The United States cannot be confident that our critical Information
Technology (IT) systems will work under attack from a sophisticated
and well-resourced opponent utilising cyber capabilities in
combination with all of their military and intelligence
capabilities. While the Department of Defense takes great care to
secure the use and operation of the "hardware" of its weapon
systems, these security practices have not kept up with the cyber
adversary tactics and capabilities. Further, the same level of
resource and attention is not spent on the complex network of
information technology (IT) systems that are used to support and
operate those weapons or critical cyber capabilities embedded
within them. This book provides recommendations for a workable
framework; details about how the Department could prepare to
operate in a cyber-contested environment; and the task force
describes the specific aspects of the cloud computing configuration
that are relevant to avoid the simple choice of public or private
clouds.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!