Boeing. (2011, October 25). Boeing opens cyber engagement center in Maryland. Retrieved from http://boeing.mediaroom.com/index.php?s=43&item=1986 [press release / related Reuters article].
Boeing today opened a new Cyber Engagement Center (CEC)
in Annapolis Junction. The 32,000-square-foot facility will provide a
collaborative environment where security experts work together to
address current and evolving cybersecurity challenges. "The risks to industry and government cybersecurity grow every second
of every day," said John Hinshaw, vice president and general manager,
Boeing Information Solutions. "We've established this center to work
collaboratively with our customers to help defend their critical
infrastructure -- as well as our own."
Cobb, J. (2011). Centralized execution, decentralized chaos: How the Air Force is poised to lose a cyber war. Air and Space Power Journal, 26(2), 81-86. Retrieved from http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA544693&Location=U2&doc=GetTRDoc.pdf
In the current state of cyber warfare, massive centralized networks are at best fragile and often indefensible. The Air Force’s network operations paradigm relies on centralized control of the service’s cyberspace; although arguably adequate for maintenance and counterintelligence in “cyber peacetime,” it could fail spectacularly if ever tested by a serious cyber attack.
Grant, J. A. (2011, November / December).The National Strategy for Trusted
Identities in Cyberspace: Enhancing online choice, efficiency, security,
and privacy through standards. IEEE Internet Computing, 15(6), 80-84. [Full text available in IEEE Computer Society Digital Library database.]
Password-centric attacks are increasingly common, and reliance on weak
password technology has been a growing attack vector that threatens to
erode confidence in the online world. Alternative technologies are
needed to replace passwords as the primary method of online
authentication. The US government's National Strategy for Trusted
Identities in Cyberspace focuses on working in partnership with
the private sector to remove the barriers that have precluded most of
the country from easily adopting online identification technologies that
are secure and trusted and looks to technologies such as the Common
Access Card to securely manage identities.
Miles, D. (2011, October 20). Doctrine to establish rules of engagement against cyber attacks. Armed Forces Press Service. Retrieved from http://www.defense.gov/news/newsarticle.aspx?id=65739
New
doctrine under review by the Joint Staff will lay out rules of
engagement against an attack in cyberspace, the commander of U.S. Cyber
Command said today. The doctrine, once adopted, will help to define conditions in which
the military can go on the offensive against cyber threats and what
specific actions it can take, Army Gen. Keith B. Alexander told
reporters at an International Systems Security Association conference
here. It will support the Defense Department’s strategy for
operating in cyberspace, released in July, and President Barack Obama’s
international cyberspace strategy, the general added.