Author:
Publisher: RAND Corporation
ISBN:
Category : Computers
Languages : en
Pages : 60
Book Description
This documented briefing addresses the kinds of capabilities the cyber force will be required to produce; how the cyber force should be distributed in Air Force organizations; the skills the cyber force should possess and how should they be distributed by military grade, civilian, contractor, and functional domains; and what kind of military specialty classification structure will lead to a viable, sustainable cyber force. The authors speculate about the kinds of skills the cyber force will need in the future when cyber capabilities will likely be fully integrated with air and space capabilities. Future air force cyber capabilities are expected to be used during peacetime, in conjunction with other government agencies, and in different forms of warfare. These applications will require Air Force cyber personnel to develop a broad set of technical, legal, organizational, and operational skills.
Human Capital Management for the USAF Cyber Force
Author:
Publisher: RAND Corporation
ISBN:
Category : Computers
Languages : en
Pages : 60
Book Description
This documented briefing addresses the kinds of capabilities the cyber force will be required to produce; how the cyber force should be distributed in Air Force organizations; the skills the cyber force should possess and how should they be distributed by military grade, civilian, contractor, and functional domains; and what kind of military specialty classification structure will lead to a viable, sustainable cyber force. The authors speculate about the kinds of skills the cyber force will need in the future when cyber capabilities will likely be fully integrated with air and space capabilities. Future air force cyber capabilities are expected to be used during peacetime, in conjunction with other government agencies, and in different forms of warfare. These applications will require Air Force cyber personnel to develop a broad set of technical, legal, organizational, and operational skills.
Publisher: RAND Corporation
ISBN:
Category : Computers
Languages : en
Pages : 60
Book Description
This documented briefing addresses the kinds of capabilities the cyber force will be required to produce; how the cyber force should be distributed in Air Force organizations; the skills the cyber force should possess and how should they be distributed by military grade, civilian, contractor, and functional domains; and what kind of military specialty classification structure will lead to a viable, sustainable cyber force. The authors speculate about the kinds of skills the cyber force will need in the future when cyber capabilities will likely be fully integrated with air and space capabilities. Future air force cyber capabilities are expected to be used during peacetime, in conjunction with other government agencies, and in different forms of warfare. These applications will require Air Force cyber personnel to develop a broad set of technical, legal, organizational, and operational skills.
Strengthening U.S. Air Force Human Capital Management
Author: National Academies of Sciences, Engineering, and Medicine
Publisher: National Academies Press
ISBN: 0309678684
Category : Business & Economics
Languages : en
Pages : 289
Book Description
The USAir Force human capital management (HCM) system is not easily defined or mapped. It affects virtually every part of the Air Force because workforce policies, procedures, and processes impact all offices and organizations that include Airmen and responsibilities and relationships change regularly. To ensure the readiness of Airmen to fulfill the mission of the Air Force, strategic approaches are developed and issued through guidance and actions of the Office of the Deputy Chief of Staff for Manpower, Personnel and Services and the Office of the Assistant Secretary of the Air Force for Manpower and Reserve Affairs. Strengthening US Air Force Human Capital Management assesses and strengthens the various U.S. Air Force initiatives and programs working to improve person-job match and human capital management in coordinated support of optimal mission capability. This report considers the opportunities and challenges associated with related interests and needs across the USAF HCM system as a whole, and makes recommendations to inform improvements to USAF personnel selection and classification and other critical system components across career trajectories. Strengthening US Air Force Human Capital Management offers the Air Force a strategic approach, across a connected HCM system, to develop 21st century human capital capabilities essential for the success of 21st century Airmen.
Publisher: National Academies Press
ISBN: 0309678684
Category : Business & Economics
Languages : en
Pages : 289
Book Description
The USAir Force human capital management (HCM) system is not easily defined or mapped. It affects virtually every part of the Air Force because workforce policies, procedures, and processes impact all offices and organizations that include Airmen and responsibilities and relationships change regularly. To ensure the readiness of Airmen to fulfill the mission of the Air Force, strategic approaches are developed and issued through guidance and actions of the Office of the Deputy Chief of Staff for Manpower, Personnel and Services and the Office of the Assistant Secretary of the Air Force for Manpower and Reserve Affairs. Strengthening US Air Force Human Capital Management assesses and strengthens the various U.S. Air Force initiatives and programs working to improve person-job match and human capital management in coordinated support of optimal mission capability. This report considers the opportunities and challenges associated with related interests and needs across the USAF HCM system as a whole, and makes recommendations to inform improvements to USAF personnel selection and classification and other critical system components across career trajectories. Strengthening US Air Force Human Capital Management offers the Air Force a strategic approach, across a connected HCM system, to develop 21st century human capital capabilities essential for the success of 21st century Airmen.
Bleeding Talent
Author: T. Kane
Publisher: Springer
ISBN: 113751129X
Category : Business & Economics
Languages : en
Pages : 276
Book Description
Shaping the debate on how to save the military from itself. The first part recognizes what the military has done well in attracting and developing leadership talent. The book then examines the causes and consequences of the modern military's stifling personnel system and offers solutions for attracting and retaining top talent.
Publisher: Springer
ISBN: 113751129X
Category : Business & Economics
Languages : en
Pages : 276
Book Description
Shaping the debate on how to save the military from itself. The first part recognizes what the military has done well in attracting and developing leadership talent. The book then examines the causes and consequences of the modern military's stifling personnel system and offers solutions for attracting and retaining top talent.
Hackers Wanted
Author: Martin C. Libicki
Publisher: Rand Corporation
ISBN: 0833085018
Category : Political Science
Languages : en
Pages : 107
Book Description
The perceived shortage of cybersecurity professionals working on national security may endanger the nation’s networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years.
Publisher: Rand Corporation
ISBN: 0833085018
Category : Political Science
Languages : en
Pages : 107
Book Description
The perceived shortage of cybersecurity professionals working on national security may endanger the nation’s networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years.
Autonomous Horizons
Author: Greg Zacharias
Publisher: Independently Published
ISBN: 9781092834346
Category :
Languages : en
Pages : 420
Book Description
Dr. Greg Zacharias, former Chief Scientist of the United States Air Force (2015-18), explores next steps in autonomous systems (AS) development, fielding, and training. Rapid advances in AS development and artificial intelligence (AI) research will change how we think about machines, whether they are individual vehicle platforms or networked enterprises. The payoff will be considerable, affording the US military significant protection for aviators, greater effectiveness in employment, and unlimited opportunities for novel and disruptive concepts of operations. Autonomous Horizons: The Way Forward identifies issues and makes recommendations for the Air Force to take full advantage of this transformational technology.
Publisher: Independently Published
ISBN: 9781092834346
Category :
Languages : en
Pages : 420
Book Description
Dr. Greg Zacharias, former Chief Scientist of the United States Air Force (2015-18), explores next steps in autonomous systems (AS) development, fielding, and training. Rapid advances in AS development and artificial intelligence (AI) research will change how we think about machines, whether they are individual vehicle platforms or networked enterprises. The payoff will be considerable, affording the US military significant protection for aviators, greater effectiveness in employment, and unlimited opportunities for novel and disruptive concepts of operations. Autonomous Horizons: The Way Forward identifies issues and makes recommendations for the Air Force to take full advantage of this transformational technology.
Air Force Cyber Command (provisional) Decision Support
Author: Rich Mesic
Publisher: RAND Corporation
ISBN:
Category : Computers
Languages : en
Pages : 40
Book Description
Because cyberspace can affect core missions and capabilities, it seems obvious that the Air Force should take steps to establish an organization to address this medium. The details have been difficult to establish, however, because this medium is very different from air and space. The Air Force initially instituted a provisional major command and but has since instead replaced it with a numbered air force, the 24th Air Force, under Space Command. The authors have been involved in efforts to make the missions, tasks, and capabilities of such a command more concrete. Here, they offer observations originally intended for the major command but that apply equally well to the efforts of 24th Air Force: the needs to articulate objectives clearly; establish strategies, missions, and tasks; and develop people capable of ensuring that USAF-specific needs are met. The Air Force must also consider that cyber-related responsibilities spread across the military and other government agencies. But to expand its mission to [beta]fly and fight in cyberspace, [gamma] the Air Force should also advance the state of the art in creating effects using cyberspace.
Publisher: RAND Corporation
ISBN:
Category : Computers
Languages : en
Pages : 40
Book Description
Because cyberspace can affect core missions and capabilities, it seems obvious that the Air Force should take steps to establish an organization to address this medium. The details have been difficult to establish, however, because this medium is very different from air and space. The Air Force initially instituted a provisional major command and but has since instead replaced it with a numbered air force, the 24th Air Force, under Space Command. The authors have been involved in efforts to make the missions, tasks, and capabilities of such a command more concrete. Here, they offer observations originally intended for the major command but that apply equally well to the efforts of 24th Air Force: the needs to articulate objectives clearly; establish strategies, missions, and tasks; and develop people capable of ensuring that USAF-specific needs are met. The Air Force must also consider that cyber-related responsibilities spread across the military and other government agencies. But to expand its mission to [beta]fly and fight in cyberspace, [gamma] the Air Force should also advance the state of the art in creating effects using cyberspace.
Airpower Lessons for an Air Force Cyber-Power Targeting Theory
Author: Steven J. Anderson
Publisher:
ISBN:
Category :
Languages : en
Pages : 0
Book Description
Publisher:
ISBN:
Category :
Languages : en
Pages : 0
Book Description
Air Force Non-Rated Technical Training
Author: Lisa M. Harrington
Publisher:
ISBN: 9780833098863
Category : Business & Economics
Languages : en
Pages : 0
Book Description
This report identifies opportunities for optimizing processes and policies in the U.S. Air Force nonrated technical training pipeline and recommends process and policy changes that could improve efficiency at all levels.
Publisher:
ISBN: 9780833098863
Category : Business & Economics
Languages : en
Pages : 0
Book Description
This report identifies opportunities for optimizing processes and policies in the U.S. Air Force nonrated technical training pipeline and recommends process and policy changes that could improve efficiency at all levels.
Civilian Personnel Management: Dodi 1400.25
Author: Department Of Defense
Publisher: Civilian Personnel Management
ISBN: 9781723965517
Category : History
Languages : en
Pages : 454
Book Description
DODI 1400.25 Civilian Personnel Management - This book is Volume 1 of 4. This information was updated 8/22/2018. Buy the paperback from Amazon, get Kindle eBook FREE using Amazon MATCHBOOK. go to www.usgovpub.com to learn how.Volume 1. Chapter 100 to 805 Volume 2. Chapter 810 to 1406 Volume 3. Chapter 1407 to 1800 Volume 4. Chapter 2001 to 3007 (DCIPS) The purpose of the overall Instruction is to establish and implement policy, establish uniform DoD-wide procedures, provide guidelines and model programs, delegate authority, and assign responsibilities regarding civilian personnel management within the Department of Defense. Why buy a book you can download for free? We print this book so you don't have to. First you gotta find a good clean (legible) copy and make sure it's the latest version (not always easy). Some documents found on the web are missing some pages or the image quality is so poor, they are difficult to read. We look over each document carefully and replace poor quality images by going back to the original source document. We proof each document to make sure it's all there - including all changes. If you find a good copy, you could print it using a network printer you share with 100 other people (typically its either out of paper or toner). If it's just a 10-page document, no problem, but if it's 250-pages, you will need to punch 3 holes in all those pages and put it in a 3-ring binder. Takes at least an hour. It's much more cost-effective to just order the latest version from Amazon.com This book includes original commentary which is copyright material. Note that government documents are in the public domain. We print these large documents as a service so you don't have to. The books are compact, tightly-bound, full-size (8 1⁄2 by 11 inches), with large text and glossy covers. 4th Watch Publishing Co. is a SDVOSB. www.usgovpub.com
Publisher: Civilian Personnel Management
ISBN: 9781723965517
Category : History
Languages : en
Pages : 454
Book Description
DODI 1400.25 Civilian Personnel Management - This book is Volume 1 of 4. This information was updated 8/22/2018. Buy the paperback from Amazon, get Kindle eBook FREE using Amazon MATCHBOOK. go to www.usgovpub.com to learn how.Volume 1. Chapter 100 to 805 Volume 2. Chapter 810 to 1406 Volume 3. Chapter 1407 to 1800 Volume 4. Chapter 2001 to 3007 (DCIPS) The purpose of the overall Instruction is to establish and implement policy, establish uniform DoD-wide procedures, provide guidelines and model programs, delegate authority, and assign responsibilities regarding civilian personnel management within the Department of Defense. Why buy a book you can download for free? We print this book so you don't have to. First you gotta find a good clean (legible) copy and make sure it's the latest version (not always easy). Some documents found on the web are missing some pages or the image quality is so poor, they are difficult to read. We look over each document carefully and replace poor quality images by going back to the original source document. We proof each document to make sure it's all there - including all changes. If you find a good copy, you could print it using a network printer you share with 100 other people (typically its either out of paper or toner). If it's just a 10-page document, no problem, but if it's 250-pages, you will need to punch 3 holes in all those pages and put it in a 3-ring binder. Takes at least an hour. It's much more cost-effective to just order the latest version from Amazon.com This book includes original commentary which is copyright material. Note that government documents are in the public domain. We print these large documents as a service so you don't have to. The books are compact, tightly-bound, full-size (8 1⁄2 by 11 inches), with large text and glossy covers. 4th Watch Publishing Co. is a SDVOSB. www.usgovpub.com
Studies Combined: Cyber Warfare In Cyberspace - National Defense, Workforce And Legal Issues
Author:
Publisher: Jeffrey Frank Jones
ISBN:
Category :
Languages : en
Pages : 2822
Book Description
Just a sample of the contents ... contains over 2,800 total pages .... PROSPECTS FOR THE RULE OF LAW IN CYBERSPACE Cyberwarfare and Operational Art CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE OFFENSIVE USE OF CYBER Cyber Attacks and the Legal Justification for an Armed Response UNTYING OUR HANDS: RECONSIDERING CYBER AS A SEPARATE INSTRUMENT OF NATIONAL POWER Effects-Based Operations in the Cyber Domain Recommendations for Model-Driven Paradigms for Integrated Approaches to Cyber Defense MILLENNIAL WARFARE IGNORING A REVOLUTION IN MILITARY AFFAIRS: THE NEED TO CREATE A SEPARATE BRANCH OF THE ARMED FORCES FOR CYBER WARFARE SPECIAL OPERATIONS AND CYBER WARFARE LESSONS FROM THE FRONT: A CASE STUDY OF RUSSIAN CYBER WARFARE ADAPTING UNCONVENTIONAL WARFARE DOCTRINE TO CYBERSPACE OPERATIONS: AN EXAMINATION OF HACKTIVIST BASED INSURGENCIES Addressing Human Factors Gaps in Cyber Defense Airpower History and the Cyber Force of the Future How Organization for the Cyber Domain Outpaced Strategic Thinking and Forgot the Lessons of the Past THE COMMAND OF THE TREND: SOCIAL MEDIA AS A WEAPON IN THE INFORMATION AGE SPYING FOR THE RIGHT REASONS: CONTESTED NORMS IN CYBERSPACE AIR FORCE CYBERWORX REPORT: REMODELING AIR FORCE CYBER COMMAND & CONTROL THE CYBER WAR: MAINTAINING AND CONTROLLING THE “KEY CYBER TERRAIN” OF THE CYBERSPACE DOMAIN WHEN NORMS FAIL: NORTH KOREA AND CYBER AS AN ELEMENT OF STATECRAFT AN ANTIFRAGILE APPROACH TO PREPARING FOR CYBER CONFLICT AIR FORCE CYBER MISSION ASSURANCE SOURCES OF MISSION UNCERTAINTY Concurrency Attacks and Defenses Cyber Workforce Retention Airpower Lessons for an Air Force Cyber-Power Targeting ¬Theory IS BRINGING BACK WARRANT OFFICERS THE ANSWER? A LOOK AT HOW THEY COULD WORK IN THE AIR FORCE CYBER OPERATIONS CAREER FIELD NEW TOOLS FOR A NEW TERRAIN AIR FORCE SUPPORT TO SPECIAL OPERATIONS IN THE CYBER ENVIRONMENT Learning to Mow Grass: IDF Adaptations to Hybrid Threats CHINA’S WAR BY OTHER MEANS: UNVEILING CHINA’S QUEST FOR INFORMATION DOMINANCE THE ISLAMIC STATE’S TACTICS IN SYRIA: ROLE OF SOCIAL MEDIA IN SHIFTING A PEACEFUL ARAB SPRING INTO TERRORISM NON-LETHAL WEAPONS: THE KEY TO A MORE AGGRESSIVE STRATEGY TO COMBAT TERRORISM THOUGHTS INVADE US: LEXICAL COGNITION AND CYBERSPACE The Cyber Threat to Military Just-In-Time Logistics: Risk Mitigation and the Return to Forward Basing PROSPECTS FOR THE RULE OF LAW IN CYBERSPACE Cyberwarfare and Operational Art CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE OFFENSIVE USE OF CYBER Cyber Attacks and the Legal Justification for an Armed Response UNTYING OUR HANDS: RECONSIDERING CYBER AS A SEPARATE INSTRUMENT OF NATIONAL POWER Effects-Based Operations in the Cyber Domain Recommendations for Model-Driven Paradigms for Integrated Approaches to Cyber Defense MILLENNIAL WARFARE IGNORING A REVOLUTION IN MILITARY AFFAIRS: THE NEED TO CREATE A SEPARATE BRANCH OF THE ARMED FORCES FOR CYBER WARFARE SPECIAL OPERATIONS AND CYBER WARFARE LESSONS FROM THE FRONT: A CASE STUDY OF RUSSIAN CYBER WARFARE ADAPTING UNCONVENTIONAL WARFARE DOCTRINE TO CYBERSPACE OPERATIONS: AN EXAMINATION OF HACKTIVIST BASED INSURGENCIES Addressing Human Factors Gaps in Cyber Defense Airpower History and the Cyber Force of the Future How Organization for the Cyber Domain Outpaced Strategic Thinking and Forgot the Lessons of the Past THE COMMAND OF THE TREND: SOCIAL MEDIA AS A WEAPON IN THE INFORMATION AGE SPYING FOR THE RIGHT REASONS: CONTESTED NORMS IN CYBERSPACE AIR FORCE CYBERWORX REPORT: REMODELING AIR FORCE CYBER COMMAND & CONTROL THE CYBER WAR: MAINTAINING AND CONTROLLING THE “KEY CYBER TERRAIN” OF THE CYBERSPACE DOMAIN WHEN NORMS FAIL: NORTH KOREA AND CYBER AS AN ELEMENT OF STATECRAFT AN ANTIFRAGILE APPROACH TO PREPARING FOR CYBER CONFLICT AIR FORCE CYBER MISSION ASSURANCE SOURCES OF MISSION UNCERTAINTY Concurrency Attacks and Defenses Cyber Workforce Retention
Publisher: Jeffrey Frank Jones
ISBN:
Category :
Languages : en
Pages : 2822
Book Description
Just a sample of the contents ... contains over 2,800 total pages .... PROSPECTS FOR THE RULE OF LAW IN CYBERSPACE Cyberwarfare and Operational Art CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE OFFENSIVE USE OF CYBER Cyber Attacks and the Legal Justification for an Armed Response UNTYING OUR HANDS: RECONSIDERING CYBER AS A SEPARATE INSTRUMENT OF NATIONAL POWER Effects-Based Operations in the Cyber Domain Recommendations for Model-Driven Paradigms for Integrated Approaches to Cyber Defense MILLENNIAL WARFARE IGNORING A REVOLUTION IN MILITARY AFFAIRS: THE NEED TO CREATE A SEPARATE BRANCH OF THE ARMED FORCES FOR CYBER WARFARE SPECIAL OPERATIONS AND CYBER WARFARE LESSONS FROM THE FRONT: A CASE STUDY OF RUSSIAN CYBER WARFARE ADAPTING UNCONVENTIONAL WARFARE DOCTRINE TO CYBERSPACE OPERATIONS: AN EXAMINATION OF HACKTIVIST BASED INSURGENCIES Addressing Human Factors Gaps in Cyber Defense Airpower History and the Cyber Force of the Future How Organization for the Cyber Domain Outpaced Strategic Thinking and Forgot the Lessons of the Past THE COMMAND OF THE TREND: SOCIAL MEDIA AS A WEAPON IN THE INFORMATION AGE SPYING FOR THE RIGHT REASONS: CONTESTED NORMS IN CYBERSPACE AIR FORCE CYBERWORX REPORT: REMODELING AIR FORCE CYBER COMMAND & CONTROL THE CYBER WAR: MAINTAINING AND CONTROLLING THE “KEY CYBER TERRAIN” OF THE CYBERSPACE DOMAIN WHEN NORMS FAIL: NORTH KOREA AND CYBER AS AN ELEMENT OF STATECRAFT AN ANTIFRAGILE APPROACH TO PREPARING FOR CYBER CONFLICT AIR FORCE CYBER MISSION ASSURANCE SOURCES OF MISSION UNCERTAINTY Concurrency Attacks and Defenses Cyber Workforce Retention Airpower Lessons for an Air Force Cyber-Power Targeting ¬Theory IS BRINGING BACK WARRANT OFFICERS THE ANSWER? A LOOK AT HOW THEY COULD WORK IN THE AIR FORCE CYBER OPERATIONS CAREER FIELD NEW TOOLS FOR A NEW TERRAIN AIR FORCE SUPPORT TO SPECIAL OPERATIONS IN THE CYBER ENVIRONMENT Learning to Mow Grass: IDF Adaptations to Hybrid Threats CHINA’S WAR BY OTHER MEANS: UNVEILING CHINA’S QUEST FOR INFORMATION DOMINANCE THE ISLAMIC STATE’S TACTICS IN SYRIA: ROLE OF SOCIAL MEDIA IN SHIFTING A PEACEFUL ARAB SPRING INTO TERRORISM NON-LETHAL WEAPONS: THE KEY TO A MORE AGGRESSIVE STRATEGY TO COMBAT TERRORISM THOUGHTS INVADE US: LEXICAL COGNITION AND CYBERSPACE The Cyber Threat to Military Just-In-Time Logistics: Risk Mitigation and the Return to Forward Basing PROSPECTS FOR THE RULE OF LAW IN CYBERSPACE Cyberwarfare and Operational Art CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE OFFENSIVE USE OF CYBER Cyber Attacks and the Legal Justification for an Armed Response UNTYING OUR HANDS: RECONSIDERING CYBER AS A SEPARATE INSTRUMENT OF NATIONAL POWER Effects-Based Operations in the Cyber Domain Recommendations for Model-Driven Paradigms for Integrated Approaches to Cyber Defense MILLENNIAL WARFARE IGNORING A REVOLUTION IN MILITARY AFFAIRS: THE NEED TO CREATE A SEPARATE BRANCH OF THE ARMED FORCES FOR CYBER WARFARE SPECIAL OPERATIONS AND CYBER WARFARE LESSONS FROM THE FRONT: A CASE STUDY OF RUSSIAN CYBER WARFARE ADAPTING UNCONVENTIONAL WARFARE DOCTRINE TO CYBERSPACE OPERATIONS: AN EXAMINATION OF HACKTIVIST BASED INSURGENCIES Addressing Human Factors Gaps in Cyber Defense Airpower History and the Cyber Force of the Future How Organization for the Cyber Domain Outpaced Strategic Thinking and Forgot the Lessons of the Past THE COMMAND OF THE TREND: SOCIAL MEDIA AS A WEAPON IN THE INFORMATION AGE SPYING FOR THE RIGHT REASONS: CONTESTED NORMS IN CYBERSPACE AIR FORCE CYBERWORX REPORT: REMODELING AIR FORCE CYBER COMMAND & CONTROL THE CYBER WAR: MAINTAINING AND CONTROLLING THE “KEY CYBER TERRAIN” OF THE CYBERSPACE DOMAIN WHEN NORMS FAIL: NORTH KOREA AND CYBER AS AN ELEMENT OF STATECRAFT AN ANTIFRAGILE APPROACH TO PREPARING FOR CYBER CONFLICT AIR FORCE CYBER MISSION ASSURANCE SOURCES OF MISSION UNCERTAINTY Concurrency Attacks and Defenses Cyber Workforce Retention