MITRE
About
Corporate Overview
Our History
Mission and Values
Visiting MITRE
Leadership
Executive Team
Board of Trustees
Fellows
Technical Fellows
Visiting Fellows
Awards and Recognition
Corporate Social Responsibility
Building a Foundation for the Future
MITRE Staff Cultivates Los Angeles' Science Ecosystem
Bringing Real World STEM to Students
Building Partnerships and Diversity, One Engineering Conference at a Time
How a Can of Soda Changed a Cafeteria Design
How to Grow Computer Scientists? Start with Kindergartners
MITRE Participates in Outside the Box Day
A Conference Dedicated to Women's Leadership
Nurturing Under-Represented Engineering Students
Young Women and Engineering
Connecting with Our Sponsor Communities
Student Cadets Learn What It Takes to "Play at Work All Day"
A Fishing Experience for Disabled Vets
The Undersea World of Frank Lewis
Promoting a Culture of Health and Wellness
A Clothing Drive That Never Ended
Enriching the Communities Where We Live
Fighting Polio in Africa, Thanks to MITRE's Civic Leave Program
Building a Better World, One Home at a Time
Our Green Buildings
Rolling Up Their Sleeves
Culture of Knowledge Sharing
Locations and Directions
Contact Us
General Inquiries
Centers
We Operate FFRDCs
Special Access for Cities and States
National Security Engineering Center
Who We Are
History and Awards
Where We Focus
Delivering Mission-Critical Capabilities
Solving Global Information Challenges
Integrating Solutions Across Government
Creating Transformational Technologies
Who We Hire
What's New
Center for Advanced Aviation System Development
Who We Are
History
Awards
Where We Focus
Transforming the National Airspace System (NextGen)
Improving National Airspace System Performance
Aviation Safety
Global Aviation
Aviation Research and Development
Transforming Transportation
Participate in Aviation Research
Who We Hire
What's New
Center for Enterprise Modernization
Who We Are
Where We Focus
Tax, Revenue & Financial System Transformation
Fraud, Compliance & Financial Integrity
Economic Infrastructure Modernization & Protection
Veterans Health & Benefits Modernization
Who We Hire
What's New
Homeland Security Systems Engineering and Development Institute
Who We Are
The HSSEDI Difference
Engage With Us
Where We Focus
Prevent Terrorism
Secure and Manage Borders
Enforce and Administer Immigration Laws
Safeguard and Secure Cyberspace
Strengthen National Preparedness and Resilience
Mature and Strengthen Homeland Security
Who We Hire
What's New
CMS Alliance to Modernize Healthcare
Who We Are
Where We Focus
Who We Hire
What's New
National Cybersecurity FFRDC
Who We Are
Where We Focus
Capabilities
Overview
MITRE Labs
Technical Fellows
Horizon Strategy
Center for Strategic Competition
Telecommunications
Systems Engineering
MITRE’s Systems Engineering Role
Fellowship FAQs
Overview
SE Resources
Collaborations
System of Systems Engineering Collaborators Information Exchange
Cybersecurity
Overview
Cyber Connections and Directions
Thinking Forward
Thinking Forward: Cyber Defense
Thinking Forward: CyberPhysicalHuman World
Cybersecurity Resources
Awareness & Training
Standards
Tools
What's New
Cyber Threat Intelligence
Situation Awareness
Resiliency
Securing Civil Space
Threat-based Defense
Partnership
Operational Innovation
Acquisition Effectiveness
Overview
Acquisition Management
Cost Analysis
Contracting
Acquisition Initiatives
Affordability Engineering Framework
Continuous Competition
Agile Acquisition
Challenge Based Acquisition
The Science of Acquisition
Enhanced Scenario Based Method
Advanced Technologies
Overview
Information Systems
Cloud Computing
Privacy
Service-Oriented Architecture
Social Software & Collaboration
Signal Processing
Mobile Technologies
Data Science and Analytics
Research
Overview
What's New
Mission-focused Research
Agile Connected Government
Aviation and Transportation
Cyber
Decision Science
Nudge Lab
Nudge Studies in Action
Nudge FAQs
Health
Clinical Analytics for Healthcare
National Security Next
Nanotechnology
Research and Development
Nanosystems Student Programs
Sensing, Processing, and Exploitation
Technology Futures
Technology Transfer
Technology Licensing
FastLicense
Patents
Open Source Software
Partnerships & Collaboration
MITRE Challenge
MITRE Challenge Eligibility Verification
Eligibility Verification FAQs
MITRE Challenge IoT
IoT Leaderboard
IoT FAQs
MITRE Challenge UAS
UAS Challenge Finalists
UAS Challenge Eligibility Overview
UAS Challenge Components
UAS Challenge Details
UAS Challenge Submission Details
UAS FAQs
Surface to Space
Research and Related News
Surface to Space Architecture
Space Policy Podcast
Center for Data-Driven Policy
Careers
Working at MITRE
Valuing Diversity
Collaboration and Innovation
Benefits
Professional Development
Work-Life Balance
Employee Voices
Student Voices
Job Openings
Advanced Search
Student Programs
Military to MITRE
Publications
All Publications
Project Stories
Technical Papers
Systems Engineering Guide
About the SEG
The Evolution of Systems Engineering
The Essence of MITRE’s Systems Engineering
SEG Table of Contents
Enterprise Engineering
Comprehensive Viewpoint
Systems Thinking
Systems Engineering Strategies for Uncertainty and Complexity
Tools to Enable a Comprehensive Viewpoint
Enterprise Planning and Management
IT Governance
Portfolio Management
How to Develop a Measurement Capability
Enterprise Technology, Information, and Infrastructure
IT Infrastructure Engineering
IT Service Management
Information and Data Management
Radio Frequency Spectrum Management
Engineering Information-Intensive Enterprises
Architectures Federation
Design Patterns
Composable Capabilities on Demand (CCOD)
Open Source Software
Privacy Engineering
Privacy Requirements Definition and Testing
Systems of Systems
Engineering Systems in the Context of Systems of Systems
Treating Systems of Systems as Systems
Systems Engineering Life-Cycle Processes as Applied to Systems of Systems
Systems Engineering for Mission Assurance
Cyber Mission Assurance
Crown Jewels Analysis
Cyber Threat Susceptibility Assessment
Cyber Risk Remediation Analysis
Secure Code Review
Supply Chain Risk Management
Transformation Planning and Organizational Change
Performing Organizational Assessments
Formulation of Organizational Transformation Strategies
Stakeholder Assessment and Management
Effective Communication and Influence
Planning for Successful User Adoption
Enterprise Governance
Community of Interest and/or Community of Practice
Standards Boards and Bodies
Policy Analysis
MITRE FFRDC Independent Assessments
Planning and Managing Independent Assessments
SE Life-Cycle Building Blocks
Concept Development
Operational Needs Assessment
Concept of Operations
Operational Requirements
High-Level Conceptual Definition
Requirements Engineering
Eliciting, Collecting, and Developing Requirements
Analyzing and Defining Requirements
Special Considerations for Conditions of Uncertainty: Prototyping and Experimentation
System Architecture
Architectural Frameworks, Models, and Views
Approaches to Architecture Development
Architectural Patterns
System Design and Development
Develop System-Level Technical Requirements
Develop Top-Level System Design
Assess the Design's Ability to Meet the System Requirements
Systems Integration
Identify and Assess Integration and Interoperability (I&I) Challenges
Develop and Evaluate Integration and Interoperability (I&I) Solution Strategies
Assess Integration Testing Approaches
Interface Management
Test and Evaluation
Create and Assess Test and Evaluation Strategies
Assess Test and Evaluation Plans and Procedures
Verification and Validation
Create and Assess Certification and Accreditation Strategies
Implementation, O & M, and Transition
Other SE Life-Cycle Building Blocks Articles
Spanning the Operational Space: How to Select Use Cases and Mission Threads
Acquiring and Incorporating Post-Fielding Operational Feedback into Future Developments
Test and Evaluation of Systems of Systems
Verification and Validation of Simulation Models
Affordability, Efficiency, and Effectiveness
Acquisition Systems Engineering
Acquisition Program Planning
Analyses of Alternatives
Acquisition Management Metrics
Assessing Technical Maturity
Technology Planning
Life-Cycle Cost Estimation
Integrated Master Schedule (IMS)/Integrated Master Plan (IMP) Application
Performance Engineering
Comparison of Investment Analyses
Source Selection Preparation and Evaluation
Picking the Right Contractor
RFP Preparation and Source Selection
Program Acquisition Strategy Formulation
Agile Acquisition Strategy
Evolutionary Acquisition
"Big Bang" Acquisition
Contractor Evaluation
Data Driven Contractor Evaluations and Milestone Reviews
Earned Value Management
Competitive Prototyping
Risk Management
Risk Management Approach and Plan
Risk Identification
Risk Impact Assessment and Prioritization
Risk Mitigation Planning, Implementation, and Progress Monitoring
Risk Management Tools
Configuration Management
How to Control a Moving Baseline
Configuration Management Tools
Integrated Logistics Support
Reliability, Availability, and Maintainability
Managing Energy Efficiency
Quality Assurance and Measurement
Establishing a Quality Assurance Program in the Systems Acquisition or Government Operational Organization
How to Conduct Process and Product Reviews Across Boundaries
Continuous Process Improvement
Implementing and Improving Systems Engineering Processes for the Acquisition Organization
Matching Systems Engineering Process Improvement Frameworks/Solutions with Customer Needs
News
Press Releases
COVID-19 Insights & Impact
CEO Letter
Focal Points
Surface Transportation
Public Interest Impact
Innovation
Defense and Intelligence
Pandemic Response
Promoting Equity
Elections and Transition
Community Impact
Critical Infrastructure
Aerospace and Transportation
AI and Machine Learning
Health Outcomes
In the News
Media Resources
Corporate Events
MITRE Exchange
Search
Safeguard And Secure Cyberspace
Showing 10 results for Safeguard And Secure Cyberspace
Technical Paper |
November 2012
The Trusted Automated eXchange of Indicator Information (TAXII™)
Trusted Automated eXchange of Indicator Information (TAXII) is a set of technical specifications and supporting documentation for securely exchanging cyber threat information in order to detect, prevent, and mitigate cyber threats in real time.
Technical Paper |
January 2012
Standardizing Cyber Threat Intelligence Information with the Structured Threat Information eXpression (STIX™)
The Structured Threat Information eXpression (STIX™) is an effort to define and develop a language that allows organizations to share cyber threat information in a manner as expressive, flexible, automatable, and readable as possible.
Technical Paper |
October 2012
A Public Response to Emerging Exploits: Engaging Civil Defenders to Enhance the Collective Cyber Defenses of the United States
MITRE is working with the Department of Homeland Security to engage organizations and experts from industry, academia, and government to help create, evolve, and refine a new community-based approach for cyber defense.
Technical Paper |
November 2012
A Public Response to Emerging Exploits: Changing the State of HLS Cyber Capacity by Moving to Threat-based Active Defense
MITRE is working with the Department of Homeland Security to engage organizations and experts from industry, academia, and government to help create, evolve, and refine a new community-based approach for cyber defense.
Project Story |
October 2012
The Human Factor: Using Behavioral Science to Counter Insider Threats
Is countering cyber threats purely a technical challenge? Not according to MITRE's behavioral scientists, who use their expertise to help design cybersecurity systems and insider-threat detection programs.
Project Story |
May 2011
Fusion at Work: A New Type of Organization Helps Combat Terrorism
Following 9/11, the Department of Homeland Security (DHS) created a network of fusion centers to improve information sharing and help combat terrorism.
Project Story |
April 2012
Resilient Cyber Architectures Keep Government IT Operations Mission-Ready
Organizations are challenged with maintaining functions when cybersecurity breaches occur.
Project Story |
October 2011
Developing a Healthy "Cyber Ecosystem"
The universe of cyberspace is made of diverse entities that interact in ever-changing ways, much like in the natural world.
Project Story |
October 2012
Advanced Cyber Security Center Helps Level the Cyber Playing Field
With threats and attacks escalating, the cross-sector Advanced Cyber Security Center, which is hosted by MITRE, creates a blueprint for cyber defense.
Project Story |
September 2012
Beyond Thin Clients: Limiting Cybersecurity Vulnerabilities
As software becomes more feature-rich and complex, the more vulnerabilities it is likely to have for a hacker to exploit in a cyber-attack.
Browse Topics
Air Traffic Management
(79)
Artificial Intelligence
(67)
Community Impact
(23)
Cybersecurity
(143)
Computer Security
(83)
Economic and Cost Analysis
(16)
Emergency Preparedness and Response
(28)
Intelligence After Next
(12)
Modeling and Simulation
(98)
National Security
(9)
Public Health
(64)
Risk Management
(27)
Publications
All Publications
Project Stories
Technical Papers
Annual Reports
Systems Engineering Guide