The Way Cyber Security For Department Of Defense Works

By Janet Reed


The US government will often need to be serious about being able to defend itself. The concerns here will range from physical security, to securing installations or have regulations protecting equipment, personnel and such. Much of the stuff that will be addressed may truly be relevant for national issues, and government is one of the biggest consumers of technical stuff for security.

A lot of these may include technology that could protect cyberspace. To the category belongs things like cyber security for Department of Defense Huntsville AL. Only recently have things like programs, agencies and processes been created for protecting government and this department from any kind of illegal incursions into their own spaces in the cyber world.

Hackers in China and even the Chinese government using cyber attacks is old stuff. The Russian brouhaha related to the current administration has a significant part that is related to internet use. The WikiLeaks scandal exposed the underside of intelligence gathering and operations in American and its respective spy and security agencies.

Hacking is also a way of life for many tech savvy geeks or professionals. And there have been reported cases of young hackers going into the DoD cyber networks and getting all sorts of sensitive information. The main fear is if this occurs with an enemy hacker doing the job, which could compromise many programs and operations.

The cyber strategy now used for this department that handles the military establishment deals or has three important points. One is about putting up a general cyber defense line that protects entire networks, information, databases and the like. This is the main line and provides a kind of overview process for defending the department.

The second point is about providing offensive patterns. This defense is an active one that responds when any network is attacked, protecting itself and the homeland from all interned based attacks. Databases and other online resources in this day and age need to be protected, the main reason for the strategy, which is badly needed ever since government converted to total online use.

Any attack in this sense will therefore provide massive loss and could sow actual physical damage on the nation, its people and its installations. There are several levels to these, and the responses are also targeted to answer each specific level. National emergencies can arise from a couple of these, which could mean a totally destructive attack on the national system.

The third point addresses that operations on all military branches, and the department has invested a lot on this. For instance it has run programs, use machines and computers that are involved in waging war on the cyberspace level, both defensive and offensive and these are now dated. It started during the recent war, which was the operational test bed.

The results have been carefully studied, classified, collated, analyzed and categorized and are now in use for the current cyber strategy and its processes and operations. The length of time it took has made critics think how government has actually been a laggard in this area. But in actual practice, it has constantly evolved both process and tech, which has created this new and better system.




About the Author: