Military Cyber-Security for the Digital Age


Globalization and the availability of advanced technologies that enable even the smallest fringe elements to wreak an unprecedented amount of havoc and destruction, Military and government installations have much higher demands for data security and storage.
Protecting sensitive information from adversaries has been part of security since man first began to establish communities. Critical Infrastructure Protection (CIP) has always played a role in national defense, and although the nature of the assets to be protected has changed, the reasons remain the same: to keep vital information out of the hands of potential adversaries.
With the increased destructive power and easy availability of technology, threats to local, national and international security have never been more widespread or terrible in their potential implications; criminal elements can cause the collapse of financial systems or global chaos with one keystroke.

A Shift in Perspective
The protection of sensitive data is essential, with the potential to cost billions of dollars in losses and millions of hours of productivity. However, the development of targeted cyber attacks that can engage weapons systems or lower defense systems has even more insidious and deadly implications. Game-changing events like the Stuxnet worm that infiltrated the Iranian SCADA system in 2010 have forced military defense planners to revise and develop protocols to meet the demands of security in the modern age. These include separate departments that are exclusively devoted to data protection and counter-measures and fostered a new spirit of cooperation between both national and international governments and their military defense strategies. This is more necessity than a nicety, due to the nature of cyber-terrorism, which is invisible and impervious to physical borders.

The Future of Protecting Military Defense Technology
As the focus shifts from ground wars to technological warfare, military strategists need more comprehensive mechanisms for technological training and implementation. There is also a trend toward developing more agile proactive, rather than reactive, measures. The Department of Defense has identified three main areas for their cyber mission:
1. Defending DoD networks and information systems
2. Protecting National interests from cyber attacks and their consequences
3. Providing support for military defense plans and operations
The implementation of the DoD cyber defense mission is divided among a number of tactical teams, each responsible for a specific sector. There are currently 13 national missions team whose job it is to protect our country and its interests against cyber attacks. 68 cyber protection teams that are tasked with identifying and prioritizing threats against DoD networks and computer systems and 27 combat mission teams that protect and support commands by generating operational cyber support. There are also 25 support teams that perform analysis and planning functions for all other teams. These teams are jointly and separately responsible for strengthening our cyber defense systems and deterring cyber terrorism at home and abroad.

The spirit of cooperation also exists between the military and industry. In addition to developments by planners within the military, the government enlists a number of innovations from manufacturing concerns that specialize in developing products and solutions for national defense. These include tangible, physical protective mechanisms, like high-tech gates and barriers, and cyber solutions.
As a result of globalization and the availability of advanced technologies that enable even the smallest fringe elements to wreak an unprecedented amount of havoc and destruction, Military and government installations have much higher demands for data security and storage. Companies Gibraltar Barriers and Security are at the forefront of providing comprehensive solutions for protecting the integrity of sensitive information that affects our personal and public safety.

About chainsoff.

Intelligence Media Service, Monitors and Analyzes Extremists’ activities, including and not limited to: The Muslim Brotherhood, Kurdish Terrorism, Syrian Politics, Jabhet Al-Nusra, Hezbollah, Cyber Crime, and Taliban activities in Syria. Well known for her deep knowledge on Terrorism. Open Source Exploitation expert in the discovery, collection, and assessment of foreign-based publicly available information, also known as Open Source Intelligence (OSINT), HIMNT
This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s