Pentagon to treat Internet as operational domain

Powered by SC Magazine
 

Denies it is militarising cyberspace.

US deputy defense secretary William Lynn has unveiled a new strategy for protecting military computer networks that treats cyberspace as an "operational domain" in which trained forces defend against attacks.

Lynn, in a speech at the National Defense University at Fort McNair, said the Pentagon wanted to avoid militarising cyberspace but at the same time secure strategic networks, both by threat of retaliation and by mounting an effective defense.

"Our ability to identify and respond to a serious cyber attack is ... only part of the strategy. Our strategy's overriding emphasis is on denying the benefit of an attack," he said.

"If an attack will not have its intended effect, those who wish us harm will have less reason to target us through cyberspace in the first place."

He said as part of its active defenses, the Pentagon would introduce new operating concepts and capabilities on its networks, such as sensors, software and signatures to detect and stop malicious code before it affects US operations.

"Far from militarising cyberspace, our strategy of securing networks to deny the benefit of an attack will help dissuade military actors from using cyberspace for hostile purposes," Lynn said.

He said because the Internet is an open system involving networks operated by many organisations, it was important to include other US agencies, US allies and defense industries in the cyberspace security effort.

"Our responsibility is to acknowledge this new environment and adapt our security instruments to it," Lynn said.

"That is the purpose of the DoD Cyber Strategy. We must prepare."

(Reporting by David Alexander; Editing by Tim Dobbyn)


Pentagon to treat Internet as operational domain
 
 
 
Top Stories
Making a case for collaboration
[Blog post] Tap into your company’s people power.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
Tracking the year of CIO churn
[Blog post] Who shone through in 12 months of disruption?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1077

Vote