Resilient Military Systems and the Advanced Cyber Threat
DEFENSE SCIENCE BOARD WASHINGTON DC
Pagination or Media Count:
The United States cannot be confident that our critical Information Technology IT systems will work under attack from a sophisticated and well-resourced opponent utilizing cyber capabilities in combination with all of their military and intelligence capabilities a full spectrum adversary. While this is also true for others e.g. Allies, rivals, and publicprivate networks, this Task Force strongly believes the DoD needs to take the lead and build an effective response to measurably increase confidence in the IT systems we depend on public and private and at the same time decrease a would-be attackers confidence in the effectiveness of their capabilities to compromise DoD systems. We have recommended an approach to do so, and we need to start now While DoD takes great care to secure the use and operation of the hardware of its weapon systems, these security practices have not kept up with the cyber adversary tactics and capabilities. Further, the same level of resource and attention is not spent on the complex network of information technology IT systems that are used to support and operate those weapons or critical cyber capabilities embedded within them. This Task Force was asked to review and make recommendations to improve the resilience of DoD systems to cyber attacks and to develop a set of metrics that the Department could use to track progress and shape investment priorities.
- Computer Systems Management and Standards
- Military Forces and Organizations