In a 2007 memorandum, John Young, Under Secretary of Defense at that time, mandated the use of “competitive prototyping” strategies prior to the System Design and Development phase (Young, 2007). Department of Defense Instruction 5000.02 also includes considerations for prototyping in the...
Insider threats are one of the most damaging threats to modern systems. The ubiquity of cybersecurity problems related to insider threats promoted various solutions over the years. However, effective solutions are undermined by mathematical algorithms and host-based event driven techniques that...