National_Catalogues: Organization of DoD Computer Network Defense, Exploitation, and Attack Forces

Title: Organization of DoD Computer Network Defense, Exploitation, and Attack Forces
Identifier: ADA500822
STOAbstractExternal: The Department of Defense (DoD) faces many challenges in the world of computer networks and systems. Technical skills used to exploit adversary networks and systems for intelligence purposes can also be used to attack adversary networks and systems. In the likelihood that exploitation is much more common than attack, technicians performing exploitation will gain much experience in their work. Because of this, these same technicians should also perform attack functions, as opposed to having separate forces. With respect to computer network defense, there are multiple DoD entities with varying interests and this has led to complicated organizational relationships. Realizing that computer network defense authority emanates from the Secretary of Defense, a simpler structure is to delegate his authority to a DoD entity and allow this entity to act on his behalf. These changes, should they be implemented, would continue DoD progress in cyberspace, allowing it to better protect U.S. security.

STOAuthorExternal: ARMY WAR COLL CARLISLE BARRACKS PA Hanson, Kraig
STOClassificationExternal: N
STOKeywordsExternal:
STOPublisher: USA
Language: English
STOReportSource: http://www.dtic.mil/docs/citations/ADA500822
Published: 3/12/2009

Created at 11/9/2016 3:26 PM by System Account
Last modified at 11/9/2016 3:26 PM by System Account
 
Go back to list
Home(Publications)