Wednesday, May 6, 2020

The Dod Developed The Cyber Strategy - 1072 Words

Case Study Description The DoD developed the cyber strategy with three primary missions in mind. The first mission is to defend DoD networks, systems, and information. Next is to defend the U.S. homeland and U.S. national interests against cyberattacks of significant consequence and finally to provide cyber support to military operational and contingency plans. To accomplish this mission, the Secretary of Defense and the current USCYBERCOM Commander acknowledges that the â€Å"DoD must develop its cyber forces and strengthen its cyber defense and cyber deterrence posture† (Special Report: Cyber Strategy, n.d.). With this in mind the DoD set the requirement to have all 133 of USCYBERCOM’s cyber teams achieve initial operating capability by the†¦show more content†¦In regards to policy and doctrine, the assessment would need to utilize three main documents, namely the Cyber Force Concept of Operations and Employment (CFCOE), the Joint Cyberspace Training and Cert ification Standards (JCTCS), and the Cyber Mission Force Joint Training and Readiness Manual (TR Manual). The CFCOE is a comprehensive, evolving, document defining CMF teams’ roles, functions, and operational processes. Next, the JCTCS defines the knowledge, skills, and abilities required for each cyber mission force work role (i.e., position). Lastly, the TR Manual stipulates the requirements to assess individual and team readiness using a common set of joint tasks, conditions, and standards for all cyber mission team positions (Department of Defense, 2014). Key stakeholders included Office of the Secretary of Defense (OSD), the Armed Services, the Joint Staff, the National Guard Bureau, USCYBERCOM. By developing a comprehensive assessment to evaluate the cyber team’s ability to meet full operational capacity, this project outcome would nest in the overall USCYBERCOM cyber strategy of developing cyber forces and strengthening the United States cyber defense and cyber deterrence posture while building cyber capabilities and organizations. Describes the project outcome The project was successful in the deliverance of the objectives outlined by the key stakeholders in accordance with theShow MoreRelatedCase Study : Quantum Dynamics Inc.841 Words   |  4 PagesQuantum Dynamics Inc. is a SBA Certified Woman-Owned Small Disadvantaged Business headquartered in Macon, GA with regional offices in McLean, VA, Fort Gordon, GA, Huntsville, AL, and Fayetteville, NC. Our core competencies are Cyber Security, Training, Information Technology, and Logistics. We have 15 years in business, are a successful graduate of the 8a program, and provide solutions that are innovative, efficient and resourceful. We find ways to achieve more with less; to consolidate while modernizing;Read MorePresident Reagan Signed Into Law A National Security Decision Directive1344 Words   |  6 PagesCongress to pass a bill, assigning the National Bureau of Standards (now NIST), under the Department of Commerce, responsibility for developing standards a nd guidelines for the security of Federal computer systems, drawing upon technical guidelines developed by the NSA when such guidelines are consistent with the requirements for protecting sensitive information. NSA took control of security of military classified networks and computers. According to Fred Kaplan, in his book, Dark Territory, Fred explainsRead MoreCreating A New Cyber Force1182 Words   |  5 Pagesbattlefield domain where a keyboard and mouse are the new weapons of conflict. With land, sea, air and space in the background, warfare has entered a fifth domain: cyber. In this position paper, using a pro and con format, the debate on whether or not the Department of Defense (DoD) should create a new, independent branch for cyber will be discussed. To do this, the following will examine both sides of debate by highlighting two main points: the elimination of duplication of effort and the intensiveRead MoreHomeland Security And Homeland Defense1390 Words   |  6 PagesCentury defines homeland security as, â€Å"the protection of the territory, critical infrastructures, and citizens of the United States by Federal, State, and local government entities from the threat or use of chemical, biological, radiological, nuclear, cyber, or conventional weapon s by military or other means.† (2006, pg. 24). The five current primary missions of the DHS are preventing terrorism, securing borders, enforcing and administering immigration laws, securing cyberspace, and preparing and respondingRead MoreMilitary Cyber Systems Can Be Attacked From External And Internal Threats1768 Words   |  8 Pages an author who investigates and writes on the topic of cyberwar stated, â€Å"the absence of historical data makes it nearly impossible to analytically calculate the probability of a genuine cyber Armageddon (2014).† Past exploitations of military cyber systems and their consequences History shows that military cyber systems can be attacked from external and internal threats. In 2008 a flash drive infected with malicious code spread throughout the system once an internal user connected it to a militaryRead MoreA New Cyber Security Initiative For The Army Materiel Command1678 Words   |  7 Pagesrecruited to set up and lead a new cyber security initiative for the Army Materiel Command (AMC), a 53 Billion dollar year logistics command that serves as the army version of amazon for the army’s current inventory of weapons, supplies and vehicles. AMC, at this time, had over a 100k workforce spread across 140 locations worldwide. During this timeframe, the Department of Defense was still trying to define Cyber Security and mature the process they had in place. DOD was a large target and AMC rankedRead MoreIdentifying And Prosecuting Computer Crime2560 Words   |  11 Pagesdevelopment of any society is accompanied by a unique pattern of crime. The innovation of digital technology came to us as a blessing but not without its’ dark side. This innovation brought about novel challenges popularly referred to as cyber-crime. Policing the prevalence of cyber-crime and its threat to electronic commerce has been of great concern to all government. Twenty-first century, the criminals increasingly rely on advanced technologies and Internet to promote their illegal operations. AccordingRead MoreStrategic Direction On The United States1647 Words   |  7 PagesThe United States will not be able to effectively rebalance the Joint Force in 2025 unless sequestration is reversed. The current U.S. strategic direction has prompted a shift of military resources to the Asia-Pacific. Globalization, cyber-attacks and advances in technology will further challenge the Joint Forces in the next ten years. It is imperative that the U.S. Joint Forces be adequately funded in order to identify and develop critical technology, establish policies and maintain adequate forceRead MoreThe Department Of Defense s Operational Risk Management Essay1590 Words   |  7 Pagesoperations; mission essential functions; planning development; and preparedness. Furthermore, it will look what types a factors should be looked at when making an organizations plans . In addition, this paper will look at mitigating risks, specifically cyber and physical risk mitigation and some of the different approaches risks can be mitigated. Finally, this paper will briefly look at the Department of Defense’s Operational Risk Management process and how it ties planning and mitigation together. Read MoreWhen Cybersecurity Policy Is Discussed The Topics Often1145 Words   |  5 Pagesoften focus on technology, corporate culture, and security awareness. The success of an organization in defending its most valuable asset, data, depends on the proper implementation of several security practices. Ensuring that the â€Å"human aspect† of cyber security is addressed is vital, for the culture of an organization can greatly impact both the security posture and defense of information networks. This paper addresses the human aspects responsible for SCADA System vulnerabilities and provides a

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.