ALL >> Computers >> View Article
U.s Department Of Defense Develops A Five-pronged Strategy To Operate In The Cyberspace
Cyber threats are growing in terms of severity, sophistication, scope and frequency. Last year, the world witnessed the arrival of the Stuxnet worm, making even the skeptics to realize the imminent threats in the cyber space. The malware aimed at destabilizing industrial installations and Iranian nuclear program. Disclosure of classified United States (U.S) government documents by WikiLeaks almost threatened to destabilize the country's diplomatic relations with other nations. The current year has already witnessed numerous cyber-attacks, leakage of confidential documents, login credentials and posting of fake stories. The world watched in astonishment as a cyber-attack group named Lulz Sec steered a fifty day hurricane of attacks on government and business corporations. Other groups are seeking the same limelight through frequent cyber-attacks. If not more, the recent cyber-attacks have again brought to light negligent security practices by individuals, companies and government bodies.
Recently, the U.S Department of Defense (DOD) released a new five-pronged strategy for operating in the cyberspace. The first strategy ...
... focuses on reaping the full benefits of the Internet by considering it as an operational domain. Through this strategy DOD aims to organize, train and equip for the cyberspace in the same way as is done for air, land, maritime and space to defend national security. The strategy aims at managing the security risks in the cyberspace through focus on training, creating secure and resilient network environments, improving situational awareness and integrating the capabilities of different commands, services and agencies.
The second strategy consists of four sub-strategies which focus on improving cyber security best practices, improving communication and accountability among the workforce, improving internal monitoring and information management capabilities. The strategy focuses on improving the defenses of Defense department's computer systems and networks. The most significant feature of this strategy is evolvement of new concepts and computer architectures, and improving cyber hygiene. The third strategy focuses on government departments, agencies, Department of Homeland Security, Internet Service Providers (ISPs), supply chains and industry to develop innovative ways to enhance national security. Organizing cyber security training programs and encouraging online IT degree programs may help members of different stakeholders to create security conscious culture in their organizations. The globalization of the technology sector has resulted in increased outsourcing of software and hardware, which enhances the risk of use of counterfeit products, or purchase of products from untrusted sources. The strategy focuses on improving government approaches to manage such risks. The government must also focus on improving cyber security practices among the general public by conducting free workshops, developing and encouraging online IT courses.
International coordination and cooperation is crucial to combat and control the menace of cybercrime and Internet-based threats. The fourth strategy aims at improving collective cyber security sharing indicators on cyber threats, detection of malicious code, emerging cyber-attack groups and allies. The enormity of the cyber threats have increased demand for security professionals qualified in security certifications, IT degree programs, computer forensics, network administration, incident management, disaster management and business recovery. The fifth, but significant strategy focuses on creation of a cyber workforce both in the civilian and military sphere by capitalizing scientific, academic and economic resources of the country.
The new strategy of the Department of Defense intends to enhance cyber security innovation both in public and private sector, enhance technological capabilities and invest in cyber security professionals to strengthen national security.
Add Comment
Computers Articles
1. Exploring How Ai In The Cloud Can Transform Your BusinessAuthor: TechDogs
2. The Power Of Cloud And Ai: A New Era Of Collaboration
Author: TechDogs
3. Get Business Insights Using Expedia & Booking. Com Review Data Scraping
Author: DataZivot
4. Top 10 Reasons A Strong Communication Strategy Drives Prm Program Success
Author: Archi
5. Achieve Scalable Web Scraping With Aws Lambda
Author: Devil Brown
6. Overcoming Common Challenges In Iso 27001 Implementation
Author: Jenna Miller
7. Basic Computer Course: Your Gateway To Skill Development | The Institute Of Professional Accountants
Author: Tipa Institute
8. Top 7 Advantages Of React Js
Author: Bella Stone
9. Top 7 App Marketing Tools For Mobile Success
Author: Bella Stone
10. Revolutionizing Education Management With Samphire It Solution Pvt Ltd’s Erp Software
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD
11. Top 10 Healthcare Technology Trends
Author: goodcoders
12. "building Tomorrow’s Factories: The Role Of Automation & Robotics In Modern Manufacturing"
Author: andrew smith
13. The Ultimate Guide To The Best Ecommerce Plugin For Wordpress
Author: Rocket Press
14. Xsosys Erp: A Scalable Solution For Businesses In Any Industry
Author: Xsosys Technology(S) Pte. Ltd.
15. Rental Management Software: A Complete Solution For Car, Property, And Coworking Space
Author: RentAAA