Gladielle Cifuentes’ 750-Word Expanded Definition of Military Cybersecurity

Introduction

As the internet and technology began to see many advancements, organizations realized the threats that can come from not having a security system in place.  These organizations include the U.S military. According to Kilroy (2008), “In the mid-1990s, the U.S. military recognized a growing threat to its informational architecture as well as the nation’s critical infrastructure from cyber warfare.” (p. 439).  For this paper, I will be defining the term ‘Military Cybersecurity’ and how it is viewed in different definitions. I will cite definitions and explain in context how authors and organizations view this term. 

Definitions

The Department of Defense Instruction 8500.01 (2014) defines cybersecurity as the “prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation”. Cyber security threats to the military have been around for many years and the U.S government has been a victim to hackers from all around the world. As per the International Standards Organization, the definition of Cyber security is “the preservation of confidentiality, integrity, and availability information in cyberspace” (ISO, 27032). Very similarly, these organizations use the term ‘integrity’ when defining Cyber security. 

According to Efthymiopoulos (2019) “Cyber-security is a method of e-protection. It is a framework policy of and for defense when reflective to a political-military alliance such as NATO (North Atlantic Treaty Organization)” (pg.1). The definitions listed are related to how the military views cybersecurity and what is the DoD’s expectation is on how to control the military networks and implement cyber security protocols. 

Context

Vacca (2011), mentioned that “both the US Navy and the US Air Force were originally founded to project US interests into non-governed common spaces, and both have established organizations to deal with cyber security. “(p. 159). Although this refers to two different branches of services, the overall goal for the DoD is to strengthen its cyber security. According to Krasznay & Hamornik (2019), “Governmental and military IT systems should be protected from criminals, foreign intelligence services and armed forces in cyberspace, just to name a few challenges. These elements require a new approach to cybersecurity especially in national security” (p. 291). Overall, any organization that uses technology devices, networks, or simply function through the internet, can encounter cyber security threats, to include the military. Boeke, Heinl & Veenendaal (2015). “Armed forces across the globe are investing in their capacity to defend their networks and systems, and increasingly, preparing to conduct military operations in cyberspace” (p. 70), the U.S Military, along with militaries around the world, understand the severity of cyber threats and how it could be a detrimental concern to their security information and governments.

Working Definition

The term Military Cybersecurity can be defined in many ways. Overall, specifically referring to the military, cybersecurity will continue to gain threats from hackers and it is extremely important to learn the new threats that occur and keep those who are involved and work with the military up to date with ways to prevent any cyber-attacks from happening. Cyber-attacks raise security concerns to government officials. For the major that I am studying and the career path that I chose, I believe that it is highly advisable for me to be aware of the cybersecurity concerns that the military faces. As a military member, I am aware of the constant trainings that the Air Force provides for its members on cybersecurity and awareness, and the important roles that we have in military cybersecurity. 

References

Kilroy, R. J., Jr. (2008). The U.S. Military Response to Cyber Warfare. In L. J. Janczewski & A. M. Colarik (Eds.), Cyber Warfare and Cyber Terrorism (pp. 439-445). Information Science Reference. https://link.gale.com/apps/doc/CX2555100065/GVRL?u=cuny_nytc&sid=GVRL&xid=3af1f3ab

Efthymiopoulos, M. P. (2019). A cyber-security framework for development, defense and innovation at NATO. Journal of Innovation and Entrepreneurship, 8(1). doi:10.1186/s13731-019-0105-z

Snyder, D. (2015). Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles. Santa Monica, CA: RAND Corporation.

Vacca, W. A. (2011). Military Culture and Cyber Security. Survival, 53(6), 159-176. doi:10.1080/00396338.2011.636520

Cyber Security Objectives. (2012). Cyber Security Policy Guidebook, 1-267. doi:10.1002/9781118241530.ch3

Krasznay, C., & Hamornik, B. (2019). Human Factors Approach to Cybersecurity Teamwork – The Military Perspective. Advances in Military Technology, 14(2). doi:10.3849/aimt.01296

  Boeke, S., Heinl, C., & Veenendaal, M. (2015). Civil-military relations and international military cooperation in cyber security: Common challenges & state practices across Asia and Europe. 69–80. https://doi.org/10.1109/CYCON.2015.7158469

Leave a Reply