Securing DoD’s Networks for the 21st Century

نویسنده

  • Daniel Goure
چکیده

Some forty years ago, the U.S. Armed Forces began a revolution in military affairs based largely on the exploitation of information. A series of advances in position location, accurate munitions guidance, multi-spectral surveillance, data fusion and, most importantly, network connectivity resulted in a new type of military. Success in modern war of any character, scale or intensity, is increasingly a function of how successfully military institutions, insurgents and even terrorist groups are in exploiting, managing, manipulating and countering information networks. Net-based intelligence and warfare are now being challenged by the exploding field of cyber attack. U.S. adversaries are developing strategies, doctrines, operational art, tactics, techniques, technologies and specialized organizations to conduct cyber espionage and warfare. Given the U.S. military's dependence on networks, an advantage in the area of network attack could be sufficient to give our enemies a true war-winning advantage. It is no longer permissible to treat cyber security as an afterthought, an applique or even a cost of doing business. The security of the entire defense enterprise against cyber intrusion must be approached with all the seriousness and investment of resources and personnel that the U.S. military devoted to key areas of national preeminence such as nuclear weapons, electronic warfare, undersea warfare and air dominance. There is no value to investing in the best network technologies if they are vulnerable to attack. Success in future conflicts will go to the side best able to defend their networks from penetration, exploitation and attack. So, how should the Department of Defense (DoD) proceed to create a 21 st Century network security system? First, the Department must think and act strategically. The DoD's aggregation of endpoints and networks is changing and expanding with the introduction of new users, devices, capabilities and applications. Such a universe of information nodes can only be managed, directed and, ultimately, protected by a comprehensive security architecture supported and even guided by a single management system. Only with a single security architecture defining standards, rules and procedures can comprehensive security be achieved. Modern end-point security requires a centralized management platform, one that provides end-to-end situational awareness, ensures the implementation of security procedures and and supports the necessary configuration control. Establishing an appropriate organizational and management structure for DoD's networks is only the first step in the process of achieving comprehensive cyber security. Next there must be a strategy that exploits existing capabilities, enhancing them where possible and …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

13: 4D-Var Data Assimilation for Navy Mesoscale NWP

The long-term goal of this Rapic Transition Process (RTP) project is to provide the warfighter with superior battlespace environmental awareness in terms of high fidelity four-dimensional (4D) depiction of the regional/mesoscale atmospheric states. This situational awareness is a key aspect of information superiority in the DoD’s strategic plan to ensure battlespace dominance in the 21st centur...

متن کامل

O2- Gifted Identification in the 21st Century

لطفاً به چکیده انگلیسی مراجعه شود.

متن کامل

4D-Var Data Assimilation for Navy Mesoscale NWP

The long-term goal of this Rapic Transition Process (RTP) project is to provide the warfighter with superior battlespace environmental awareness in terms of high fidelity four-dimensional (4D) depiction of the regional/mesoscale atmospheric states. This situational awareness is a key aspect of information superiority in the DoD’s strategic plan to ensure battlespace dominance in the 21st centur...

متن کامل

Management Accounting Education for the 21st Century Firms

Management accounting has become a subject of hot debates over the last four decades and has undergone a major transformation. It is argued that traditional management accounting roles have either disappeared or been changed. The debate is based on the belief that roles of ‘Management Accountants’ require new forms of education and training,  with more emphasis on the practicality of the subjec...

متن کامل

Securing Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining

Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...

متن کامل

16th century Persian tiles in dialogue with 21st century digital tiles in the Sadrian universe

This article brings together tiles of 16th century Persian architecture and 21st century digital tiles of moving image to explore new potentials beyond the perceived image. As minimal parts of a bigger image, they both appear still and motionless. However, Persian Islamic philosopher, Mulla Sadrā Shirazi’s (1571-1640) theory of ‘substantial motion’ (al-harakat a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015