Countering the Cyber Threat

dc.contributor.authorBrantly, Aaron F.en
dc.contributor.authorHenry, Shawnen
dc.date.accessioned2018-05-10T12:25:55Zen
dc.date.available2018-05-10T12:25:55Zen
dc.date.issued2018-05-09en
dc.description.abstractThe current path to national cybersecurity hides a fatal design flaw. Resident within the current national approach is the assumption that we can continue business as usual with limited sharing between the public and the private sector, the creation of information sharing and analysis centers, the National Cybersecurity and Communications Integration Center, and a range of ad hoc local, state and federal organizations each addressing a slice of a complex and highly interconnected environment. The result is a lack of integrated coordination, continued hacks, and a public increasingly weary of all things cyber. We are approaching the current challenge as if we are living in August of 2001, ignorant and oblivious to the tragedies just over the horizon. All the while the private sector treats each incident in isolation, highly focused on their slice of a broader digital ecosystem. In the aftermath of the 9/11 attacks, Congress, the executive agencies and departments, and the judicial system in coordination with the will of the American people moved swiftly on legislation and strategies to address a complex asymmetric threat. While many of these new pieces of legislation failed in the courts, the unity of effort and the subsequent cooperative environment across all levels of government, and with the private sector, have arguably altered the national security posture and environment within the United States. Most of these changes have created a safer and more resilient domestic environment that has largely been spared the ravages of foreign-inspired terrorism. While not perfect, the current approaches adapted through years of learning, information sharing, and practice have safeguarded the homeland in an increasingly dangerous world. Lessons from the last 16 years of countering terrorism (CT) should serve as a roadmap for developing a robust, whole-of-society approach to safeguarding the homeland against the threats emanating from cyberspace looming beyond view.en
dc.description.notesfalse (Extension publication?)en
dc.description.versionPublished versionen
dc.format.extent47 - 55 page(s)en
dc.format.mimetypeapplication/pdfen
dc.identifier.issue1en
dc.identifier.orcidBrantly, AF [0000-0003-4193-3985]en
dc.identifier.urihttp://hdl.handle.net/10919/83208en
dc.identifier.volume3en
dc.publisherThe Army Cyber Instituteen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.titleCountering the Cyber Threaten
dc.title.serialThe Cyber Defense Reviewen
dc.typeArticle - Refereeden
dc.type.dcmitypeTexten
pubs.organisational-group/Virginia Techen
pubs.organisational-group/Virginia Tech/All T&R Facultyen
pubs.organisational-group/Virginia Tech/Liberal Arts and Human Sciencesen
pubs.organisational-group/Virginia Tech/Liberal Arts and Human Sciences/CLAHS T&R Facultyen
pubs.organisational-group/Virginia Tech/Liberal Arts and Human Sciences/Political Scienceen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Countering the Cyber Threat.pdf
Size:
480.67 KB
Format:
Adobe Portable Document Format
Description:
Publisher's Version
License bundle
Now showing 1 - 1 of 1
Name:
VTUL_Distribution_License_2016_05_09.pdf
Size:
18.09 KB
Format:
Adobe Portable Document Format
Description: