5
5
0
I ask this question, because in the past, I always saw this as an IT piece of network security. Today, those lines are blurred. There are so many pieces of Security that tie in to Cyber Security. Think of social engineering and physical security. We need to physically have areas locked down and guarded so we don't have someone inserting a device somewhere and opening a port on a network.
In the military, we have Force Protection/Anti-Terrorism units that have Cyber Security sections. Many different areas of the civilian world have Cyber Security seperate from the IT departments altogether.
So where do you think this fits in the military, in our world today?
I'm also attaching an article I read:
http://www.defense.gov/news/newsarticle.aspx?id=128305
In the military, we have Force Protection/Anti-Terrorism units that have Cyber Security sections. Many different areas of the civilian world have Cyber Security seperate from the IT departments altogether.
So where do you think this fits in the military, in our world today?
I'm also attaching an article I read:
http://www.defense.gov/news/newsarticle.aspx?id=128305
Posted >1 y ago
Responses: 12
Nice question. I'm not an IT guy, but just my 2 cents. They do overlap, but they are also distinctly different as you said. I won't even say one is necessarily a subset of the other. I do like your "Hardware" vs "Social Engineering" description because in general, I think that has a lot of credibility. In short, I agree that they are distinct from each other. A complete approach would need to address both.
Overlap, where hardware supports and interfaces with the social engineering aspect as one example.
Overlap, where hardware supports and interfaces with the social engineering aspect as one example.
(1)
(0)
Cyber is a new realm of warfare just like land, sea, and air. It can potentially be the most dangerous as well. DOD needs to stop whatever experiment they are trying and create a separate branch all together for Cyber. This is a realm that is not going anywhere, is only going to expand, and will define how every single branch operates.
(0)
(0)
Read This Next

Cybersecurity
Informational Security
