2
2
0
Posted 8 y ago
Responses: 3
Which enemy do we focus on? We are in 5 active wars currently and we haven't learned from our enemies yet? We best tie up in Yemen and Somalia first then buffer Afghanaistan and Iraq and then figure out Russia's next move in the former Soviet territories then you have Syria. Best of luck on that Red Teaming.
(1)
(0)
Those requirements for robustness, need to identified early in the requirements gathering process, not after the product has been developed.
Someone identifies a need for a new capability or an old capability that needs updating, one of the very first steps is making sure you understand all the requirements for that capability. So lets say I need a new radio, first thing I do is talk to everyone who is going to use the radio and find out what they need and what they want in the new radio. Next I look at all the regulatory guidance out there that tells me how the radio has to work and what features it needs to have. There will be a lot of guidance out there when it comes to security features such as frequency hoping rate, what algorithms we need, ect... that is usually as far as it goes. I'm already deep in the developmental process before I can put a working model in the field and let a "Red Team" try to find vulnerabilities. Right now, the earliest that could really happen would be during operational testing which usually takes place shortly before an item is fielded. Even then it's not really why the testing is being conducted, the focus is going to be on the radios ability to meet the requirements that were researched and approved early in the project. The last thing they are going to want to do is identify new requirements.
Someone identifies a need for a new capability or an old capability that needs updating, one of the very first steps is making sure you understand all the requirements for that capability. So lets say I need a new radio, first thing I do is talk to everyone who is going to use the radio and find out what they need and what they want in the new radio. Next I look at all the regulatory guidance out there that tells me how the radio has to work and what features it needs to have. There will be a lot of guidance out there when it comes to security features such as frequency hoping rate, what algorithms we need, ect... that is usually as far as it goes. I'm already deep in the developmental process before I can put a working model in the field and let a "Red Team" try to find vulnerabilities. Right now, the earliest that could really happen would be during operational testing which usually takes place shortly before an item is fielded. Even then it's not really why the testing is being conducted, the focus is going to be on the radios ability to meet the requirements that were researched and approved early in the project. The last thing they are going to want to do is identify new requirements.
(0)
(0)
Read This Next