StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The US Army and the Cyber Domain - Case Study Example

Cite this document
Summary
From the paper "The US Army and the Cyber Domain" it is clear that aimed at greater efficiency and soundness in cyberspace activities, the US army has proposed a plan to integrate a program with their international partners so that they can enhance the collective cybersecurity…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
The US Army and the Cyber Domain
Read Text Preview

Extract of sample "The US Army and the Cyber Domain"

US ARMY AND THE CYBER DOMAIN TABLE OF CONTENTS INTRODUCTION 3 DATA ANALYSIS 4 Definition of Cyber 4 Roles and responsibilities of US Army to maintaincyberspace 5 CONCLUSIONS 9 REFERENCES 10 INTRODUCTION The military definition of ‘Cyber’ or ‘Cyberspace’ describes it as a domain, which operates as an interdependent network system of exchange of data through electromagnetic spectrum. Cyberspace can be more effectively discussed as the Global Information Grid (GIG) according to the US Department of Army. Considering the current technology savvy generation, ‘cyberspace can be considered as the physical domain composed of electromagnetic energy. This is also called the ‘notional environment’, which occurs through computer network1. It is noteworthy in this context that cyberspace has actually enhanced the operational efficiency of the US Army and has actually increased the convenience of exchange of information. Overall, development has been induced into the operation of the military forces. However, the introduction of technology has also increased dependency of the department on ‘cyberspace’, which has at times proved to be crucial for the army. Numerous flaws and loopholes persisting in the system are further examined that might become fatal in due course to support army operations, making it more important for the department to have continuous monitoring of the issue2. Correspondingly, this research paper briefly defines the term ‘cyber’, as used by the military at present, stating the roles that the military should be taking in order to enhance their responsibilities into the domain, and subsequently, structuring a rough layout about the future mode of operation. DATA ANALYSIS Definition of Cyber Cyber, popularly called Cyberspace, is an electromagnetic domain, which serves as a spectrum to store, modify and exchange data through the virtually networked association3. At present, the use of cyberspace has increased at a vast magnitude with chances of massive disruptions with the unauthorised intervention, further raising the risks that the capabilities projected can be seized4. As the size of cyberspace is increasing, the complexity of the network is also accelerating in manifold. The gap in understanding the terminology of cyberspace has in turn increased its vulnerabilities to be adequately sound in its effectiveness. The modelling and simulation has also become the most important facet, which needs to be explored and refined with increasing dependency on the networking domain. As the domain is connected with thousands of networks, healthy functioning of the domain has become a myth5. To be noted in this regard, the Department of Defence, which is one of the important departments of the government, has become highly depended on Cyber in the current context. On the whole, it presents a huge networking site having network loops comprising all the public entities and a major proportion of the private sectors of the US, as well as the different agencies working for the confidential sectors of the government. With the inclusion of so many participants, the entire system becomes too complex, which further increases loopholes in the channel while the management of such a huge network system becomes critical6. Roles and responsibilities of US Army to maintain cyberspace Technologies that provide a base to lead and create can also be a source that disrupts and destroys normal functioning of a particular system. Cyberspace is one such networking domain, which has played a major role to empower the ease of information exchange with minimum physical interventions of the participants, making the entire process time and cost efficient. However, time has proved that it has also imposed challenges in maintaining the credibility of the information sources. As mentioned above, the Department of Defense (DOD) has major dependency on ‘cyberspace’, which is highly exposed to cybercrimes. The networking domain, being a huge networking structure, makes the management of such a network even more complex without the proper modelling or simulation7. The government and the federal body have thus merged hands with their different private counterparts to develop the security system, which will help to minimize the chances of cybercrimes and develop the network as more reliable. The US army has accordingly been focused on developing the modelling of the security system and developing the support of technology that would enable the private sector to enhance their security system to the desired extent. This step is expected to help secure the network, which is interlinked between both the private and public sectors. The defence departments of the government even have formed a special part of the same networking system, which needs to be safe as they are involved in exchange of highly confidential and sensitive issues concerning the US army and its governmental affairs8. Observably, the government of US has taken important steps in regards to the development of the security of the system overall and to minimize the vulnerabilities persisting therein. The Department of Homeland Security (DHS), which is vested with the authority to take care of any threats arising within the boundaries of the nation, has also been working on the cyber security issue since 2002. Correspondingly, DHS has been emphasising the development of a national plan, which can be used to secure the key resources and infrastructure of the country substantially9. The government has further focused on the different countermeasures, which can be taken to minimize the technical malfunctioning of the network, which can curtail down the chances of cybercrime. In addition, the Department of Defense (DOD) has planned to work on the defences to develop its support efforts in minimizing malicious practises on the cyberspace. The department would focus on developing cyberspace capabilities for military operations. Implementation has also been done to minimize the risks of operation on cyberspace10. In alliance with DOD, the Defence Intelligence Agency (DIA) has been developing different modelling and simulation to improve capabilities with the aim to develop tools, which could identify probable cyber vulnerability11. It is worth mentioning in this context that the complete networking system is highly adverse and complicated making it impossible for one single organisation to competently deal with the crimes taking place. The federal bureau of investigation has therefore merged hands with the different other organisations with the introduction of 20 boards involving law enforcement bodies and the intelligence community of the US12. These types of crimes are economically severe, which proves to be fatal for the organisation. The government should therefore be taking preventive measures to minimize the risk from these malicious threats, which can finally result to loss of property for particular organisations13. Furthermore, new technological improvements as well as development of the modelling to prevent cybercrimes have been introduced by the government. In addition to such measures, the US Army has also instigated training sessions so that the concerned person can take the complete advantage from cyberspace and avoid malicious threats to the desired extent. The training sessions deliver emphasis on integrated programs on situational awareness that can in turn facilitate a secured networking system. Insider threats have also been a challenge, owing to which, defensive measures, such as the strengthening of workforce and increasing communication among the same has been helpful to prevent cybercrimes14. According to the DOD, most of these vulnerabilities can be avoided by maintaining cyber hygiene. Cyber hygiene can prevent from a number of cybercrimes. It is with this particular objective that DOD aims at integrating the private sectors to update their security software continuously15. Cyber hygiene is also expected to help the military to identify the threat and attend them with immediate effect so that the vulnerabilities could be prevented at the initial levels in the cyberspace16. Aimed at greater efficiency and soundness in the cyberspace activities, the US army has proposed a plan to integrate a program with their international partners so that they can enhance the collective cyber security. This could develop better security from cybercrime at international level, as the threats from such crimes are not limited within the boundaries of the nation. This measure will also ensure the mitigation of risk caused due to the threats arising from different sectors of the economy17. The US army has further stressed on the development of the cyberspace, which they have been using in order to exchange their information. The strategies involves securing of the same and developing an inbuilt system, which would prevent any malicious body from squeezing out valuable information, which could make the army take a negative position at the time of the warfare18. Undoubtedly, the country as well as the government has faced many disadvantages due to their accelerated dependency on the cyberspace and the amount of vulnerabilities it imposes. The cyberspace has also been an ever-growing network wherein the technology base of the cyber has been a very complicated domain, which needs continuous exploration and development. The knowledge base of the user needs however to be developed further to make the user well acquainted with the possible vulnerabilities19. CONCLUSIONS The US army, with its other defence peripherals, has been working on the security base to develop a cyber network domain, which could be free from any cybercrime. With this particular aim, the army has been working with the various possible cybercrimes to prevent the networking system from any kind of malicious practices and to prevent loss of confidential data, directly affecting its national security. Nevertheless, according to the DOD, it is essential that in order to maintain an effective operational system, the strategies adopted must be flexible as the network domain is too dynamic. Conclusively, it can be affirmed that the challenge faced in the context of cyberspace operations of the US Army is very complex, which may certainly impose an adverse effect, under impression of the fact that the network is ever changing and increasing. Even after adopting a series of strategies and performing their roles diligently, the US Army has been unable to prevent such crimes entirely, from occurring at a regular basis. REFERENCES Department of Defense. “Strategy.” The National Strategy for Cyber Space Operations (U), 20318 (2006): 1-54. Department of the Army. “Cyberspace, the domain.” Cyberspace Operations Concept Capability Plan 2016-2028, 525-7-8 (2010): 1-77. Department of Defense. “Cyberspace policy report.” A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 (2011): 1-14. Department of Defense. “Strategic context”. Department of Defense Strategy for Operating in Cyberspace (2011): 1-19. Department of the Army. “Cyberspace operations”. Cyber Electromagnetic Activities, 3-38 (2014): 1-96. Federal Bureau of Investigation. “Cybersecurity,” Statement before the Senate Judiciary Committee, Subcommittee on Crime and Terrorism, http://www.fbi.gov/news/testimony/cybersecurity-responding-to-the-threat-of-cyber-crime-and-terrorism (assessed May 29, 2014) The White House. “CNCI Initiative Details,” The Comprehensive National Cybersecurity Initiative, http://www.whitehouse.gov/issues/foreign-policy/cybersecurity/national-initiative (assessed May 29, 2014). US-CERT. “Cyberspace strategy.” The National Strategy to Secure Cyberspace (2003): 1-76. Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“US Army and the Cyber Domain Research Paper Example | Topics and Well Written Essays - 1500 words”, n.d.)
US Army and the Cyber Domain Research Paper Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/information-technology/1648069-us-army-and-the-cyber-domain
(US Army and the Cyber Domain Research Paper Example | Topics and Well Written Essays - 1500 Words)
US Army and the Cyber Domain Research Paper Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1648069-us-army-and-the-cyber-domain.
“US Army and the Cyber Domain Research Paper Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1648069-us-army-and-the-cyber-domain.
  • Cited: 0 times

CHECK THESE SAMPLES OF The US Army and the Cyber Domain

Virtual Organisations

Nearly every organization that exists in this day and age has an online manifestation within the cyber space.... Virtual Organizations Virtual organizations are spread left, right and center within the world of Internet.... They are becoming widespread with the changing times and the possible extent of their success is imperative for one to understand....
6 Pages (1500 words) Essay

Using Social Networking Sites during the Career Management Process: LinkedIn.com

Student ID Lecturer Submission Date University LinkedIn.... om LinkedIn provides an excellent platform for professionals to come in close contact with one another and find out whether they have the desired strengths which an organization looks forward to having within its fore.... hellip; The entrepreneurs similarly, are on the watch out for exciting talent that has exceptional written all over them....
5 Pages (1250 words) Essay

Service Capabilities Vignettes

In the scenario of Northern Africa, the US military can use Naval, army and Air services to ensure stability.... Already, the us forces are up in action to make sure that their interests, which include but not limited to saving human life and restoring peace.... The army services play a critical role in any type of calamity.... Title 10 USC is an army inside an army that has the land combat and service forces....
7 Pages (1750 words) Coursework

Vulnerabilities of Networks and Internet

The paper ''Vulnerabilities of Networks and Internet'' presents a clear view of the issues involving computer networks and their security.... It tackles the basic networking structure and principle behind it.... The good practice of info- security in the preservation of data and its role in effective network management....
7 Pages (1750 words) Essay

Cyber Attacks in the United States

The truth is “it is struggling to keep pace with the growing number of attacks on its computer networks, potentially leaving key military and civilian… The armed forces also aired that the cyber defenses of the country are being challenged by sophisticated and well-organized efforts to steal classified information.... The armed forces also aired that the cyber defenses of the country are being challenged by sophisticated and well-organized efforts to steal classified information....
1 Pages (250 words) Essay

Social Marketing, Sustainability and Racism in Australia

Therefore, it is imperative that organization takes account of their network for security threats and for this hire a security expert who guides the management on how to secure organization's network and… In addition, it is yet vital and significant to maintain exceptional security in a networked structure....
15 Pages (3750 words) Essay

Japanese Women and World War II

The country joined the war in 1937 after the Japanese army invaded China and captured its capital city; Beijing.... Later, the Japanese decided to invade the Soviet Union where their army experienced their first serious defeat.... At this time, Japanese army developed cracks with some factions opposing the move to continue invading China allies....
6 Pages (1500 words) Research Paper

Innumerable Wars and the Current Political Dispensations

The following paper under the title 'Innumerable Wars and the Current Political Dispensations' gives detailed information about cutting edge technology, such as nuclear, atom bombs and cyber warfare, which are the quintessence of 21st-century knowledge.... hellip; They symbolize humanity's primordial desire for control and dominance, and in war; despite our claim to humanity and civilization, the rules and morality go out of the window and the only thing that matters is killing and wrecking destructions on real and perceived foes....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us