DOD orders info-assurance review

With electronic information playing an everlarger role in Defense operations Secretary of Defense William Cohen last month formed a panel to look at how DOD manages its critical data and protects against information warfare and system vulnerabilities. DOD is tackling a concept called 'information

With electronic information playing an ever-larger role in Defense operations Secretary of Defense William Cohen last month formed a panel to look at how DOD manages its critical data and protects against information warfare and system vulnerabilities.

DOD is tackling a concept called "information assurance" (IA) - ensuring that information is not only protected and secure against outside attacks but also that it gets delivered and its integrity is maintained.

In a memo issued last month Cohen called for the formation of an integrated-process team to "help develop recommendations for comprehensive process changes that will improve IA practices across the department." Cohen asked the undersecretary of Defense for policy to lead the effort and to collaborate with the assistant secretary of Defense for command control communications and intelligence.

The review effort is key to DOD's increasing reliance on information systems to fight wars and operate defenses. DOD is "transitioning to a vision of warfighting where information is increasingly important for successful operations " said a senior DOD official who asked not to be named. "We have to assure our own information and protect it and make sure it gets to where it needs to be in a timely fashion."

Richard Power a spokesman for the San Francisco-based Computer Security Institute said DOD's move to improve IA practices indicates the agency has shed the common myopic vision that information security is solely the act of protecting internal systems from hackers or attacks from disgruntled employees.

A comprehensive security policy also must include guarding the integrity of data and ensuring the availability of systems. Policy-makers have to plan for loss of availability due to Internet traffic jams brown-outs or natural disasters among other things he said.

"Information assurance is all about scale of risk " Power said. "There's no greater scale of risk than your country's ability to defend itself. All considerations have to start there. It's good to see at the national level and the leadership level a commitment to a broader more comprehensive view of information assurance."

Joe Vangieri director of federal markets for Tampa Fla.-based Digital Secured Networks said that IA also known as data integrity is probably the most important portion of securing information particularly in information warfare situations. For example IA policies and products are designed to prevent a subversive group from intercepting a message sent from one DOD official to another he said. If a message is not adequately protected - most commonly with encryption and authentication - that message could be altered without the recipient's knowledge.

While the exact number of these so-called "man-in-the-middle" attacks is not widely known because victims do not routinely report them and because they usually are tracked by the secretive National Security Agency Vangieri said the establishment of the DOD team indicates the department probably is suffering from these types of attacks.

The team had its first organizational meeting late last month and will continue to meet during September. The group's goal is not to introduce programmatic changes but to look at how best to give guidance and form policies against which DOD components can measure their progress the DOD official said.

"One of the motivations is that about 95 percent of unclassified communications rides on public switched networks " the official said. "DOD is increasingly dependent on an infrastructure that we don't control and so we need to take a look at how to ensure that the information gets delivered."Mark Adams head of the newly formed Life-Cycle Information Integration Office is a member of the team reviewing information assurance practices. Because the group focuses on cross-functional issues and on systems life cycles "it's in our best interest to be a part of the team " Adams said. "Information assurance is critical for us."

NEXT STORY: Round Two

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.