ALL >> Computers >> View Article
U.s Department Of Defense Develops A Five-pronged Strategy To Operate In The Cyberspace
Cyber threats are growing in terms of severity, sophistication, scope and frequency. Last year, the world witnessed the arrival of the Stuxnet worm, making even the skeptics to realize the imminent threats in the cyber space. The malware aimed at destabilizing industrial installations and Iranian nuclear program. Disclosure of classified United States (U.S) government documents by WikiLeaks almost threatened to destabilize the country's diplomatic relations with other nations. The current year has already witnessed numerous cyber-attacks, leakage of confidential documents, login credentials and posting of fake stories. The world watched in astonishment as a cyber-attack group named Lulz Sec steered a fifty day hurricane of attacks on government and business corporations. Other groups are seeking the same limelight through frequent cyber-attacks. If not more, the recent cyber-attacks have again brought to light negligent security practices by individuals, companies and government bodies.
Recently, the U.S Department of Defense (DOD) released a new five-pronged strategy for operating in the cyberspace. The first strategy ...
... focuses on reaping the full benefits of the Internet by considering it as an operational domain. Through this strategy DOD aims to organize, train and equip for the cyberspace in the same way as is done for air, land, maritime and space to defend national security. The strategy aims at managing the security risks in the cyberspace through focus on training, creating secure and resilient network environments, improving situational awareness and integrating the capabilities of different commands, services and agencies.
The second strategy consists of four sub-strategies which focus on improving cyber security best practices, improving communication and accountability among the workforce, improving internal monitoring and information management capabilities. The strategy focuses on improving the defenses of Defense department's computer systems and networks. The most significant feature of this strategy is evolvement of new concepts and computer architectures, and improving cyber hygiene. The third strategy focuses on government departments, agencies, Department of Homeland Security, Internet Service Providers (ISPs), supply chains and industry to develop innovative ways to enhance national security. Organizing cyber security training programs and encouraging online IT degree programs may help members of different stakeholders to create security conscious culture in their organizations. The globalization of the technology sector has resulted in increased outsourcing of software and hardware, which enhances the risk of use of counterfeit products, or purchase of products from untrusted sources. The strategy focuses on improving government approaches to manage such risks. The government must also focus on improving cyber security practices among the general public by conducting free workshops, developing and encouraging online IT courses.
International coordination and cooperation is crucial to combat and control the menace of cybercrime and Internet-based threats. The fourth strategy aims at improving collective cyber security sharing indicators on cyber threats, detection of malicious code, emerging cyber-attack groups and allies. The enormity of the cyber threats have increased demand for security professionals qualified in security certifications, IT degree programs, computer forensics, network administration, incident management, disaster management and business recovery. The fifth, but significant strategy focuses on creation of a cyber workforce both in the civilian and military sphere by capitalizing scientific, academic and economic resources of the country.
The new strategy of the Department of Defense intends to enhance cyber security innovation both in public and private sector, enhance technological capabilities and invest in cyber security professionals to strengthen national security.
Add Comment
Computers Articles
1. Martindale Law Firm Competitive Analysis Data For Legal IndustryAuthor: Den Rediant
2. The Impact Of Digital Transformation In Clinical Trials
Author: Giselle Bates
3. Blending Art, Technology, And Access: A Look At Pure Art Sketch Community And Digital Portals
Author: new aurthors
4. Full Stack Development Company Driving Mvp Success Fast
Author: Rob Stephen
5. You May Need It Consulting Services But You Are Not Aware Of It Yet
Author: Helen Johns
6. Top Pos Dealers Solutions In 2025 | Best Pos Dealers In Hyderabad
Author: pbs
7. Newegg Product Data Scraping For E-commerce Market Intelligence
Author: Den Rediant
8. Coles & Woolworths Pricing Data Scraping For Retail Strategy
Author: Den Rediant
9. Answering_services
Author: brainbell10
10. Api_security
Author: brainbell10
11. Appium
Author: brainbell10
12. Out-of-stock Prediction Using Web Scraping For Inventory Management
Author: Den Rediant
13. Restaurant Data Scraping Api To Monitor Competitors In Real Time
Author: Den Rediant
14. Adobe_xd
Author: brainbell
15. Amazon Sagemaker Services
Author: brainbell10






