skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 228123 Find in a Library
Title: Exercising CyberSecurity
Corporate Author: National Law Enforcement and Corrections Technology Center (NLECTC)
United States of America
Date Published: 2009
Page Count: 2
Sponsoring Agency: National Institute of Justice (NIJ)
Washington, DC 20531
National Law Enforcement and Corrections Technology Center (NLECTC)
Gaithersburg, MD 20879
Grant Number: 2005-MU-CX-K077
Sale Source: National Law Enforcement and Corrections Technology Center (NLECTC)
700 N. Frederick Ave.
Bldg. 181, Room 1L30
Gaithersburg, MD 20879
United States of America
Document: PDF
Type: Program/Project Description
Format: Document
Language: English
Country: United States of America
Annotation: This paper describes two tabletop exercises in how to address computer-related security incidents (“cybersecurity”).
Abstract: The two tabletop training exercises were entitled Intrusion Forensic Experiment 1 (IFX 1) and Intrusion Forensic Experiment 2 (IFX 2). In IFX 1, developers created a fictitious credit union, including employees, a Web site, a network diagram, and information technology policies and procedures such as an incident response plan, acceptable network usage policy, and an operations manual. IFX 1 was a heavily scripted exercise that had strategically placed decisions for each participant. In IFX 2, the scenario took on a more free-flowing form. The primary objectives of IFX 2 included raising the awareness level of the participants regarding insider threats, developing and strengthening relationships with and among law enforcement agencies, emphasizing the importance of indications and warnings in identifying cybersecurity issues and stressing the importance of defense in depth, as well as total enterprise/agency security. IFX 2 also had secondary objectives of increasing awareness related to malware capabilities, technology exploitation, insider threats, security countermeasures, and the need for strong audits and awareness programs. Participants and observers represented the Air Force Research Laboratory/Information Directorate, the FBI, the U.S. Secret Service, and the Utica (New York) Police Department, in addition to private sector and academia representatives.
Main Term(s): Police simulation training
Index Term(s): Computer crime investigative Training; Computer related crime; Computer security training
Note: Reprinted from the Summer 2008 edition of TechBeat; downloaded August 24, 2009.
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.