Cyber Security In Military

Read Complete Research Material



Cyber Security in Military

Cyber Security in Military

Introduction

The purpose of the following paper is to give the readers an idea about the cyber security issues related to military. The main focus of the paper is the working of the US military officials against the cyber terror and thus formulating the different strategies to overcome the cyber threats.

Discussion

To began the discussion of the paper, an important point that need to be highlighted here that US military officials set up a special division of army by the name of 'U.S. Army Cyber Command/ 2nd Army'. The main purpose of this command is to regulate the cyber terror and prevent the U.S. from the possible cyber terrorism .

To handle the cyber security, Pentagon released a document by the name of 'Strategy for Defense in Cyberspace'. The motive behind this document was to praise the companies who have implemented the best practices in the industry, including the promotion of safe computing from users, so its "healthy" design and secure networks and calls clearly draw on private sector practices for securing networks. "The Department of Defense will integrate the goals of continuous renewal implemented in the private sector, to strengthen its own computing devices and maintain best practices in the field of cyber security," and insists the document. "These practices sound must be applied by all people at all times. Because, it is also important to mobilize people to protect themselves as maintaining security software and operating systems up to date. 

This initiative builds on current conditions in the private sector to achieve certain goals. For example, the Ministry of Defense invites ISPs to cooperate with the government to help mitigate the risks that may affect military networks. It calls for cooperation with the private sector to strengthen supply chains and minimize the risks posed by certain products and services purchased from businesses located outside the United States. Or to protect themselves against "counterfeit products are also at risk need to limit," as stated in the document of Department of Defense (DoD). 

The most enticing aspect of cyber terror for governments is its deniability. It is all but impossible to prove that a government launched a cyber attack. Even if the attack can be traced back to a particular country—and a skilled hacker can conceal an attack's geographical origin—finding the individuals responsible is very difficult, especially if the government involved is unwilling to conduct a serious investigation. The government can always claim ...
Related Ads