Cyberthreats come from different areas—whether they represent terrorists, industrial espionage, the Islamic State of Iraq and the Levant (ISIL), organized crime, nation-states or even “hacktivists” trying to shape the political environment. Multiple sources with diverse motivations are affecting activities throughout cyberspace, and there is no one-size-fits-all remedy or “silver bullet” solution.
Two years ago, the Defense Department developed the Joint Information Environment framework. Since then, key stakeholders and drivers have worked to realign, restructure and modernize the department’s information technology networks to increase collaboration while reducing the cyberthreat landscape.
No longer just the work of a one-man band playing hacker, cyber attacks launched either by state or non-state actors are a grim reality; one that is being addressed by the global cybersecurity exercise Cyber Storm 2012.
This month, Linton Wells II drew his inspiration for Mission Assurance Moves to the Fore in Cyberspace from Deputy Secretary of Defense William J. Lynn III's recently published article, Defending a New Domain: The Pentagon's Cyberstrategy. Wells summarizes Lynn's strategy points, noting that taken on a whole they have a broader implication than just cyberdefense. It has more to do with mission assurance, he says. But he has a number of concerns, among them: how will the new cyberstrategy be implemented? And how can the private sector do a better job of meeting its requirements?
NACMAST aims to broaden the view of the cyberwarfare intelligence base, and Seminole is one solid outcome of these efforts. Read the full article to learn more about this testbed and Seminole's components and operation. Share your views on this IDS architecture's current status and its potential for future success.