US Department of Defense Strategy for Operating in Cyberspace

By:
Posted: 07/14/2011
The Department and the nation have vulnerabilities in cyberspace. Our reliance on cyberspace stands in stark contrast to the inadequacy of our cybersecurity – the security of the technologies that we use each day. Moreover, the continuing growth of networked systems, devices, and platforms means that cyberspace is embedded into an increasing number of capabilities upon which DoD relies to complete its mission. Today, many foreign nations are working to exploit DoD unclassified and classified networks, and some foreign intelligence organizations have already acquired the capacity to disrupt elements of DoD’s information infrastructure. Moreover, non-state actors increasingly threaten to penetrate and disrupt DoD networks and systems. We recognize that there may be malicious activities on DoD networks and systems that we have not yet detected.
To continue viewing this content please fill out the form below and become an Defence member.
Or if you're already a Defence member, sign in below to download.
Join

By entering in your information and submitting the form, you give the sponsor permission to contact you regarding their product and you agree to our User Agreement, Privacy Policy, and Cookie Policy.

By:
Posted: 07/14/2011