Author Biography

Dr. Kamal T. Jabbour, ST, (B.E. Electrical Engineering with Distinction, American University of Beirut; Ph.D. Electrical Engineering, University of Salford), a member of the scientific and technical cadre of senior executives, is the Air Force Senior Scientist for Information Assurance, Information Directorate, Air Force Research Laboratory, Rome, N.Y. He serves as the principal scientific authority and independent researcher in the field of information assurance, including defensive information warfare and offensive information warfare technology. He conceives, plans, and advocates major research and development activities, monitors and guides the quality of scientific and technical resources, and provides expert technical consultation to other Air Force organizations, Department of Defense and government agencies, universities, and industry. Dr. Sarah L. Muccio (B.S. Mathematics, Summa Cum Laude, Youngstown State University; M.S., Ph.D. Applied Mathematics, North Carolina State University) is a mathematician for the Cyber Science Branch of the Information Directorate, Air Force Research Laboratory, Rome, NY. In the field of information assurance, Dr. Muccio works with scientists to mathematically model systems and analyze information. She conducts research on emerging technologies and maps mission-essential functions to their cyber assets. Dr. Muccio enjoys educating future cyber security leaders through several Syracuse University graduate courses that she co-created, as well as through the Advanced Course in Engineering (ACE) program.



Subject Area Keywords

Complex operations, Cybersecurity, Defense policy, Information operations, Networks and network analysis, Science and technology & security, Security policy


The intent of this article is to describe—and prescribe—a scientific framework
for assuring mission essential functions in a contested cyber environment.
Such a framework has profound national security implications
as the American military increasingly depends on cyberspace to execute
critical mission sets. In setting forth this prescribed course of action, the
article will first decompose information systems into atomic processes
that manipulate information at all six phases of the information lifecycle,
then systematically define the mathematical rules that govern mission