ALL >> Computers >> View Article
U.s Department Of Defense Develops A Five-pronged Strategy To Operate In The Cyberspace
Cyber threats are growing in terms of severity, sophistication, scope and frequency. Last year, the world witnessed the arrival of the Stuxnet worm, making even the skeptics to realize the imminent threats in the cyber space. The malware aimed at destabilizing industrial installations and Iranian nuclear program. Disclosure of classified United States (U.S) government documents by WikiLeaks almost threatened to destabilize the country's diplomatic relations with other nations. The current year has already witnessed numerous cyber-attacks, leakage of confidential documents, login credentials and posting of fake stories. The world watched in astonishment as a cyber-attack group named Lulz Sec steered a fifty day hurricane of attacks on government and business corporations. Other groups are seeking the same limelight through frequent cyber-attacks. If not more, the recent cyber-attacks have again brought to light negligent security practices by individuals, companies and government bodies.
Recently, the U.S Department of Defense (DOD) released a new five-pronged strategy for operating in the cyberspace. The first strategy ...
... focuses on reaping the full benefits of the Internet by considering it as an operational domain. Through this strategy DOD aims to organize, train and equip for the cyberspace in the same way as is done for air, land, maritime and space to defend national security. The strategy aims at managing the security risks in the cyberspace through focus on training, creating secure and resilient network environments, improving situational awareness and integrating the capabilities of different commands, services and agencies.
The second strategy consists of four sub-strategies which focus on improving cyber security best practices, improving communication and accountability among the workforce, improving internal monitoring and information management capabilities. The strategy focuses on improving the defenses of Defense department's computer systems and networks. The most significant feature of this strategy is evolvement of new concepts and computer architectures, and improving cyber hygiene. The third strategy focuses on government departments, agencies, Department of Homeland Security, Internet Service Providers (ISPs), supply chains and industry to develop innovative ways to enhance national security. Organizing cyber security training programs and encouraging online IT degree programs may help members of different stakeholders to create security conscious culture in their organizations. The globalization of the technology sector has resulted in increased outsourcing of software and hardware, which enhances the risk of use of counterfeit products, or purchase of products from untrusted sources. The strategy focuses on improving government approaches to manage such risks. The government must also focus on improving cyber security practices among the general public by conducting free workshops, developing and encouraging online IT courses.
International coordination and cooperation is crucial to combat and control the menace of cybercrime and Internet-based threats. The fourth strategy aims at improving collective cyber security sharing indicators on cyber threats, detection of malicious code, emerging cyber-attack groups and allies. The enormity of the cyber threats have increased demand for security professionals qualified in security certifications, IT degree programs, computer forensics, network administration, incident management, disaster management and business recovery. The fifth, but significant strategy focuses on creation of a cyber workforce both in the civilian and military sphere by capitalizing scientific, academic and economic resources of the country.
The new strategy of the Department of Defense intends to enhance cyber security innovation both in public and private sector, enhance technological capabilities and invest in cyber security professionals to strengthen national security.
Add Comment
Computers Articles
1. Future-proof Your Legacy Systems With Expert Foxpro Migration Services By Tech GazebosAuthor: Tech Gazebos
2. Why Fortigate 40f And Fortigate 60f Are The Best Choices For Business Network Security
Author: Stacklink uk
3. Why Modern Facilities Rely On Environmental Monitoring And Remote Temperature Probes For Compliance And Control
Author: Chris Miller
4. Spark Matrix™: Autonomous Mobile Robots (amr)
Author: Umangp
5. Spark Matrix™: Ai Observability Solutions
Author: Umangp
6. The Future Of Asset Intelligence: How Iot And Rfid Are Transforming Modern Operations
Author: TrackerIoT
7. Your Partner For Reliable Dynamics 365 Solutions!
Author: brainbell10
8. Download Pst Splitter Software (windows) – Split Large Pst Safely
Author: vSoftware
9. Buy Epson Thermal Printer: What To Know
Author: pbs
10. Pst To Mbox Conversion Without Losing Email Headers
Author: vSoftware
11. How Telecom Custom Order Management Software Is Transforming Customer Experience In The Digital Era
Author: Kevin
12. How To Launch A Successful Food Delivery App In Usa
Author: swizajoy
13. Flexible & Affordable Desktop Rental Solutions For Businesses | Renton Technologies
Author: Renton Technologies
14. Importance Of Good Identity And Access Management System In 2026
Author: adlerconway
15. What Is Vapt? Guide To The Introductory Vulnerability Assessment And Penetration Testing
Author: Lorcam Securities






