You are here

SACURE: Situational Awareness for Cyber-secURity Evaluation and training

Award Information
Agency: Department of Defense
Branch: Army
Contract: W911NF-13-C-0058
Agency Tracking Number: O12B-T08-2016
Amount: $100,000.00
Phase: Phase I
Program: STTR
Solicitation Topic Code: OSD12-T08
Solicitation Number: 2012.B
Timeline
Solicitation Year: 2012
Award Year: 2013
Award Start Date (Proposal Award Date): 2013-04-15
Award End Date (Contract End Date): 2013-10-15
Small Business Information
15400 Calhoun Drive Suite 400
Rockville, MD -
United States
DUNS: 161911532
HUBZone Owned: No
Woman Owned: Yes
Socially and Economically Disadvantaged: No
Principal Investigator
 Robert Pokorny
 Director, Education and Training
 (301) 294-4750
 bpokorny@i-a-i.com
Business Contact
 Mark James
Title: Director, Contracts and Proposals
Phone: (301) 294-5221
Email: mjames@i-a-i.com
Research Institution
 The University of Utah
 Miriah Meyer
 
College of Architecture 375 S 1520 E Rm 225
Salt Lake City, UT 84112-0370
United States

 (801) 581-8254
 Nonprofit College or University
Abstract

The Department of Defense and owners of large, commercial enterprise networks need excellent tools and well trained personnel to enforce cyber-security and counter cyber-attacks. This proposal focuses on supporting security personnel to have great Situational Awareness and training to help them use next generation cyber-security tools. In collaboration with University of Utah researchers with experience in cyber-security, interface design, and visualizations of large, heterogeneous data, we will develop and enhance many features of a next-generation cyber-security tool to improve analysts'and managers'performance. Our approach includes leveraging prior Cognitive Task Analyses of cyber-security personnel (1) to design interfaces that support personnel work-flow and (2) to provide visualizations of the networks that enable users to develop Situational Awareness of the security of their networks. We will create embedded assessment and training systems so that users can practice their capabilities before they must defend against real attacks. Our approach combines (a) existing CTA of cyber security personnel; (b) a state-of-the-art cyber-security tool that will be refined to enhance the capabilities of its users; (c) research-based design and visualization capabilities;(d) innovative user analysis methods; and (e) assessment and training systems that have been proven effective and efficient across many domains and applications.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government