300 N. Washington St.
Suite B-100
Alexandria, VA 22314
info@globalsecurity.org

GlobalSecurity.org In the News




Navy Newsstand April 29, 2009

Cyber Readiness Key to Mission Success

Story Number: NNS090429-12
Release Date: 4/29/2009 4:40:00 PM

By Dan Bowen, Commander Fleet Activities Yokosuka Public Affairs

YOKOSUKA, Japan (NNS) -- The Defense Information Systems Agency (DISA) will be on board Commander Fleet Activities Yokosuka (CFAY) the week of June 8 to conduct a command cyber readiness inspection (CCRI).

Inspectors will look into several areas to assess CFAY's ability to maintain the integrity of the global integration grid (GIG).

According to www.globalsecurity.org, "the GIG represents a globally interconnected, end-to-end set of information capabilities and processes for collecting, processing and managing information on demand to warfighters, policymakers and support personnel. The GIG fulfills a fundamental principle of network-centric operations by securely connecting people and systems regardless of time or place, providing vastly superior situational awareness and better access to information for accelerated decision-making."

What this means to CFAY personnel is that with the GIG in place, a threat to one user is a threat to all users. The inspection will look at physical security, network assurance, information awareness and will also determine if there are any deficiencies in the system.

According to Lt. Michael Gann, Naval Computer and Telecommunications Station Far East (NCTSFE) department head, who will serve as the military lead for the CCRI at NCTSFE, everyone has a part to play in maintaining system integrity.

"Little things go a long way in protecting our networks," said Gann. "Don't wear security badges outside of your spaces; make sure you don't allow anyone [who doesn't belong] into your secure spaces, and don't leave your common access card (CAC) unattended in your computer. Also, know who your security manager is and follow the rules concerning information assurance and physical security."

Users also need to be aware of visiting unauthorized Web sites, opening suspicious e-mails and sending secret information over the Non-Secure Internet Protocol Router Network (NIPRNET).

Protecting the network is not limited to classified networks only. Adversaries to the United States look for ways to breach cyber security and gain access to systems and information. Information doesn't have to be classified to potentially have a significant negative impact to the nation's overall defense posture. Bits of unclassified information can be pieced together and allow adversaries to make clear estimations and logical deductions concerning the classified information.

Additionally, the Navy uses the unclassified networks for logistical support of deployed units worldwide. Exploitations of these networks could be the difference between "click" and "bang." Therefore, protecting the NIPRNET is as vitally important as protecting classified networks.

"Your work computer is a tool, same as a government vehicle, a needle gun or a weapons system," said Gann. "Use it correctly or it will be taken away. All it takes is one guy [to use the computer improperly] to bring down the entire network."


© Copyright 2009, Navy Newsstand