4 septembre 2018 | International, C4ISR

The rising importance of data as a weapon of war

By:

As Navy Cyber Security Division director, Rear Adm. Danelle Barrett casts a wary eye over the rising importance of data as a weapon of war. Data is an ever-more-critical battlefield asset, given the rising internet of things, including a rapidly growing inventory of unmanned intelligence, surveillance and reconnaissance assets across the Navy. Protecting all that data from enemy exploitation represents a potentially massive cyber challenge.

This spring, the Navy announced “Compile to Combat in 24 Hours,” a pilot project to leverage web services and a new cloud architecture in the service of data security. C4ISRNET's Adam Stone spoke to Barrett about the potential there, and about the emerging IT security landscape in a data-centric military.

C4ISRNET: Data has become increasingly valuable, especially in terms of intelligence, surveillance and reconnaissance. How valuable is it? How do you describe the significance of data these days?

REAR ADM. DANELLE BARRETT: If you look at what goes on in industry and how they use big data for decision making, to be predictive and proactive: that's exactly the kind of environment that we want to get to. Being able to trust those data, to access the data, expose the data, reuse the data — that becomes actually the hardest part.

C4ISRNET: Let's talk about that. Sharing data involves risk. Talk about that risk landscape.

BARRETT: The more data that you have out there and the more places you have it, obviously you have an increased attack surface. Adversaries will go after your data to try to get an advantage. So, you want to protect data down to the lowest layer and you want to make sure that you have defense in depth built in, and resiliency to be able to work through any kind of attack or interruption in your data flow.

We build our architectures around being resilient using the NIST [National Institute of Standards and Technology] model of “detect, react and restore.” You build in as much resiliency as you can.

C4ISRNET: Can you say, specifically, how that's done?

BARRETT: I'll give you an example of something that we're testing in our architecture to try to improve the data down to the data element layer. We have an effort called “Compile to Combat in 24 Hours.” We're looking at modernizing our afloat architecture and, as we do that, we're decomposing big monolithic applications, if you will, into web services similar to what you'd get on an iPhone: smaller capabilities, smaller web services as opposed to these big monolithic applications.

As you do that, you can ensure that you're using standard ports and protocols, so you don't have applications on the ship that are reaching back over nonstandard ports, which would present an increased attack surface. If you can standardize on your ports, you can sense those better and monitor those better.

Then you then go down to the data element layer. Say you standardize on extensible markup language, XML, you can then apply the SAML protocol that is inherent to that to protect your data at that lowest layer. We're testing that concept in an architecture now.

Full article: https://www.c4isrnet.com/it-networks/2018/08/31/the-rising-importance-of-data-as-a-weapon-of-war/

Sur le même sujet

  • Lockheed Martin has a new F-35 sustainment proposal for the Pentagon that may improve readiness

    26 février 2021 | International, Aérospatial

    Lockheed Martin has a new F-35 sustainment proposal for the Pentagon that may improve readiness

    The new proposal may not lead to the massive savings Lockheed pitched with its more expansive first pitch.

  • The F-35 engine is at a crossroads, with billions of dollars for industry at stake

    18 juillet 2022 | International, Aérospatial

    The F-35 engine is at a crossroads, with billions of dollars for industry at stake

    Up for grabs between two defense companies is the future power and propulsion capability of the U.S. Air Force's top fighter jet.

  • Why small cyberattacks on power systems more likely than a long-running blackout

    8 août 2018 | International, C4ISR

    Why small cyberattacks on power systems more likely than a long-running blackout

    By: Justin Lynch Attacks on American power systems are likely to be small and localized, according to a cybersecurity firm, casting doubt on the ability of a foreign power to take down broad swaths of U.S. electric systems at once. Given current technology it is not reasonable to expect an enemy to shut down large portions of the U.S grid., but hackers do have the ability to target an individual location, Joe Slowik, an adversary hunter at the cybersecurity firm Dragos, told Fifth Domain at the Black Hat conference. “I might not be able to turn off the eastern seaboard, but if I want to cause a power blip in Washington D.C., that is feasible,” Slowik said. His cautions come after a series of warnings from the U.S. government regarding the potential for attacks on the power infrastructure. "Think about New England in January, the grid going down for three days. A lot of people are going to suffer and die,” Director of National Intelligence Dan Coats said during a July 13 event at the Hudson Institute. Full Article: https://www.fifthdomain.com/show-reporters/black-hat/2018/08/08/why-small-cyberattacks-on-power-systems-more-likely-than-a-long-running-blackout/

Toutes les nouvelles