The increasing use of readily available and inexpensive commercial technologies by the military is changing the way the Defense Information Systems Agency provides information assurance. As these technologies are integrated into the Defense Department information infrastructure, the agency is adjusting its approaches to providing security for its networks and the data that reside on them.
Global Intelligence Featured
While many cybersecurity experts preach the gloom and doom of more advanced adversaries attacking U.S. networks, one government official contends that U.S. network defenders can meet the challenge. Training, education and technological improvements are showing dividends in a better-prepared cyber workforce.
Digital marauders have set their sights on the critical infrastructure and are likely to strike soon with major effect. Several different elements of the infrastructure are vulnerable to attack by all manner of cyberspace players ranging from malevolent individuals to hostile nation-states.
An established superpower is dealing with multiple threats to its interests around the world. An emerging global economic and military/naval power is making its presence felt throughout the world, particularly in Asia. The intelligence community is confronted with a complex environment punctuated by socio-economic power shifts and revolutions in communications, commerce and transportation. World intelligence organizations face internal and external terrorist and anarchist threats as well as exploding population growth and resource competition in strategically critical regions. Compounding these challenges are intelligence budgets that range from uncertain to non-existent.
Commanders wrestling with control of cyberspace elements now have a new tool to help them secure their corner of cyberspace in an operational setting. The Adaptive Network Defense of Command and Control concept of operations enables joint force commander control of key terrain in cyberspace, based on assessments at an operational tempo. To achieve a joint force command objective, network operators concentrate cybersecurity and monitoring of command and control systems to maintain the initiative against adversarial attacks and provide enhanced situational awareness.