Securing DoD’s Networks for the 21st Century
نویسنده
چکیده
Some forty years ago, the U.S. Armed Forces began a revolution in military affairs based largely on the exploitation of information. A series of advances in position location, accurate munitions guidance, multi-spectral surveillance, data fusion and, most importantly, network connectivity resulted in a new type of military. Success in modern war of any character, scale or intensity, is increasingly a function of how successfully military institutions, insurgents and even terrorist groups are in exploiting, managing, manipulating and countering information networks. Net-based intelligence and warfare are now being challenged by the exploding field of cyber attack. U.S. adversaries are developing strategies, doctrines, operational art, tactics, techniques, technologies and specialized organizations to conduct cyber espionage and warfare. Given the U.S. military's dependence on networks, an advantage in the area of network attack could be sufficient to give our enemies a true war-winning advantage. It is no longer permissible to treat cyber security as an afterthought, an applique or even a cost of doing business. The security of the entire defense enterprise against cyber intrusion must be approached with all the seriousness and investment of resources and personnel that the U.S. military devoted to key areas of national preeminence such as nuclear weapons, electronic warfare, undersea warfare and air dominance. There is no value to investing in the best network technologies if they are vulnerable to attack. Success in future conflicts will go to the side best able to defend their networks from penetration, exploitation and attack. So, how should the Department of Defense (DoD) proceed to create a 21 st Century network security system? First, the Department must think and act strategically. The DoD's aggregation of endpoints and networks is changing and expanding with the introduction of new users, devices, capabilities and applications. Such a universe of information nodes can only be managed, directed and, ultimately, protected by a comprehensive security architecture supported and even guided by a single management system. Only with a single security architecture defining standards, rules and procedures can comprehensive security be achieved. Modern end-point security requires a centralized management platform, one that provides end-to-end situational awareness, ensures the implementation of security procedures and and supports the necessary configuration control. Establishing an appropriate organizational and management structure for DoD's networks is only the first step in the process of achieving comprehensive cyber security. Next there must be a strategy that exploits existing capabilities, enhancing them where possible and …
منابع مشابه
13: 4D-Var Data Assimilation for Navy Mesoscale NWP
The long-term goal of this Rapic Transition Process (RTP) project is to provide the warfighter with superior battlespace environmental awareness in terms of high fidelity four-dimensional (4D) depiction of the regional/mesoscale atmospheric states. This situational awareness is a key aspect of information superiority in the DoD’s strategic plan to ensure battlespace dominance in the 21st centur...
متن کامل4D-Var Data Assimilation for Navy Mesoscale NWP
The long-term goal of this Rapic Transition Process (RTP) project is to provide the warfighter with superior battlespace environmental awareness in terms of high fidelity four-dimensional (4D) depiction of the regional/mesoscale atmospheric states. This situational awareness is a key aspect of information superiority in the DoD’s strategic plan to ensure battlespace dominance in the 21st centur...
متن کاملManagement Accounting Education for the 21st Century Firms
Management accounting has become a subject of hot debates over the last four decades and has undergone a major transformation. It is argued that traditional management accounting roles have either disappeared or been changed. The debate is based on the belief that roles of ‘Management Accountants’ require new forms of education and training, with more emphasis on the practicality of the subjec...
متن کاملSecuring Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining
Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...
متن کامل16th century Persian tiles in dialogue with 21st century digital tiles in the Sadrian universe
This article brings together tiles of 16th century Persian architecture and 21st century digital tiles of moving image to explore new potentials beyond the perceived image. As minimal parts of a bigger image, they both appear still and motionless. However, Persian Islamic philosopher, Mulla Sadrā Shirazi’s (1571-1640) theory of ‘substantial motion’ (al-harakat a...
متن کامل