A Review of the Cybersecurity Programs in the United States Army

Authors

  • Grayson Sawyer University of Phoenix
  • Brayden Emmett University of Phoenix

DOI:

https://doi.org/10.53819/81018102t2017

Abstract

Cybersecurity is very complex, and as such, decisions regarding cybersecurity are highly intertwined with the functionality and application of systems. The threat to cybersecurity is, however, ever-evolving and decisions regarding cybersecurity, therefore, need to be made with this in mind. Cybersecurity systems, therefore, need to be tailored to individual systems, be adaptive, have the ability to evolve with the threat as well as be highly integrated with the system designs and the mission these systems support . In the military, it is critical to develop systems that maintain the expected level of confidentiality, non-repudiation, authentication, integrity, and availability that aids towards the collective goal of cybersecurity. In the military there are several stakeholders that play a key part in cybersecurity with the main ones being; the ones commanding or using the military system, the ones involved in the acquisition, life-cycle management and testing, the authorizing officials, the Chief Information Officer (CIO) and the intelligence and the counterintelligence officers. Accountability and control is, therefore spread out throughout the organization. This, however, leads to the blurring of roles and responsibilities. In conclusion, therefore, even though militaries exist for the purpose of combat most of the time, they operate in relatively peaceful conditions. During these peaceful times, they imagine and manufacture wartime conditions to determine their preparedness and the chances of a victory with the current conditions and resources. A communication plan approach will be able to tear down the expected natural resistance since the leaders will support the proposed changes and even devote resources to see that they are successful. The purpose of the communication plan is to, therefore, make the leaders the advocates for change. This is based on the understanding that in this environment, change is not possible without support from the leadership.

Keywords: Cybersecurity, Intelligence, Communication & United States Army

Author Biographies

Grayson Sawyer, University of Phoenix

University of Phoenix

Brayden Emmett, University of Phoenix

University of Phoenix

References

Bray, T. (2020). Military Information Technology Certification Training Addressing Implementation Procedures against Cyber-Attacks: An Exploratory Case Study. University of Phoenix.

Caulkins, B. D. Enhancements to Cybersecurity Curricula to Support Behavioral Aspects of Cyber.

Davidson, L. (2020). Defining the Workforce and Training Array for the Cyber Risk Management and Cyber Resilience Methodology of an Army. In ECCWS 2020 20th European Conference on Cyber Warfare and Security (p. 466). Academic Conferences and publishing limited.

Dawson, J., & Thomson, R. (2018). The future cybersecurity workforce: going beyond technical skills for successful cyber performance. Frontiers in psychology, 9, 744. https://doi.org/10.3389/fpsyg.2018.00744

Eisenberg, D. A., Linkov, I., Park, J., Bates, M. E., Fox-Lent, C., & Seager, T. P. (2014). Resilience metrics: lessons from military doctrines. Solutions, 5(5), 76-87.

Grimshaw, M. D. (2017). Operational cybersecurity risks and their effect on adoption of additive manufacturing in the naval domain. Naval Postgraduate School Monterey United States.

Hall, A., & Sobiesk, E. (2017). Integration of the cyber domain at the United States Military Academy. In Proceedings of International Workshops: Realigning Cybersecurity Education, Melbourne, Australia. doi (Vol. 10, No. 3293881.3295778).

Hill, A. (2015). Military innovation and military culture. Parameters, 45(1), 85. https://doi.org/10.3389/fpsyg.2018.00744

Karaman, M., Çatalkaya, H., & Aybar, C. (2016). Institutional Cybersecurity from MilitaryPerspective. International Journal of Information Security Science, 5(1), 1-7.

Long, M. C., Bush, J., Briggs, S., Patel, T., Westervelt, E., Shepard, D., & Schwenk, D. (2019). An Army Guide to Navigating the Cyber Security Process for Facility Related Control Systems: Cybersecurity and Risk Management Framework Explanations for the Real World. ERDC Construction Engineering Research Laboratory Champaign United States. https://doi.org/10.21079/11681/35294

Pajurek, M. (2017). Cybersecurity military entities of the United States of America. Facta Simonidis, 10(1), 163-178.

Pearson, J. R. (2021). Addressing Cybersecurity and Safety Disconnects in Army Aviation: An Exploratory Qualitative Case Study. Capella University.

Poe, L. R. (2018). The Development of Information Assurance and Cybersecurity Competency Lists.

Roldan, H., & Reith, M. (2018). A Strategic Framework for Cyber Attacks in the Military. In International Conference on Cyber Warfare and Security (pp. 622-XV). Academic Conferences International Limited.

Santiago, G. (2019). Cybersecurity Risk Management Process For Unmanned Aerial Systems (Uas) At The Strategic Level. Naval Postgraduate School Monterey United States.

Snyder, D., Powers, J. D., Bodine-Baron, E., Fox, B., Kendrick, L., & Powell, M. H. (2015). Improving the cybersecurity of us air force military systems throughout their life cycles. Rand Project Air Force Santa Monica Ca.

Tikk, E., & Kerttunen, M. (Eds.). (2020). Routledge Handbook of International Cybersecurity. Routledge. https://doi.org/10.4324/9781351038904

Downloads

Published

2021-10-29

How to Cite

Sawyer, G., & Emmett, B. (2021). A Review of the Cybersecurity Programs in the United States Army. Journal of Information, Technology and Data Science, 5(1), 22–30. https://doi.org/10.53819/81018102t2017

Issue

Section

Articles