Army focuses on cyber protection

    Date24 Dec 2004
    CategoryGovernment
    8472
    Posted ByBrittany Day
    A recently issued Army white paper, "Fight the Network," provides a new framework for the Signal Regiment, the service's communications organization, as it changes to support lighter, more mobile warfighting units. Army information technology officials devised the document to help foster a different mind-set for communications personnel in defending and managing the service's networks, said Gordon Van Vleet, public affairs officer for the service's Network Enterprise Technology Command/Ninth Army Signal Command at Fort Huachuca, Ariz. Netcom officials oversee the operation, management and protection of the Army's networks.


    "Never before has the Signal Regiment been as critical to the success of our Army," Lt. Gen. Steve Boutelle, the service's chief information officer, wrote in the document's introduction.

    Army IT officials want the service's communications personnel to "fight" the network so they can provide secure, ample communications on demand to soldiers in combat anywhere in the world. The document identifies the importance of network availability, interoperability and control.

    The white paper marks Army IT officials' third wide-scale attempt in recent months to alert personnel to the urgency of operating and protecting the service's networks. In August, Boutelle told Army IT personnel at a conference that the service's systems are increasingly under cyberattack.

    In November, Boutelle's office released a brochure, "Fight the Network: The Network as a Weapon System," that highlights main points in the white paper.

    Industry officials said Boutelle and Army IT officials will likely focus on strengthening the operation, management and protection of the service's IT infrastructure during the upcoming fiscal 2006 budget process. They expect that Army officials will want to further consolidate the service's enterprise IT infrastructure.
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.