Friday, October 28, 2011

October 28, 2011

Boeing. (2011, October 25). Boeing opens cyber engagement center in Maryland. Retrieved from http://boeing.mediaroom.com/index.php?s=43&item=1986 [press release / related Reuters article].
Boeing today opened a new Cyber Engagement Center (CEC) in Annapolis Junction. The 32,000-square-foot facility will provide a collaborative environment where security experts work together to address current and evolving cybersecurity challenges.  "The risks to industry and government cybersecurity grow every second of every day," said John Hinshaw, vice president and general manager, Boeing Information Solutions. "We've established this center to work collaboratively with our customers to help defend their critical infrastructure -- as well as our own."

Cobb, J. (2011). Centralized execution, decentralized chaos: How the Air Force is poised to lose a cyber war. Air and Space Power Journal, 26(2), 81-86. Retrieved from http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA544693&Location=U2&doc=GetTRDoc.pdf
In the current state of cyber warfare, massive centralized networks are at best fragile and often indefensible. The Air Force’s network operations paradigm relies on centralized control of the service’s cyberspace; although arguably adequate for maintenance and counterintelligence in “cyber peacetime,” it could fail spectacularly if ever tested by a serious cyber attack.

Grant, J. A. (2011, November / December).The National Strategy for Trusted Identities in Cyberspace: Enhancing online choice, efficiency, security, and privacy through standards. IEEE Internet Computing, 15(6), 80-84. [Full text available in IEEE Computer Society Digital Library database.]
Password-centric attacks are increasingly common, and reliance on weak password technology has been a growing attack vector that threatens to erode confidence in the online world. Alternative technologies are needed to replace passwords as the primary method of online authentication. The US government's National Strategy for Trusted Identities in Cyberspace focuses on working in partnership with the private sector to remove the barriers that have precluded most of the country from easily adopting online identification technologies that are secure and trusted and looks to technologies such as the Common Access Card to securely manage identities.


Miles, D. (2011, October 20). Doctrine to establish rules of engagement against cyber attacks. Armed Forces Press Service.  Retrieved from http://www.defense.gov/news/newsarticle.aspx?id=65739
New doctrine under review by the Joint Staff will lay out rules of engagement against an attack in cyberspace, the commander of U.S. Cyber Command said today.  The doctrine, once adopted, will help to define conditions in which the military can go on the offensive against cyber threats and what specific actions it can take, Army Gen. Keith B. Alexander told reporters at an International Systems Security Association conference here.  It will support the Defense Department’s strategy for operating in cyberspace, released in July, and President Barack Obama’s international cyberspace strategy, the general added.