Developing Enterprise Cyber Situational Awareness

09/03/2020
by   Christopher L Gorham, et al.
0

The topic will focus on the U.S. Department of Defense strategy towards improving their network security defenses for the department and the steps they have taken at the agency level where components under DOD such as The Defense Information Systems Agency are working towards adding tools that provides additional capabilities in the cyber space. This approach will be analyzed to determine if DOD goals address any of their vulnerabilities towards protecting their networks. One of the agencies under the DOD umbrella called The Defense Information Systems Agency provides DOD a template on how to build a network that relies upon layers of security to help it combat cyber attacks against its network. Whether that provides an effective solution to DOD remains a question due to the many components that operate under its direction. Managing these networks is the principle responsibilities for the Department of Defense. Nevertheless, it does demonstrates that there are tools available to help DOD build an strong enterprise cyber network of situational awareness that strengthens the ability to protect their network infrastructure.

READ FULL TEXT
research
12/15/2022

Defending against cybersecurity threats to the payments and banking system

Cyber security threats to the payment and banking system have become a w...
research
05/24/2019

Use of Artificial Intelligence Techniques / Applications in Cyber Defense

Nowadays, considering the speed of the processes and the amount of data ...
research
07/12/2022

Markov Decision Process For Automatic Cyber Defense

It is challenging for a security analyst to detect or defend against cyb...
research
10/04/2021

Realizing Forward Defense in the Cyber Domain

With the recognition of cyberspace as an operating domain, concerted eff...
research
05/24/2019

The Concept of Cyber Defence Exercises (CDX): Planning, Execution, Evaluation

This paper discusses the concept of cyber defence exercises -CDX- that a...
research
05/23/2023

REGARD: Rules of EngaGement for Automated cybeR Defense to aid in Intrusion Response

Automated Intelligent Cyberdefense Agents (AICAs) that are part Intrusio...
research
12/06/2021

Staring Down the Digital Fulda Gap Path Dependency as a Cyber Defense Vulnerability

Academia, homeland security, defense, and media have accepted the percep...

Please sign up or login with your details

Forgot password? Click here to reset