DOD Cyber Strategy Paper

1726 Words7 Pages

Due to the advances in technologies over the past few decades, the militaries had advanced their command and control capabilities by using information cyberspace in which leads to cyber warfare. The cyberspace conflicts in cyber attack and cyber warfare continue to arise until present time as digital warfare capabilities are developed. Distinctively, the deployment a cyber attack has a considerably different form from traditional conflicts, which requires a different planning defense structure. This paper examines the gap within The Department of Defense, DOD, Cyber Strategy 2015 to identify the weaknesses of The DOD Cyber Strategy 2015.
The United States relies on the Internet and cyberspace data system in many aspects, making the country …show more content…

What are challenges exist in applying the DOD cyber strategy 2015? What are the strategic goals of The DOD Cyber Strategy 2015? How to effectively manage the strategy? And How to identify the potential gaps within The DOD Cyber Strategy 2015 in order to recognized weaknesses and improve The DOD Cyber Strategy 2015?
Regardless of recent efforts to apply the DOD cyber strategy, due to the decentralized approach, the incapability to meet current threats and the means to keep pace with future threats creates the gap between the theoretical strategy and the actual practicality. This paper examines the potential gaps within The DOD Cyber Strategy 2015 with the goals to recognize the weaknesses and improve The DOD Cyber Strategy 2015 to determine the lack of compliance in order to correct the weakness and maintain decent cyber …show more content…

One of the recommendations is the NIST Risk Management Framework by calculating the capabilities of adversaries to attack DOD system, especially an impact of the successful attack on DOD mission (Schmidt, 2015). Based on the NIST Risk Management Framework, “they recommend augmenting vulnerability and severity information with actual “field data” from systems and big-data analytic techniques to understand attack trends on both known and previously unrecognized vulnerabilities” (Schmidt, 2015, p. 6). Henceforward, there should be more scientific approach to modify the complexities regarding to the cyberspace operations such as the pathway between the attacker and the target, the format configuration, and patterns of behavior of adversary (Schmidt,