Blog Posts from April, 2011

Protecting our Cyber Ecosystem

Image modified by IT2 Justin W. Hoffman, Information Assurance Officer, from the original at WiscMel at en.wikipedia with permission

On April 22, we celebrate Earth Day, a day intended to reflect appreciation for the Earth's natural environment. You are probably thinking, “How can we apply the concept of ecosystems to the man-made domain of cyberspace?” A recently published Department of Homeland Security (DHS) whitepaper, “Enabling Distributed Security in Cyberspace,” describes the need for a healthy and resilient cyber ecosystem. Similar to natural ecosystems, cyber ecosystems have a variety of diverse participants, including private firms, non-profits, governments, individuals, processes, and cyber devices. These cyber species interact at machine speed and can have a positive and a negative impact on the cyber ecosystem.

The paper notes that today’s main weakness of cyber defenses is that they are “founded on ad hoc, manual processes, yet cyber attacks often follow a well known, systematic escalation path beginning with reconnaissance activities and extending to gaining entry, establishing persistence…and conducting attack operations.” A future, healthy cyber ecosystem would have cyber devices that collaborate to anticipate cyber attacks, minimized the outcomes and the spread of attacks, and recover to a trusted state.

In a healthy cyber ecosystem, “the cyber participants work together in near-real time to anticipate and prevent cyber attacks.” Such a system would require improvements in three basic areas, and include automation, interoperability, and authentication. Automation (similar to a body’s immune system) could be used in the cyber environment by building local defenses, sustaining itself and assured missions while fighting through attacks. Interoperability provides the way for cyber ecosystem participants to learn, collaborate and resist attacks by working together. Finally, a healthy cyber ecosystem needs authentication to build trust in transactions and other online decisions.

While there has been success in cleaning and restoring the physical ecosystem, the speed of cyber ecosystem evolutions lends urgency in innovating resolutions to the cyber ecosystem. With increased threats coming into our computers (antivirus companies reported a 139% increase of web malicious software in 2010), it is easy to see why we all need to help in cleaning our part of cyberspace. The most notable challenge of the cyber ecosystem is to show the cost of a cyber incident and lower the incentive for the attacker while raising the urgency for the user to comply with best practices and reduce the loss of intellectual property, privacy, confidence, opportunities, and essential services. As we celebrate Earth Day and work to improve the health of our physical ecosystem, think of how you can help to lower attacker success (improve the health) in our shared cyber ecosystem.

Kay Myers
Chief, Cyber Defense Division
EUCOM C3 System and Warfighting Integration Directorate
Twitter: @Cyber_Patriot

Find more blog posts tagged with:

Comments: 0

Your comment:

CYBER ENDEAVOR 2011 Mid Planning Conference in Lisbon, Portugal

Last week, William Poole and I (EUCOM Cyber Defense Division International Information Assurance Branch) wrapped up the Cyber Endeavor portion of the Combined Endeavor 2011 mid-planning conference. Let me give you a little background on Cyber Endeavor. Educators and technical professionals from governmental organizations, industry, and academia, provide cyber defense familiarization to audiences from an estimated 40 countries. Cyber Endeavor is the premier forum for international military, industry and academic professionals to collaborate and improve partnerships with the end goal of strengthening collective cyber defense capabilities.

Find more blog posts tagged with:

Efficiencies in Europe: adjusting the US Force Posture

There has been tremendous speculation over the past year about the future of U.S. Force Posture in Europe.

Find more blog posts tagged with:

The Power of Partnering in the Baltics

In early March, we teamed up with Project Hope, a non-profit medical service organization, to work with us and our Baltic allies in Lithuania, Latvia and Estonia on some of the most relevant, important issues facing all of our forces.

Find more blog posts tagged with:

A Pretty Good Birthday

Along with two of the youngest members of the command, I cut a birthday cake to celebrate the moment sixty years ago, on 2 April 1951, when SACEUR Dwight D. Eisenhower activated Allied Command Europe – the predecessor to today’s Allied Command Operations – and its headquarters, the Supreme Headquarters Allied Powers Europe.

Find more blog posts tagged with:

Remembering Admiral Bob Moeller

A very good friend of mine died a few days ago on 29 March: Vice Admiral Bob Moeller, U.S. Navy.

Find more blog posts tagged with: