Table of Contents
Technology is dynamic. The Modus operandi of innumerable activities has transformed gradually due to the inescapable influence brought about by technology. More people are increasingly shifting from the manual system of transacting business to the online systems. This has not only eased the manner of doing various activities but has also saved on the costs of running businesses. The vast number of technological innovations has influenced the army to shift to the digital world. One of the solid reasons the United States army has embraced cyber activities is to have the culpability of controlling the activities that it performs on the ground. Affirmatively, Cook & Connolly (2016) stipulates that, in order for the army to operate physically and be able to attack and defend its territory, it has recognized the influence of cyberspace in assisting it in carrying out its objectives. Unfortunately however, the digital platform has also attracted unscrupulous characters who have posed danger and security issues to the online fraternity. Therefore, any format of operation over the network is at risk of being attacked, manipulated and distorted with an aim of reducing its efficacy and output or changing the way the system operates. Security over the network has become a major priority for major stakeholders conducting their activities over the network. Nonetheless, the United States Army has a secure and rigid security over all its networks, one of the strongest in the world (DARPA, 2015). This report entails the security level of the United States network and its susceptibility and vulnerability to external and malicious attacks.
Networks initially did not have any security features. For this reason, simultaneous and multiple attacks plagued different networks leading to loss of valuable data. According to the Defense Department (2015), the United States is committed to a network that promotes safety and prosperity to all its citizens by having one that is open, secure and easy to operate. To attain this objective fully, in 2014, cybersecurity program in the United States hit a $4.7 billion mark, an $800 million increment from the previous year (Li & Daugherty, 2015). In an effort to secure its multifarious networks, a lot of security configurations were conducted on the most critical networks in the country. In this era, owning sophisticated military gear and weapons is not enough without the dominance in the cyberspace (DARPA, 2015). In the process, the United States Army has aggressively researched on ways of owning a secure network and having in-depth knowledge of related matters. Legit concerns of owning secure networks led to the United States army developing a secure and attack -proof network that has continuously streamlined its activities over time.
Physical warfare has been boosted by cyber operations. Allowing the enemy to attack one’s country over the network could lead the country going back to an instant stone age. It indicates that all communications between the generals and the army personnel on the ground will be disrupted. In an effort of averting such a calamity from occurring, the United States Army has aggressively researched on various ways in which to boost its network security. Providing network security has a serious positive impact on the defense mechanisms of the army. The technical part of the army has been able to achieve this by configuring its numerous network systems, ensuring all access points are limited and engaging active and passive sensors that detect any form of intrusion into the restricted network (Cook & Connolly, 2016). Securing physical locations on the ground that would encourage hacking are also manned heavily by security personnel.
Security is important. Failure to reconstitute and organize network security could lead to multiple attacks over the cyberspace, rendering huge damages. Black hats, according to the Defense Department (2015) carry out such attacks on various networks with the intention of achieving political, economic or military objectives. However, security analysts have indicated that the army should not strengthen and secure its networks for fear of reprisal attacks only. Some attacks could cause a direct threat to the safety and welfare of the general public. The Defense Department (2015) expounds on the issue by stipulating that an attack that disrupts, destroys and manipulates data could interfere with the national security or economic sabotage especially when lives and property are lost. For instance, unlawfully intrusion into the health-care or financial records could have devastating effects.
A secure network guarantees major achievements. The main pillar revolving around maintaining a secure network involves training the army personnel on ways of detecting, diverting and controlling network intrusion. Technology is vast. There exists numerous form of technical and intellectual innovations that improve network security. In the United States, massive investments have been actualized through training the army on issues regarding the cyber world. Affirmatively, Li & Daugherty (2015) state that, since national security is important, the United States Army has to demonstrate its ability in protecting its people through training its members in network security in order to achieve a diversified workforce. They range from avionic and survivability programs, cable systems expertise, electromagnetic spectrum knowledge, positioning and navigations without using the Global Positioning System (GPS), etcetera. Offering such courses ensures that the army is fully equipped with a skilled and qualified personnel capable of combating and dealing accordingly with any network attacks.
Innovations occur on a daily basis. It is an onerous task trying to keep up with all the technological innovations being unveiled on a daily basis. Nonetheless, the army has to ensure that all of its computer technologies are up to date and applicable in current situations. Research has played a major role in ensuring the army does not run its operations on outdated and sub-standard technology. Researchers, inventors and innovators continue coming up with algorithms that are compatible with both the hardware and software and executing tasks on a much larger and sophisticated level. According to DARPA (2015), research has made it possible to have algorithms that detect and repulse enemy radar and having a configurable communication system. The research, according to Li & Daugherty (2015) has to entail the threats targeting not just the military but also the federal government and various infrastructures. In the process, the probabilities of having attacks on vulnerable spots are reduced accordingly.
The United States Army has multiplicity functionalities. Executing the diverse mandates improves efficiency and effectiveness of the army. In relation to the security aspect, a rigid and well equipped cyber security team has been assembled to tackle the challenges experienced in the cyber-sphere. In affirmation, Witte et al. (2016) stipulates that a cybersecurity team needs to be put in place to apply the knowledge of cybersecurity and its inherent challenges. The National Initiative for Cybersecurity Education (NICE) highlights on the importance of having an efficient cybersecurity team that prevents any form of attacks on both the military and civilians.
The United States has undoubtedly invested heavily in training its personnel. In a lot of incidences, after gaining adequate knowledge, army personnel leave the army to seek employment elsewhere. It becomes a costly affair training new personnel again. Private sectors benefit immensely from such defections. However, the army is highly inconvenienced while executing its mandates. Therefore, measures need to be put in place to retain qualified and skilled workers.
Organizations outsource skilled labor a lot. The army can seek and hire qualified and experienced personnel. It is cheaper compared to training individuals from the scratch. This will not only save the costs but also ensure that its workforce comprises of the crème de la crème in the technology world.
The security team needs to gain a certain level of experience. In addition, they could be exposed to real life situations to deal with attacks on different scales and complexities. The exposure and experience gained to enable the personnel to deal with any similar attacks in the eventuality of their occurrence. Therefore, the cybersecurity team can respond swiftly to unlawful intrusions.
Security is key in the running of any organization. Various organizations have set up measures to ensure that their security is not compromised by any external or internal element. The United States army has initiated several self-assessment remedies to ensure that it has viable solutions meant to improve its security levels. Such security measures improve the integrity of the data shared over the network and cyberspace. In its commitment to provide a secure network for all, the United States army has emerged top in the world in ensuring a safe network for itself and its citizens.
- Cook, T., & Connolly, C. J. (2016, November 1). The Future of Army Maneuver-Dominance in the Land and Cyber Domains. The Cyber Defense Review, 1(1), 17-55.
- Defense Advanced Research Project Agency (DARPA). (2015, March). Breakthrough Technologies for National Security. Retrieved from Darpahttps://www.darpa.mil/attachments/DARPA2015.pdf.
- Li, J. J., & Daugherty, L. (2015). What can be learned from Defense Language Training? Training Cyber Warriors. Retrieved from https://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR476/RAND_RR476.pdf.
- Newhouse, B., Keith, S., Scribner, B., & Witte, G. (2016, November 2). NICE Cybersecurity Workforce Frame work (NCWF). National Institute of Standards and Technology (NIST). Retrieved from https://csrc.nist.gov/csrc/media/publications/sp/800-181/archive/2016-11-02/documents/sp800_181_draft.pdf
- The Department of Defense Cyber Strategy. (2015, April). The DOD Cyber Strategy. Retrieved from https://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf