University (U.S.). Press
Yannakogeorgos, Panayotis A.; Geis, John P., II
2016-06
-
Acquiring Secure Systems Through Information Economics
From the Introduction: "For all future weapons systems that DoD will acquire or procure, DoD will mandate specific cybersecurity standards for weapons systems to meet. Acquisition and procurement policy and practice will be updated to promote effective cybersecurity throughout a system's life cycle."
Air University (U.S.). Air Force Research Institute
Dacus, Chad; Yannakogeorgos, Panayotis A.
2015-05
-
Strategies For Resolving The Cyber Attribution Challenge
From the Executive Summary: "Malicious cyber actors exploit gaps in technology and international cybersecurity cooperation to launch multistage, multi-jurisdictional attacks. Rather than consider technical attribution the challenge, a more accurate argument would be that 'solutions to preventing the attacks of most concern, multi-stage multi-jurisdictional ones, will require not only technical methods, but legal/policy solutions as well.' Deep understanding of the social, cultural, economic, and political dynamics of the nation-states where cyber threat actors operate is currently lacking. This project aims to develop a qualitative framework to guide US policy responses to states that are either origin or transit countries of cyber attacks. [...] Identifying the gaps in international cooperation and their socioeconomic and political bases will provide the knowledge required to support our partners' cybersecurity and contribute to building a cyber environment less hospitable to misuse. It will also help US policy makers to determine the appropriate escalation of diplomatic and defensive responses to irresponsible countries in cyberspace. Further research and discussion will likely enable the timely development of the response frame-work for US sponsorship of sound global norms to guide global cybersecurity. This will also assist the US defense, diplomatic, and development communities in building consensus, leveraging resources to enhance global cybersecurity, and coordinating US global outreach to those countries most beset by cyber crime and conflict."
Air University (U.S.). Air Force Research Institute
Yannakogeorgos, Panayotis A.
2013-05
-
Internet Governance and National Security
"The organizing ethos of the Internet founders was that of a boundless space enabling everyone to connect with everything, everywhere. This governing principle did not reflect laws or national borders. Indeed, everyone was equal. A brave new world emerged where the meek are powerful enough to challenge the strong. Perhaps the best articulation of these sentiments is found in 'A Declaration of Independence of Cyberspace.' Addressing world governments and corporations online, John Perry Barlow proclaimed, 'Your legal concepts of property, expression, identity, movement, and context do not apply to us. They are all based on matter, and there is no matter here.' Romanticized anarchic visions of the Internet came to be synonymized with cyberspace writ large. The dynamics of stakeholders involved with the inputs and processes that govern this global telecommunications experiment were not taken into account by the utopian vision that came to frame the policy questions of the early twenty-first century. Juxtapose this view with that of some Internet stakeholders who view the project as a 'rational regime of access and flow of information, acknowledging that the network is not some renewable natural resource but a man-made structure that exists only owing to decades of infrastructure building at great cost to great companies, entities that believe they ultimately are entitled to a say.'"
Air University (U.S.). Press
Yannakogeorgos, Panayotis A.
2012
1