Monday, November 6, 2017

How Cyber Security For Department Of Defense Is Needed

By Janet Reed


The US government will often need to be serious about being able to defend itself. The concerns here will range from physical security, to securing installations or have regulations protecting equipment, personnel and such. Much of the stuff that will be addressed may truly be relevant for national issues, and government is one of the biggest consumers of technical stuff for security.

Most of the technical items will include many kinds of protective technology. To this belongs things like cyber security for Department of Defense Huntsville AL. Only lately has the US government and the department in question created a relevant processes, programs and agencies to protect themselves against intrusions to or violations of cyberspace.

Hackers from China sponsored by their government have been attacking US cyberspace. Russians have gotten into the picture in the recent elections and the current admin has connected it to the internet. About a few years ago, WikiLeaks exposed the dealings of intelligence agents and agencies and how they have violated some international laws.

Hackings is a way of life for those many pros and geeks working in this field. Many times, there were cases when even younger folks got into the DoD networks and accessed classified or sensitive data. The prevalent fear is an enemy silent entering the classified precincts of these networks, and take out data that will compromise operations and security.

The cyber strategy now used for this department that handles the military establishment deals or has three important points. One is about putting up a general cyber defense line that protects entire networks, information, databases and the like. This is the main line and provides a kind of overview process for defending the department.

There is also an offensive pattern that is used. This is the active protection and security net that works to defend the homeland from all types of attacks based on the internet and online processes. The security of databases and online networks today is a primary reason for the entire strategy, because the government has converted most if not all of its data resources to online ones.

Any and all attacks on cyberspace will therefore potentially wreak havoc on all levels, and even provide actual physical effects on nation, people and structures. The levels for these are several, and responses are patterned according to level needs. The national emergency that could arise is treated in the higher levels, which could be total destruction of larger systems.

The last is mostly about all things operational in the military sense, and this is the main value that the department has invested on. An entire program of acquiring all sorts of defensive software, machines and computing devices has already been in operation for some time. The war on terror was more or less a test bed for these.

The results have been carefully studied, classified, collated, analyzed and categorized and are now in use for the current cyber strategy and its processes and operations. The length of time it took has made critics think how government has actually been a laggard in this area. But in actual practice, it has constantly evolved both process and tech, which has created this new and better system.




About the Author:



0 comments:

Post a Comment

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More