Risk
3/21/2011
05:44 PM
Connect Directly
RSS
E-Mail
50%
50%

Cyber Command Pursues 'Defensible' IT Architecture

The Defense agency's top executive outlines a series of initiatives, including development of a hardened IT architecture that incorporates cloud computing and thin clients.

Gen. Keith Alexander has outlined a series of next steps to be pursued by the six-month-old U.S. Cyber Command, including development of a “defensible architecture” that’s better suited for the latest generation of cyber threats.

Alexander is director of the National Security Agency and commander of U.S. Cyber Command, which operates out of Fort Meade in Maryland and reports to U.S. Strategic Command within the Department of Defense. Last year, he painted a dire picture of the threats to DoD networks, revealing they’re subject to 250,000 probes every hour. Last week, in testimony to the House Armed Services Committee, he reiterated the urgency of securing DoD networks.

The threats continue to mature and, while no major attack has happened so far, the United States must be prepared, Alexander said. “We are collectively vulnerable to an array of threats ranging from network instability to criminal and terrorist activities to state-sponsored capabilities and actions that are progressing from exploitation to disruption to destruction,” he said.

U.S. Cyber Command became operational in October. Alexander outlined several challenges facing his organization, including the need to prevent a “cyber 9/11” type of attack on critical infrastructure.

Alexander identified five strategic priorities to be pursued by U.S. Cyber Command going forward. They are: treat cyberspace as a “domain” within DoD; employ active cyber defenses and other new defense approaches; team with other federal agencies and the private sector on a national cybersecurity strategy; strengthen relationships with international partners; and recruit a cybersecurity workforce.

Cyber Command plans to develop, in collaboration with other DoD agencies, a hardened IT architecture that uses cloud computing and thin-client networking to move data and applications off of desktop PCs and into a secure, centralized environment.

Benefits of the new architecture include “wider availability of applications and data combined with tighter control over accesses and vulnerabilities,” Alexander said. Cyber Command will build controls and tools into the cloud environment to ensure that users can only access data required for their jobs and to quickly detect unauthorized access.

Federal agencies must transition from static cybersecurity defenses to automated, real-time monitoring and response. This report will show you how IT security teams can get started. Download the report. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0993
Published: 2014-09-15
Buffer overflow in the Vcl.Graphics.TPicture.Bitmap implementation in the Visual Component Library (VCL) in Embarcadero Delphi XE6 20.0.15596.9843 and C++ Builder XE6 20.0.15596.9843 allows remote attackers to execute arbitrary code via a crafted BMP file.

CVE-2014-2375
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to read or write to arbitrary files, and obtain sensitive information or cause a denial of service (disk consumption), via the CSV export feature.

CVE-2014-2376
Published: 2014-09-15
SQL injection vulnerability in Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

CVE-2014-2377
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to discover full pathnames via an application tag.

CVE-2014-3077
Published: 2014-09-15
IBM SONAS and System Storage Storwize V7000 Unified (aka V7000U) 1.3.x and 1.4.x before 1.4.3.4 store the chkauth password in the audit log, which allows local users to obtain sensitive information by reading this log file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant