Please note: In order to keep Hive up to date and provide users with the best features, we are no longer able to fully support Internet Explorer. The site is still available to you, however some sections of the site may appear broken. We would encourage you to move to a more modern browser like Firefox, Edge or Chrome in order to experience the site fully.

Cyber Resiliency, Security, and Cloud Computing Suitability in Military Information Technology, PDF eBook

Cyber Resiliency, Security, and Cloud Computing Suitability in Military Information Technology PDF

Edited by Jesse A Flanagan

PDF

Please note: eBooks can only be purchased with a UK issued credit card and all our eBooks (ePub and PDF) are DRM protected.

Description

The United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent utilizing cyber capabilities in combination with all of their military and intelligence capabilities.

While the Department of Defense takes great care to secure the use and operation of the "hardware" of its weapon systems, these security practices have not kept up with the cyber adversary tactics and capabilities.

Further, the same level of resource and attention is not spent on the complex network of information technology (IT) systems that are used to support and operate those weapons or critical cyber capabilities embedded within them.

This book provides recommendations for a workable framework; details about how the Department could prepare to operate in a cyber-contested environment; and the task force describes the specificaspects of the cloud computing configuration that are relevant to avoid the simple choice of public or private clouds.

Information

Information