STAND TO!

Edition: Fri, August 10, 2007
Current Edition | FOCUS Submission Guidelines | Stand-To Fact Sheet | Printable Version

TODAY'S FOCUS

Information Assurance and Network Security

What is it? Information assurance (IA) and network security ensure the confidentiality, availability, and integrity of information across the entire spectrum of military operations. The environment characterized by rapid technology change that is subject to increasing frequency of attacks from a sophisticated and organized cyber threat ranging from nation states and transnational terrorist and criminal organizations to hackers and vandals capable of entering networks via cyberspace from any geographic location worldwide. IA defends the LandWarNet by employing a defense-in-depth strategy that integrates people, technology, and operations, supported by a trained/skilled workforce that employs multiple IA protective measures layered from the perimeter to the desktop.

What has the Army done? The Army's approach concentrates on protecting information, defending systems and networks, providing IA situational awareness, fostering innovation, and creating an empowered workforce. In Fiscal Year 2006 the Army led DoD on several strategic fronts:

- Quadrennial Defense Review (QDR),
- Federal Information Security Management Act (FISMA), and
- Homeland Security Presidential Directive-12 (HSPD-12).

For the QDR, Army highlighted IA as a key military strategy for securing cyber space and the warfighter. In FISMA, Army achieved near perfect scores in all system accreditations, security controls, contingency planning, annual security reviews, and has taken the initiative to document user and specialized training. In the wake of its FISMA success, the Army's achievement reflected positively on the DoD's overall grade. The phased implementation of HSPD-12 surpassed an aggressive timeline established by JTF-GNO for 100 percent compliance in the following areas:

- Cryptographic Common Access Card Logon for users and machines; and
- Contractor Verification System and electronic Digital Signature for authoritative authentication.

The Army has now completed these initial phases and has taken steps toward securing two way wireless devices and extending physical security measures to the DoD smart card technology.

- This topic was taken directly from the 2007 Army Posture Statement. To continue reading this topic in its entirety, click here.

INFORMATION YOU CAN USE

- 2007 Strategic Communication Guide - Be Army Strong, and Army Smart. Read the 2007 Army Strategic Communication Guide.

NEWS ABOUT THE ARMY

WAR ON TERROR NEWS

OF INTEREST

WORLD VIEW

WHAT'S BEING SAID IN BLOGS