Department of Defense Announces Five-Pronged Strategy to Operate in the Cyberspace

Recently, the U.S Department of Defense (DOD) released a new five-pronged strategy for operating in the cyberspace.
Bookmark and Share
Albuquerque, NM ( July 15, 2011 - Albuquerque, NM, United States - Cyber threats are growing in terms of severity, sophistication, scope and frequency. Last year, the world witnessed the arrival of the Stuxnet worm, making even the skeptics to realize the imminent threats in the cyber space. The malware aimed at destabilizing industrial installations and Iranian nuclear program. Disclosure of classified United States (U.S) government documents by WikiLeaks almost threatened to destabilize the country's diplomatic relations with other nations. The current year has already witnessed numerous cyber-attacks, leakage of confidential documents, login credentials and posting of fake stories. The world watched in astonishment as a cyber-attack group named Lulz Sec steered a fifty day hurricane of attacks on government and business corporations. Other groups are seeking the same limelight through frequent cyber-attacks. If not more, the recent cyber-attacks have again brought to light negligent security practices by individuals, companies and government bodies.

Recently, the U.S Department of Defense (DOD) released a new five-pronged strategy for operating in the cyberspace. The first strategy focuses on reaping the full benefits of the Internet by considering it as an operational domain. Through this strategy DOD aims to organize, train and equip for the cyberspace in the same way as is done for air, land, maritime and space to defend national security. The strategy aims at managing the security risks in the cyberspace through focus on training, creating secure and resilient network environments, improving situational awareness and integrating the capabilities of different commands, services and agencies.

The second strategy consists of four sub-strategies which focus on improving cyber security best practices, improving communication and accountability among the workforce, improving internal monitoring and information management capabilities. The strategy focuses on improving the defenses of Defense department's computer systems and networks. The most significant feature of this strategy is evolvement of new concepts and computer architectures, and improving cyber hygiene. The third strategy focuses on government departments, agencies, Department of Homeland Security, Internet Service Providers (ISPs), supply chains and industry to develop innovative ways to enhance national security. Organizing cyber security training programs and encouraging online IT degree programs may help members of different stakeholders to create security conscious culture in their organizations. The globalization of the technology sector has resulted in increased outsourcing of software and hardware, which enhances the risk of use of counterfeit products, or purchase of products from untrusted sources. The strategy focuses on improving government approaches to manage such risks. The government must also focus on improving cyber security practices among the general public by conducting free workshops, developing and encouraging online IT courses.

International coordination and cooperation is crucial to combat and control the menace of cybercrime and Internet-based threats. The fourth strategy aims at improving collective cyber security sharing indicators on cyber threats, detection of malicious code, emerging cyber-attack groups and allies. The enormity of the cyber threats have increased demand for security professionals qualified in security certifications, IT degree programs, computer forensics, network administration, incident management, disaster management and business recovery. The fifth, but significant strategy focuses on creation of a cyber workforce both in the civilian and military sphere by capitalizing scientific, academic and economic resources of the country.

The new strategy of the Department of Defense intends to enhance cyber security innovation both in public and private sector, enhance technological capabilities and invest in cyber security professionals to strengthen national security.

Contact Press

Tel: 505-341-3228

EC-Council University is based in Albuquerque, New Mexico and offers Master of Security Science (MSS) degree to students from various backgrounds such as graduates, IT Professionals, and military students amongst several others. The MSS is offered as a 100% online degree program and allows EC-Council University to reach students from not only the United States, but from all around the world.

EC-Council is a member-based organization that certifies individuals in cybersecurity and e-commerce skills. It is the owner and developer of 16 security certifications, including Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT). Its certificate programs are offered in over 60 countries around the world.

EC-Council has trained over 80,000 individuals and certified more than 30,000 members, through more than 450 training partners globally. These certifications are recognized worldwide and have received endorsements from various government agencies including the U.S. federal government via the Montgomery GI Bill, Department of Defense via DoD 8570.01-M, National Security Agency (NSA) and the Committee on National Security Systems (CNSS). EC-Council also operates the global series of Hacker Halted security conferences.


Tag Words: dod, five pronged strategy, cyber attacks, national security, lulz sec, commands, maritime, cyberspace, wikileaks, iranian, stuxnet
Categories: Internet

Link To This Press Release:

Create Press Release
Press Release Options
About This Press Release
If you have any questions about this press release, please contact the listed publisher. Please do not contact prHWY as we cannot help you with your inquiry.