U.S. Military Outlines Cyber Security Strategy

  /     /     /  
Publicated : 22/11/2024   Category : security


U.S. Military Outlines Cyber Security Strategy


The strategy focuses on bolstering the militarys cyber defenses with new technology, new organizations, and new partnerships with the private sector and foreign allies.



(click image for larger view)
Slideshow: Inside DHS Classified Cyber-Coordination Headquarters
The U.S. military could respond to serious cyber attacks, even on private infrastructure, with a proportional and justified military response, deputy secretary of defense William Lynn said Thursday during the announcement of the Department of Defenses Strategy for Operating in Cyberspace, the U.S. militarys first comprehensive blueprint for cybersecurity and cyberwarfare.
In releasing the
strategy
, officials pointed to a continuing increase in the number and severity of cyber threats. For example, Lynn detailed a March attack in which 24,000 files related to a weapons system being developed for the DOD were stolen from a defense contractor in an attack that the department suspects was the act of a foreign intelligence service. Lynn said that the attack removed sensitive design files, and that the DOD is currently assessing whether it needs to redesign any part of the system as a result of the attack.
The centrality of information technology to our military operations and our society virtually guarantees that future adversaries will target our dependence on it, Lynn said. Our assessment is that cyber attacks will be a significant component of any future conflict.
In response, Lynn said, a strategy to prepare for and defend against cyber hostilities is key to the DODs mission. The DODs strategy is founded on five pillars: treating cyberspace as an operational domain like land or sea, introducing improved defenses and new operating concepts for DOD networks, working with DHS and the private sector to secure critical infrastructure, working with the international community, and building a stronger cyber workforce and investing in cybersecurity research and development.
The cyber strategy is but one piece of a larger push by the Department of Defense to address cybersecurity, and the key pieces of DODs strategy can be seen in some of the militarys recent actions on cyber as well as its plans for the future.
Last year, for example, DOD
created
U.S. Cyber Command, a new military unit dedicated to protecting military networks from attack, and the DOD is now working to integrate cyber scenarios into its exercises and training, including the use of cyber red teams during war games. It also deepened its cooperation with the Department of Homeland Security, which protects the federal governments civilian networks from attacks.
The international arena is another important part of the DODs strategy, as the military has ramped up cooperation with key allies like Australia, Canada, the United Kingdom, and Japan. Lynn called international law in cyberspace one of the great challenges of cybersecurity, and said that the United States would pursue international forums to set up international norms, possibly including treaties.
Lynn highlighted the
Defense Industrial Base Cyber Pilot
, a voluntary effort in which the DOD is working with a handful of defense contractors and Internet service providers to identify and stop attacks on their networks. While the pilot has only been up and running for a few months, Lynn said that it has already begun stopping intrusions for some of those companies involved. The pilot is scheduled to end later this summer, and DOD will then determine whether and how to expand the program.
In addition, Lynn said, DOD has committed about $500 million to cybersecurity R&D. Among the research Lynn highlighted are efforts to have computers automatically adapt to new threats, and to keep data encrypted as we perform regular computer operations.
The aim of the strategy, according to Lynn, is not only to prepare the military for emerging cyber threats, but also a bit of a public relations exercise, an effort to address concerns that cyberspace is at risk of being militarized and fundamentally altered by the militarys efforts to defend it. That view, Lynn implied, is inaccurate, and he affirmed the militarys commitment to an open Internet. The strategy we are announcing today provides a framework for us to promote our nations values in this vital civilian space while carrying out our duty to protect the nation, Lynn said.
The DOD strategy took shape over the last several months under the leadership of a number of top DOD and White House officials. In addition to Lynn and Gen. James Cartwright, other key officials Lynn cited in his speech included White House cybersecurity coordinator Howard Schmidt, DOD CIO Teri Takai, DOD cyber policy lead Bob Butler, U.S. Cybercom commander Gen. Keith Alexander, and DOD principal deputy undersecretary for policy Jim Miller.
What industry can teach government about IT innovation and efficiency. Also in the new, all-digital issue of InformationWeek Government: Federal agencies have to shift from annual IT security assessments to continuous monitoring of their risks.
Download it now
. (Free registration required.)

Last News

▸ New threat discovered: Mobile phone ownership compromised. ◂
Discovered: 23/12/2024
Category: security

▸ Some DLP Products Vulnerable to Security Holes ◂
Discovered: 23/12/2024
Category: security

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
U.S. Military Outlines Cyber Security Strategy