Technology Today - Home
Defending the Cyberdomain
This issue of "Technology Today" is about the cyberdomain and the technologies employed to protect and respond to attacks against information and computing systems. The struggle is ongoing.

read more

Additional Features:

Understanding IO Through Architecture

Enterprise architecture provides an effective set of tools and techniques for understanding customer needs and identifying applicable technologies.

read more

U.S. Air Force Cyberoperations

"Warfighters rely upon cyberspace to command and control forces in the 21st century. Revolutionary technology has presented cybercapabilities, which can provide decisive effects traditionally achieved only through kinetic means … "

read more

Raytheon High-Speed Guard

The Raytheon High-Speed Guard (RHSG) provides critical technology for sharing data between security domains. As of July 2009, Raytheon deployed 170 systems. Lead engineers for the project continuously support customers by monitoring requirements, technical challenges, and trends to ensure that customers' information-sharing and information-protection needs are met.

read more

Raytheon's Strategy for Meeting the Cybersecurity Challenge

Pick up a newspaper on almost any day and you get a sense for the magnitude and seriousness of the cyberthreats faced by government and industry around the world.

read more

Raytheon's Cybercapabilities: Excellence and Acquisitions

Raytheon is a world-class provider of cybercapabilities. In order to maintain a robust presence in this environment of rapidly changing technologies, Raytheon acquired five firms with well-established reputations for excellence in the cyberfield:

read more

The New Re-Engineering

Vulnerability research has historically been a disorganized process, with a collection of custom approaches used by different researchers with inconsistent results. Indeed, consistency is one of the most difficult aspects of vulnerability research —

read more

Embedded Cryptography

Information assurance is defined by the processes and technologies required to manage the risks of storing and sharing information. Cryptography, a subset of information assurance, includes the technologies deployed to ensure the protection of sensitive information. Cryptographic methods are an esoteric blend of mathematics and computer science. Within the U.S., these methods and techniques are strictly controlled by the National Security Agency.

read more

Quantum Cryptographic Networks

Quantum cryptography, more aptly named quantum key distribution (QKD), has emerged as a new paradigm for high-speed delivery of encryption key material between two remote parties. Typically, the security integrity of key exchange protocols is rooted in either a trusted third party, such as a trusted courier for symmetric encryption protocols, or the hypothesized computational complexity of one-way mathematical functions, such as the RSA encryption protocol.

read more

Information Assurance for Communication Systems

Comprehensive Mission Assurance requires secure battlefield communication. Warfighters must be confident that their data meets the three main tenets of information assurance: confidentiality, integrity and availability.

read more

Attack and Defend in Cyberspace and Within Raytheon

"Attack and defend in cyberspace" took on a new meaning within Raytheon last year through the Information Operations Enterprise Initiatives. Raytheon engineers from across the company embarked on a mission to fulfill two major...

read more

Intrusion-Tolerant and Self-Healing Approaches to Cybersecurity

Mission- and safety-critical systems require a very high degree of reliability and availability, typically measured in many nines. Examples of such systems include command and control, fire control, and weapon control systems in the military domain, as well as numerous civilian systems such as air traffic control, power grid controls (SCADA) and power plant controls. Consequences of data corruption or a shutdown of these systems have the potential to cause significant loss of life, commerce or military objectives.

read more

Ensuring Authorized Access to Computer Information

Raytheon is currently working on two innovative technologies — Location Aware Access Control and Persistent Log on — that will ensure user authentication in a secure computing environment. The technologies will be feasible for commercial use in hospitals, banks, retail and manufacturing, as well as military and civil markets — including command and control, weapons systems and border security.

read more

Raytheon and West Point's IT and IO Center

Raytheon's objective to provide its customers with comprehensive solutions in the area of information assurance and information operations has resulted in the initiation of valuable partnerships with several academic institutions that are pursuing research in these areas.

read more

Raytheon Partnerships Enhance Cyberdomain Research

Can game theory be applied to help us make smarter decisions in protecting critical infrastructure? Could it also help plan automated responses to deter attacks? Can intelligent software agents watch ad-hoc network nodes to catch untrustworthy behavior? Those are just a few areas in which Raytheon is sponsoring research at universities and small businesses.

read more

Enabling Information Sharing

Since Sept. 11, 2001, the traditional information security approach of restricting access to information has faced the challenge of balancing need to know with the necessity of sharing information to achieve Mission Assurance.

read more

Partnering with George Mason University

Raytheon is working with researchers at George Mason University's Center for Secure Information Systems to improve its ability to develop high-assurance systems. Current research and development activities include automating vulnerability analysis and hardening systems through secure virtualization.

read more

Mark Russell

Message from
Mark E. Russell

Cyberspace is clearly its own domain now, on par with the domains of air, land, sea and space, and like its counterparts, the cyberdomain can be just as risky a place.

Ensuring customer success in the cyberdomain requires a robust approach to assure trusted and resilient communications infrastructure and information.

read more

Editor's Note

Cyberthreats, both foreign and domestic, have become a significant challenge for the world today in both military and commercial sectors. These threats can range from stealing someone's identity, to stealing company records or military secrets, to sabotaging government computers and key elements of national infrastructures. This issue addresses some of these types of threats and how Raytheon is bringing its long history of innovative technologies together in new ways to create a safer cyberenvironment for our company and our customers.

read more

Vice President
Mark E. Russell

Managing Editor
Lee Ann Sousa

Senior Editors
Donna Acott
Tom Georgon
Kevin J. Wynn

Art Director
Debra Graham

Web Site Design
Stanley Holland
Joseph F. Walch IV

Publication Distribution
Dolores Priest


Kate Emerson
Christel Kittredge
Marcilene Pribonic
Sharon Stein
Keith Sturdevant

Raytheon Corporate Headquarters
Technology Today is published quarterly by the Office of Engineering, Technology and Mission Assurance