Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Defense & IC

Securing Weapon systems with a Focus on Resilience

by Ryan Schradin
February 10, 2019
in Defense & IC
Reading Time: 5 mins read
A A
Securing Weapon systems with a Focus on Resilience
Share on FacebookShare on Twitter

In our previous post on the Government Technology Insider, we looked at a recent Thought Piece by Booz Allen Hamilton entitled, “Managing Cyber Risk and Building Cyber Resilience in Weapon Systems,” which analyzes the current cyber threats facing weapon systems and why it’s so difficult to accurately assess the security vulnerabilities of increasingly sophisticated and network-connected military platforms.

Download Here

Ultimately, today’s military platforms and weapon systems are increasingly network and software-enabled, which is helping to make them more effective and efficient tools for the warfighter, but is opening them up to a new avenue of attacks that less connected and intelligent systems never faced before.

This is problematic for the military since cyberattacks could not only function to negate weapon systems, but could also potentially turn them against their operators – giving our near-peer adversaries a new way to strike at our military personnel and capabilities.

According to the Booz Allen Hamilton Thought Piece, there are steps that the military can take to protect itself – including some new technologies that can help to make them more secure. However, truly defending these systems and the capabilities they deliver needs a shift in mentality and a focus on increasing resilience and mission assurance as a whole.

More intelligence risk assessment
As we discussed in our previous post, today’s modern military platforms and weapon systems are “systems of systems” that are effectively the aggregation and integration of multiple different systems from disparate vendors and industry partners. Each of these systems has its own function and they work together to enable basic functions for the weapon system as a whole. Each of these systems also have their own unique security challenges and vulnerabilities that need to be addressed.

This complexity makes it difficult to identify an attack surface for cyber threats – which is only compounded by threats to external things like attachments and the larger supply chain.

With such a vast and broad attack surface, it could appear to be almost impossible to secure everything. But it’s not about securing everything, it’s about unraveling the system, identifying the mission-critical components, and securing them.

However, just securing these areas of highest risk isn’t enough. To properly secure weapon systems and the capabilities they deliver to the warfighter, the Thought Piece claims that the military needs to focus less on battling individual cyber risks and more on increasing overarching cyber resilience.

Click this image to download the Thought Piece, “Managing Cyber Risk and Building Cyber Resilience in Weapon Systems.”

What is cyber resilience?
Attempting to address all cyber risks individually can ultimately become like a game of “Whack a Mole.” A vulnerability is identified in advance or when a cyberattack occurs, and it is then eliminated. Attempting to keep weapon systems secure this way is shortsighted at best, because the military could potentially fail to whack one of those moles in a timely fashion.

Cyberattacks are going to happen and they’re eventually going to be successful. Just trying to patch up vulnerabilities and hoping that the enemy never successfully breaches cybersecurity systems and defenses is unrealistic. Our adversaries are already incredibly sophisticated in their cyber capabilities, and those cyber capabilities are constantly improving and evolving.

Instead, the military needs to look at their weapon systems and identify ways in which they can still function even if a cyberattack is successful. They need to identify how they can make these systems cyber resilient – capable of withstanding a successful attack and still functioning for the warfighter.

Cyber resilient weapon systems would be those that can have some of their systems impacted by a sophisticated cyber threat, but “bounce back” to continue working towards accomplishing its mission.

Cyber resilience and the mission
Ultimately, what really matters is what our weapon systems are capable of performing when needed by the warfighter in execution of the mission. To ensure this, an overarching plan that utilizes today’s advanced technologies and analytics needs to be embraced and instituted. This will help identify the largest areas of weakness in our weapon systems and work to eliminate vulnerabilities, while also taking a mission-wide look at our weapon systems to identify mission assurance and cyber resilience.

It’s essential that the military finds the places where weapon systems are most vulnerable and works to ensure that those vulnerabilities are corrected. This is key in mitigating risk and reducing the chance of a successful cyberattack. However, that isn’t enough on its own.

By analyzing the impact that each weapons system has on mission assurance and identifying ways in which weapon systems can become more cyber resilient, the military can ensure that a successful cyberattack doesn’t make accomplishing the mission impossible. This can involve establishing system overrides, fail-safes, redundancies, and backups in case of a successful attack, or establishing rapid responses to return systems to functionality should they be compromised.

Only through the combination of securing weapon systems against attacks and building resiliency into weapon systems, should attacks be successful, can the military ensure overall mission resiliency and mission success.

For additional information, click HERE to download the Thought Piece, “Managing Cyber Risk and Building Cyber Resilience in Weapon Systems.”

Tags: advanced analyticscyber resilienceCyber Riskcyber threatsCyberattackscybersecuritydefenseDepartment of DefenseDODmilitaryMission Resiliencenetwork-enabled weapon systemsnetwork-enabled weaponsRisk Management FrameworkU.S. Air ForceU.S. ArmyU.S. Navyweapon systems

RELATED POSTS

Design Secure Application Software That Transforms Government Agencies
Civilian

Design Secure Application Software That Transforms Government Agencies

June 28, 2022
Contributed Articles

DMARC: A Critical Tool for State and Local Government Cybersecurity

June 21, 2022
Balancing Security and Customer Experience for Digital Government
CX Service and Delivery

Balancing Security and Customer Experience for Digital Government

June 20, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5356 shares
    Share 2142 Tweet 1339
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    40 shares
    Share 16 Tweet 10
  • Design Secure Application Software That Transforms Government Agencies

    11 shares
    Share 4 Tweet 3
  • 2022 Government Investigations Technology Guide Discusses Nine Factors Investigators Should Consider in Technology Solutions

    12 shares
    Share 5 Tweet 3
  • Customer and Industry Partnerships Are Helping Deliver 5G Solutions to Federal Agencies

    102 shares
    Share 41 Tweet 26

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us