Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


DoD Issues First Unified Strategy for Cyber-Space Operations

On July 14, 2011, the Department of Defense introduced its first Cyberspace Operations Strategy, highlighting the sector's planned intention towards safeguarding the country while on the Internet. Sociable published this on July 15, 2011.

Said the DoD, with each passing day, America's national security, economic set up and public safety were threatened with over 60,000 fresh malware strains. Thus, owing to such rising threats, Leon E. Panetta, Secretary of Defense stated that it was crucial that the country's cyber capabilities were strengthened. GIBill.com published this on July 15, 2011.

Meanwhile, immediately when the Pentagon officials disclosed the first unified cyberspace strategy, the New York Times quoted experienced American officers as reporting a most evil digital attack that hit the military lately whilst offshore hackers infiltrated a PC belonging to one corporate dealer for accessing 24,000 confidential files.

Stated William J. Lynn III, Deputy Secretary of Defense, DoD, which operated 15,000 networks as also over 7m PCs, still remained a target for carrying out sinister activity across cyber-space. According to him, since the huge operational systems of DoD utilized more-and-more of computerized arrangements for taking care of business systems and logistics networks, dangers towards cyber-security were capable of endangering national security too. GIBill.com published this.

Evidently, Lynn revealed that since many years, hacking attacks had victimized the Pentagon. According to him, sensitive documents were lost to hackers who broke into the data networks of the defense industry and stole confidential information regarding satellite navigation, missile tracking, sophisticated jet fighters and unmanned drones.

Lynn further stated that it was highly worrisome that foreign infiltrators had been extracting data from defense corporation networks during the last ten years. Checkpoint Washington published this on July 14, 2011.

But now, dependent on the deployment of sensors, code and software, the newly launched strategy by the DoD is able to identity and prevent infiltrations from interrupting operations. Stated Lynn that when an assault didn't have the impact it aimed for, people who wanted to cause damage to the country would've less incentive for attacking it via cyber-space at the very outset. Guardian.co.uk published this on July 15, 2011.

Related article: Data Theft Incidents Influence Consumers Adversely

ยป SPAMfighter News - 7/27/2011

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page