“The five strategic initiatives detailed by the Department of Defense (DoD) include:
- DoD will treat cyberspace as an operational domain to organize, train, and equip so that DoD can take full advantage of cyberspace’s potential.
- DoD will employ new defense operating concepts to protect DoD networks and systems.
- DoD will partner with other U.S. government departments and agencies and the private sector to enable a whole-of-government cybersecurity strategy.
- DoD will build robust relationships with U.S. allies and international partners to strengthen collective cybersecurity.
- DoD will leverage the nation’s ingenuity through an exceptional cyber workforce and rapid technological innovation.”
This article was posted back in July so it’s slightly dated but still relevant for this blog. In the ever changing and evolving cyber world; defenses are getting smarter and stronger, however, so are the hackers. The five strategic initiatives I posted above are very general strategies but you can read more in depth information on each strategy here: http://www.defense.gov/news/d20110714cyber.pdf
It is interesting to hear about how some of the most significant networks and their data are being protected from malicious activity.
“Our responsibility is to acknowledge this new environment and adapt our security instruments to it. That is the purpose of the DoD Cyber Strategy.”
On the other hand, I feel that by publicly describing and posting these strategies it slightly comprises their security. Security buffs aren’t the only people reading these articles; but, the hackers are as well. Even though these are extremely vague descriptions it might give the right(or wrong) person the edge he or she needs to exploit a security system.
“We must prepare. We must recognize the interconnectedness of cyber. And we must be mindful of the many ways cyberspace is used–as a peaceful instrument of global communications, as a tool for economic growth–and, also, as an instrument to threaten and sometimes cause harm,”