A central point for collection of information that relates to computer security. Including, but not limited to, security advisories from the major vendors, major data breaches, “phishing” alerts, commentary regarding staffing levels. etc. etc.
Air Force Cyberspace documentation
October 27, 2010 at 2:04 pm #113711
Lots of reading in this 62 page document….
Title: Cyberspace Operations Air Force Document 3-12
Date 15 July 2010
Today, we live in a globally-networked society that is increasingly dependent upon cyberspace access and security. Our ability to gain and maintain superiority in cyberspace has become essential to our ability to deliver global reach, power, and vigilance. As an integral member of the joint warfighting team, the Air Force is committed to growing, sustaining, and presenting highly skilled and well-equipped forces to joint force commanders who can deliver decisive effects in, from, and through cyberspace, while assuring our mission against an asymmetric cyber threat.
Freedom of action in the cyberspace domain enables our command, control, communication, computers, intelligence, surveillance, and reconnaissance capabilities. Our modern defenses, industrial base, and global commerce, as well as that of our nation’s enemies, depend on free use of land, sea, air, space, and cyberspace. Leverage in cyberspace affords influence and control across all other domains. This leverage increases our forces’ access, speed, reach, stealth, and precision.
Controlling the portions of cyberspace integral to our mission is a fundamental prerequisite to effective operations across the range of military operations. While we appreciate the power that cyber-enabled capabilities add, we also maintain a healthy respect for the asymmetric power that cyberspace affords our adversaries. We must maintain a constant commitment to educate, train, and equip our Airman to prevail in the contested domain of cyberspace.
In the past decade, technological advances have provided the means to generate decisive and magnified effects in domains that traditionally could only be achieved via kinetic means. We must continually adapt our operating concepts to leverage emerging cyberspace capabilities to ensure the Air Force maintains the decisive advantage over our adversaries.
October 28, 2010 at 3:13 am #113716
I like Appendix A — it’s a decent top 10 list of basic awareness.
October 28, 2010 at 11:05 am #113714
Yes, although Would revise a couple of them:
8. I would change to: do careful research with others prior to requesting changes to your hardware or software.
Once one gets a track record of not “abusing systems” the system administrator(s) will truly appreciate your efforts and I have found that the approval process not only goes much more smoothly but faster
9. I would change to: encrypt all information either on your computer or in transit across the network.
The technology is there TODAY which will enable this with minimal noticible impact
TEN THINGS EVERY AIRMAN MUST KNOW
1.The United States is vulnerable to cyberspace attacks by relentless adversaries attempting to infiltrate our networks at work and at home – millions of times a day, 24/7.
2. Our enemies plant malicious code, worms, botnets, and hooks in common websites, software, and hardware such as thumbdrives, printers, etc.
3. Once implanted, this code begins to distort, destroy, and manipulate information, or “phone” it home. Certain code allows our adversaries to obtain higher levels of credentials to access highly sensitive information.
4. The enemy attacks your computers at work and at home knowing you communicate with the Air Force network by email, or transfer information from one system to another.
5. As cyber wingmen, you have a critical role in defending your networks, your information, your security, your teammates, and your country.
6. You significantly decrease our enemies’ access to our networks, critical USAF information, and even your personal identity by taking simple action.
7. Do not open attachments or click on links unless the email is digitally signed, or you can directly verify the source—even if it appears to be from someone you know.
8. Do not connect any hardware or download any software applications, music, or information onto our networks without approval
9. Encrypt sensitive but unclassified and/or critical information. Ask your computer systems administrator (CSA) for more information
10. Install the free Department of Defense anti-virus software on your home computer. Your CSA can provide you with your free copy.
You must be logged in to reply to this topic.