Information Technology

Cybersecurity

Cybersecuirty PictureCybersecurity falls under Information Operations (IO) and is used to protect and defend information and information systems. It’s the practice of keeping digital attacks from taking down important systems and sensitive information. They are meant to protect networked systems and applications from threats from inside or outside an organization.

Definition: “Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation”. DoD Instruction 8500.01

Guide: PM Guidebook for Integrating Cybersecurity RMF into System Acquisition Lifecycle – Sep 2015

What is Cybersecurity

Cybersecurity is the practice of keeping digital attacks from taking down important systems and sensitive information. Cybersecurity measures are also known as information technology (IT) security. They are meant to protect networked systems and applications from threats from inside or outside an organization.

What are the Cybersecurity Levels

Cyberspace can be viewed as three layers (physical, logical, and social) made up of five components (geographic, physical network, logical network, cyber persona, and persona).

Cyberspace Levels
Cyberspace Levels

Physical:

The physical layer includes the geographic component and the physical network component. The geographic component is the physical location of elements of the network. While geopolitical boundaries can easily be crossed in cyberspace at a rate approaching the speed of light, there is still a physical aspect tied to the other domains. The physical network component includes all the hardware and infrastructure (wired, wireless, and optical) that supports the network and the physical connectors (wires, cables, radio frequency, routers, servers, and computers). [2]

Logical:

The logical layer contains the logical network component, which is technical and consists of the logical connections that exist between network nodes. Nodes are any devices connected to a computer network. Nodes can be computers, personal digital assistants, cell phones, or various other network appliances. On an Internet protocol (IP) network, a node is any device with an IP address. [2]

Social:

The social layer comprises the human and cognitive aspects, including the cyber persona and persona components. The cyber persona component includes a person’s identification or persona on the network (e-mail address, computer IP address, cell phone number, and others). The persona component consists of the people actually on the network. An individual can have multiple cyber personas (for example, different e-mail accounts on different computers) and a single cyber persona can have multiple users. [2]

Cybersecurity threats represent one of the most serious national security, public safety, and economic challenges we face as a nation.” – 2010 National Security Strategy

DoD Strategic Cyberspace Initiative

Below is a list of the five (5) DoD Strategic Initiatives for Cyberspace: [1]

  • Strategic Initiative 1: Treat cyberspace as an operational domain to organize, train, and equip so that DoD can take full advantage of cyberspace’s potential
  • Strategic Initiative 2: Employ new defense operating concepts to protect DoD networks and systems
  • Strategic Initiative 3: Partner with other U.S. government departments and agencies and the private sector to enable a whole-of-government Cybersecurity strategy
  • Strategic Initiative 4: Build robust relationships with U.S. allies and international partners to strengthen collective cybersecurity
  • Strategic Initiative 5: Leverage the nation’s ingenuity through an exceptional cyber workforce and rapid technological innovation

National Strategic Cyberspace Initiative

The National Strategy to Secure Cyberspace identifies three strategic objectives:

  1. Prevent cyber attacks against America’s critical infrastructures;
  2. Reduce national vulnerability to cyber attacks
  3. Minimize damage and recovery time from cyber attacks that do occur.

AcqNotes:

  • Cybersecurity replaces the term information assurance

AcqLinks and References:

Updated: 11/25/2021

Leave a Reply