DISCLOSURE: Sourced from Russian government funded media

The US Navy is paying a lot of attention to countering cyber attack threats. Recently, work on the protection of weapon systems from the effects of cyber attacks has been conducted in 36 areas.

According to Bryson Bort, CEO of Scythe, which develops cyber defense systems, this may be non-advanced research, but it’s about the first step in quality control of cyber security, which should have been done long ago with respect to sophisticated weapons systems.



The command of the American fleet has already recognized this. Studies on the protection of weapons are conducted against the background of reports that the US military regularly subjected to cyber attacks. In December 2018, it was reported that Pentagon officials were not taking even the simplest cybersecurity measures to protect ballistic missile systems.

The Pentagon’s weapons are estimated at about $ 1.66 trillion, but as stated in the October report of the government reporting department, almost all US missiles, airplanes, ships and other lethal weapons, both used and under development, are vulnerable to cyber attacks.

The US Congress ordered the Pentagon to eliminate the vulnerabilities of weapons. Three areas of research that interested the US Navy commanders called the pillars of robust cyber security. They include the following:

Dynamic reconfiguration

To confuse hackers, the Navy conducts research in the field of dynamic reconfiguration. This term refers to “changes in router rules, access control lists, intrusion detection / prevention system settings, and filtering rules for firewalls and gateways.”

Organizations will have to perform dynamic reconfiguration of information systems in order, for example, to stop attacks, mislead intruders and isolate system components, thereby limiting the extent of damage from violations.

A recent study at the University of Maryland found that predictive analytics, used in conjunction with dynamic reconfiguration tactics, can lead to successful development of detection models that can identify specific classes of malware, such as money extortion programs.

Deception tactics

Experts have long been using physical war strategies in digital battles, including the use of denial and deception tactics. The US Navy intends to improve its understanding of this area in order to better secure its weapon systems.

Using the classical methods of denial and deception to understand the specifics of cyber attacks of attackers allows the organization to create active cyber defense based on repelling threats.

The use of misleading software and hardware in cybersecurity is still in its infancy. In such technologies, there are no experimental measures of efficiency, that is, specialists are currently unable to determine how a defense mechanism can change the behavior of an attacker.

Artificial Intelligence

Currently, most military experts agree that the focus should be on artificial intelligence. The US Navy began using artificial intelligence since its Task Force Cyber ​​Awakening project in 2015. Nevertheless, at least many people like to use the phrases “artificial intelligence” and “machine learning”, but there are not that many people who are well-versed in artificial intelligence, so developments in this area are just beginning.


Читайте больше на https://military.pravda.ru/defence/09-01-2019/1404229-cyberattacks-0/

ATTENTION READERS

We See The World From All Sides and Want YOU To Be Fully Informed
In fact, intentional disinformation is a disgraceful scourge in media today. So to assuage any possible errant incorrect information posted herein, we strongly encourage you to seek corroboration from other non-VT sources before forming an educated opinion.

About VT - Policies & Disclosures - Comment Policy
Due to the nature of uncensored content posted by VT's fully independent international writers, VT cannot guarantee absolute validity. All content is owned by the author exclusively. Expressed opinions are NOT necessarily the views of VT, other authors, affiliates, advertisers, sponsors, partners, or technicians. Some content may be satirical in nature. All images are the full responsibility of the article author and NOT VT.

2 COMMENTS

  1. it’s NOT ” How much Israeli technology is being used? “:

    Try Guessing How Much The Israeli Stole Already And How Much have The Evil Israelis Backdoored …..

Comments are closed.