Essay On Cybersecurity In The Military

Improved Essays
What the Military Can Teach the Private Sector About Cybersecurity
Data breaches within the United States have hit an all-time high. The Identity Theft Resource Center estimates that the year-over-year increase for cyberattacks is 27.5%. Nowadays, it’s not a question of whether an attack will happen, but when. As a result, businesses should take a military-approach to cybersecurity.
What Is a Military-Approach to Cybersecurity?
Have you ever heard of the United States military’s data being breached? No, and for good reason. The military takes a comprehensive approach to cybersecurity. The military uses a multi-pronged approach and “active defense” to ensure they are capable of thwarting intrusions. An active defense includes adopting an operational security approach that considers all three dimensions of vulnerability: behind the firewall, beyond the firewall, and the Internet of Things, such as wearables.
…show more content…
The following are three strategies that a military-approach to security effective comprises.
Take a non-cooperative assessment of your security network. A non-cooperative assessment is a deep examination of your security protocols from the outside. You can determine how effective your current protocol is by practicing cyberattacks on your system. Once you find gaps, fix the problems, and you are on your way to a fortified network.
Take a cooperative assessment of your security network. After conducting a non-cooperative assessment, securing your network requires assessing the network from the inside. Hire a security professional to plug into your network to determine where you have vulnerabilities.
Assess your technologies and equipment. It is mission critical that you assess the state of your current technologies and equipment to ensure that you are up-to-date. Dated technologies are one of the reasons many SMBs’ networks are vulnerable to sophisticated

Related Documents

  • Improved Essays

    Woodburn Graphics

    • 523 Words
    • 3 Pages

    Woodburn’s network security stance needs to evaluate the idea of a more secure network. The potential cost to resolve attacks has surpassed the network protection cost. In order to minimize costs of future incidents, the company may undergo the strategy of “Avoiding the risk,” by implementing more safeguards and information security or crisis management…

    • 523 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    According to the Zertag video the three classes of cyber-attacks are intellectual property theft, attacks that disrupt our way of life and attacks that threaten the military’s ability to defend itself. The effects of intellectual property theft are that it will degrade our economic competitiveness. The effect of attacks that disrupt our way of life is attacked that disrupt our infrastructure like 9/11. After 9/11 Americans were shaken and the government cracked down on airport security, immigration, and the war of terrorism. The effect of attacks that threaten the military's ability to defend itself is that it will leave us vulnerable to other attacks, other countries, and more deaths of…

    • 111 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Internal Security Audits

    • 537 Words
    • 3 Pages

    The Veteran Affair’s Office of Information & Technology Risk Management Team is performing an overview of internal security audit to determine how the Department of Veterans Affairs follows the Health Insurance Portability and Accountability Act (HIPAA) of 1996. “The Health Insurance Portability and Accountability of Act demands that all HIPAA covered businesses prevent unauthorized access to “Protected Health Information” or PHI. PHI includes patients’ names, addresses, and all information pertaining to the patients’ health and payment records.” ("HIPAA.com - Compliance Made Easy," n.d.) Ensuring that the appropriate measure should be enacted to better protect confidential information of the people they serve.…

    • 537 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Gender In Cybersecurity

    • 973 Words
    • 4 Pages

    Gender Gap in Cybersecurity Cyberwarfare is now an integrated part of China’s military strategy according to the US Department of Defense. And in January 2010, Google announced that a major cyber attack from China had penetrated its corporate infrastructure and stolen information from its computers. This raises the awareness that cybersecurity have become an important role in national security. Cyber attack can be used in three major categories — economic, military and social adversaries. For example, China hacked into Gmail accounts of some human rights activists to strike social adversaries; Military concern is the most important in cybersecurity because hacking into the Pentagon can result in the leak of sensitive military deploy.…

    • 973 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    A RISK-BASED APPROACH TO VULNERABILITY REMEDIATION Introduction When it comes to data security, nothing is more important than understanding where you are most vulnerable. This is why many companies have realized that annual vulnerability assessments aren’t sufficient. Under a new vulnerability management model, successful companies have moved to monthly or quarterly scanning. Vulnerability assessments are still only a small part of the battle, though.…

    • 727 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The Army has seen significant movements in human issues as the internet has empowered impressive impact over human and machine conduct. Inability to adjust to this new operational duality (the joining of the area and the internet areas to permit…

    • 1193 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Moving Target Defense is a cyber security approach that is being developed to replace the current static defense with a dynamic defense (See Figure 7). This emerging cybersecurity approach increases the difficulty that threat actors face when attempting to breach an information system by fluctuating the “attack surface” and employing resilient hardware (DHS, 2016). Additionally, by employing this approach, the organization is hardening the security of its information systems to a point where it has become too expensive and complex. This should motivate threat actors to skip the organization employing the Moving Target Defense approach and seek out easier targets. There are several ways that an organization can employ Moving Target Defense to safeguard…

    • 1555 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Security Security Overview Security is a growing problem in our technological advanced society, and it is a very important issue in the survival of any business. From small sole trader type of businesses to huge corporations, all are cognizant of one form or another of the vast types of security issues that it potential can face. Security is defined as freedom from risk or danger, which means protection from intentional and malicious acts of others (Gilley, 2009). It is crucial to a business because it affects the operations of the business, and information on how the business operations such as its methods for production or services, physical safety, financial information, employee records, and customer data (Gilley, 2009).…

    • 2039 Words
    • 9 Pages
    Improved Essays
  • Superior Essays

    What Is Cyber Security?

    • 1268 Words
    • 6 Pages

    Running head: Technology and Cyber-security Technology and Cyber-security 7 Technology and Cyber-security Name: Institution: Course: Tutor: Date: Introduction Cyber security has become a serious trade-off, a tag of war technical war between the defender and the attack. The vast changes in technology affect both; defenders are using technology to fend off attackers, and attackers employing the same technology to get away with the defenders?…

    • 1268 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Maintaining the security for a network can be challenging task. Hackers often seem to be one step ahead of network users, even those who are following the best security practices. However, securing the network is essential to protecting for privacy, reducing the risk of identity theft, and preventing hackers from steal of important data. Before company reconnect the network can take a security practices for protecting company sensitive information and data by preventing, detecting, and responding to a wide variety of attacks. I will provide more security for our company network by constructing firewalls and regular updating the login and password credentials (Whitman, Mattord, & Green,…

    • 855 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Characteristics of Good Risk Scenarios It is very important for risk scenarios to be realistic and unbiased so that the management feel assured while taking decisions. According to COBIT (2014), a risk scenario should have the following characteristics to add real value to risk analysis. • Relevance – Scenarios should be result in derivation of meaningful information that would help support decision making.…

    • 917 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Introduction During the last SLP report on information security management the concerns of the organization VPN were discussed. However, in this module we would like to use a big brush and with the use of wide strokes examine the impact of continuous monitoring pertaining to information security systems. While the VPN issues are important it actually points to a bigger concern for the organization. This article will focus on two areas of information security system which are “continuous monitoring” and “security awareness”.…

    • 889 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    A Vulnerability Assessment needs to be completed to identify weaknesses in the network security configuration in order to suggest changes. We must keep in mind that documentation on how the network systems are configured is critical for the recovery process during a penetrating testing. Vulnerability Assessments are designed to identify network weaknesses and help coming with security improvements and remedies. Penetration testing is a testing method that tries to exploit a weakness in the system to prove that an attacker could successfully penetrate it.…

    • 706 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    1. Information Security Program is the overall effort of the organization, which includes all projects and activities, in relation to the improvement of the information security. It can be viewed as the set of controls that an organization needs to govern. In order for program to be successful, it needs to be have a continuous lifecycle, which means that it never ends. This program has four phases, and they are: Assess, Mitigate, Validate, Sustain.…

    • 980 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nessus: A Case Study

    • 731 Words
    • 3 Pages

    With everyday life increasingly spent using computers and mobile devices, the privacy and security of your information is of a critical important. It doesn’t matter if you a big organization or a social user cyber security affects everyone. cybersecurity should be a top priority for all organization big all small. Given the advance change in the land scape, even the most trained team of administrators would have a difficult time keeping up. Information assurance company must conduct penetration testing on a regular basic, so that all the vulnerability that present on the network would be detect and closed up, in other to make it difficult for hacker to exploit the system.…

    • 731 Words
    • 3 Pages
    Improved Essays