• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2022

CYBER DEFENSE

October 12, 2012 by

THE UNITED STATES CURRENT CYBER DEFENSE LANDSCAPE OVERVIEW
By Victoria Loewengart

Cyber security had become an issue of outmost importance in recent years. The daily existence of our country, as well as the world, is tightly integrated with computer networks and the internet. Our industries, governments, military and financial institutions cannot function without rapid exchange of data over the networks. That gives us communication and data processing capabilities unprecedented in the history of mankind, but the disruption of these systems can go as far as halting not just these institutions, but our way of life. Thus, cyber security and cyber defense go far beyond having the right software and hardware. Cyber security has to be a holistic approach to defense in cyber space, and it must encompass political, structural, and organizational aspects of our networked civilization.

America’s Computer Network Operations (CNO)

In order to understand the challenges in the cyber defense area for the United States, one must evaluate its Computer Network Operations (CNO) capabilities and address the US capabilities in each of the three subcomponents of CNO: Computer Network Defense (CND), Computer Network Exploitation (CNE) and Computer Network Attack (CNA).

Computer Network Defense (CND) is defined as, ‘defensive measures to protect information, computers, and networks from disruption or destruction’ (Paul 2008). The United States made considerable strides in the last decade in improving CND capabilities. These capabilities include both ‘hard’ and ‘soft’ measures.

‘Hard’ measures, which have been implemented within military and civilian infrastructures, are network software- and hardware- related defenses. These measures include hardware devices and software firewalls to physically prevent unauthorized access to the sensitive information, public key infrastructure (PKI), virus scanners, honeypots and honeynets, secure applications, sophisticated encryption, and biometrics for secure access – to name a few (Armistead 2004; Paul 2008).

‘Soft’ measures are measures related to people and to human behavior. It has been acknowledged that many network vulnerabilities are created or exploited by insiders, either out of carelessness and ignorance, or with malicious intent (Armistead 2004; Paul 2008). Therefore, soft measures involve policies and procedures, such as strong passwords, proper steps in access and usage of secure systems, astute COTS and GOTS purchasing practices, preemptive knowledge of potential hackers and their methods, security clearances of the personnel, and enforcing the ‘security culture’ (Armistead 2004).

It only takes one successful cyber attack against our military or industrial infrastructures to become the top story in the news, but cyber attacks on our military and civilian institutions are numerous and vicious. Defense Department (DoD) systems are attacked 75,000 times per year with intrusion attempts (Lasker 2005). Attacks come from all over the world, with China being one of the most prolific and persistent attackers.

Reactive defenses, such as fire-walls and anti-virus checks are no longer enough. In order to be more effective, the US CND must become more proactive. Honeypots and honeynets are the steps in the right direction. Research on counterattacking, also known as aggressive self-defense, active defense, or strike-back, has taken place for many years (Weeks 2011). The counterattacks range from passive approaches to full remote exploitation. Many antivirus firms and other research organizations have run large honeynets to collect malware and attack signatures (Weeks 2011). These organizations research and implement counterattacks to deceive, crash, exploit, or just get information on attackers.

Computer network Exploitation, CNE, is essentially an extension of Signals Intelligence (SIGINT), or more precisely Communications Intelligence (COMINT). CNE is all about exploitation of

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • InVeris
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • DSEi
  • Atkins
  • IEE
  • EXFOR logo
  • KME logo
Hilux DVD2022

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    May 20, 2022
    Read more
  • MANAGEMENT ON THE MOVE

    May 20, 2022
    Read more
  • CONTRACT NEWS IN BRIEF

    May 20, 2022
    Read more

Copyright BATTLESPACE Publications © 2002–2022.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT