123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

U.s Department Of Defense Develops A Five-pronged Strategy To Operate In The Cyberspace

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Cyber threats are growing in terms of severity, sophistication, scope and frequency. Last year, the world witnessed the arrival of the Stuxnet worm, making even the skeptics to realize the imminent threats in the cyber space. The malware aimed at destabilizing industrial installations and Iranian nuclear program. Disclosure of classified United States (U.S) government documents by WikiLeaks almost threatened to destabilize the country's diplomatic relations with other nations. The current year has already witnessed numerous cyber-attacks, leakage of confidential documents, login credentials and posting of fake stories. The world watched in astonishment as a cyber-attack group named Lulz Sec steered a fifty day hurricane of attacks on government and business corporations. Other groups are seeking the same limelight through frequent cyber-attacks. If not more, the recent cyber-attacks have again brought to light negligent security practices by individuals, companies and government bodies.

Recently, the U.S Department of Defense (DOD) released a new five-pronged strategy for operating in the cyberspace. The first strategy ...
... focuses on reaping the full benefits of the Internet by considering it as an operational domain. Through this strategy DOD aims to organize, train and equip for the cyberspace in the same way as is done for air, land, maritime and space to defend national security. The strategy aims at managing the security risks in the cyberspace through focus on training, creating secure and resilient network environments, improving situational awareness and integrating the capabilities of different commands, services and agencies.

The second strategy consists of four sub-strategies which focus on improving cyber security best practices, improving communication and accountability among the workforce, improving internal monitoring and information management capabilities. The strategy focuses on improving the defenses of Defense department's computer systems and networks. The most significant feature of this strategy is evolvement of new concepts and computer architectures, and improving cyber hygiene. The third strategy focuses on government departments, agencies, Department of Homeland Security, Internet Service Providers (ISPs), supply chains and industry to develop innovative ways to enhance national security. Organizing cyber security training programs and encouraging online IT degree programs may help members of different stakeholders to create security conscious culture in their organizations. The globalization of the technology sector has resulted in increased outsourcing of software and hardware, which enhances the risk of use of counterfeit products, or purchase of products from untrusted sources. The strategy focuses on improving government approaches to manage such risks. The government must also focus on improving cyber security practices among the general public by conducting free workshops, developing and encouraging online IT courses.

International coordination and cooperation is crucial to combat and control the menace of cybercrime and Internet-based threats. The fourth strategy aims at improving collective cyber security sharing indicators on cyber threats, detection of malicious code, emerging cyber-attack groups and allies. The enormity of the cyber threats have increased demand for security professionals qualified in security certifications, IT degree programs, computer forensics, network administration, incident management, disaster management and business recovery. The fifth, but significant strategy focuses on creation of a cyber workforce both in the civilian and military sphere by capitalizing scientific, academic and economic resources of the country.

The new strategy of the Department of Defense intends to enhance cyber security innovation both in public and private sector, enhance technological capabilities and invest in cyber security professionals to strengthen national security.

Total Views: 224Word Count: 557See All articles From Author

Add Comment

Computers Articles

1. Cpd Accredited Typing Certificate Uk - Speed Test & Online Certification
Author: Kowser

2. Safe Connection With Mickey Mouse Cables- An Ultimate Guide
Author: Jennifer Truong

3. Develop A Widget For Ios App
Author: goodcoders

4. Develop An App From Scratch In 13 Steps
Author: goodcoders

5. The Best Antivirus Software For 2025
Author: Jasbeer SIngh

6. How To Develop An App From Scratch In 13 Steps
Author: goodcoders

7. 7 Steps To Create A Safe Mobile App
Author: goodcoders

8. Why Do Businesses Need Vendor Management Software?
Author: Kiran

9. React Native App Development By Alvi Software
Author: Alvi Software

10. Custome
Author: Owner

11. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

12. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

13. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

14. The Rise Of User Centered Web Design
Author: goodcoders

15. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: