As the modernized US Army prepares for network-centric warfare operations by linking advanced weapons systems, platforms, sensors and Command & Control systems via LandWarNet framework, Cybersecurity has come to the forefront for defending Army’s cyber domain. The Army leverages strategic and tactical assets that are connected to the Army’s cyber domain, to include software defined radios, sensing devices and computing devices embedded in vehicles, which can make securing the network difficult. The Army’s growing reliance on information systems and networks ultimately increases the attack surface available to adversaries, both internally and externally, to disrupt, deny and degrade tactical operations.
Cyber-attacks involve advanced and sophisticated techniques to infiltrate tactical networks and mission systems. Types of attacks include advanced malware, zero day attacks and advanced persistent threats. Cyber threats at tactical level are constantly evolving – becoming more sophisticated, targeted and sustained. According to Training and Doctrine Command (TRADOC) G2 office, 80% of the cyber threats are related to insider threats. Cyber Security preventive measures are likely to fail due to insider threats. This is not to say that there is no value for preventive measures, but instead of that Brigade Combat Team (BCT) must equip themselves with powerful big data analytic capability for detection and isolation of active and passive cyber threats. In order to defend Army’s complex heterogeneous networks and complex environment, a fundamental knowledge of network situational awareness is necessary to plan, monitor and manage in the cyber domain. BCT should ensure that Army invests in cyber security capabilities that promotes technologies that use approaches agile-based analysis, not static signature-based tools to threats or on the tactical edge of the network.
To learn more about our innovative Cyber Analytic Engine solution, please email us at email@example.com