The US Navy is paying a lot of attention to countering cyber attack threats. Recently, work on the protection of weapon systems from the effects of cyber attacks has been conducted in 36 areas.

According to Bryson Bort, CEO of Scythe, which develops cyber defense systems, this may be non-advanced research, but it’s about the first step in quality control of cyber security, which should have been done long ago with respect to sophisticated weapons systems.

The command of the American fleet has already recognized this. Studies on the protection of weapons are conducted against the background of reports that the US military regularly subjected to cyber attacks. In December 2018, it was reported that Pentagon officials were not taking even the simplest cybersecurity measures to protect ballistic missile systems.

The Pentagon’s weapons are estimated at about $ 1.66 trillion, but as stated in the October report of the government reporting department, almost all US missiles, airplanes, ships and other lethal weapons, both used and under development, are vulnerable to cyber attacks.

The US Congress ordered the Pentagon to eliminate the vulnerabilities of weapons. Three areas of research that interested the US Navy commanders called the pillars of robust cyber security. They include the following:

Dynamic reconfiguration

To confuse hackers, the Navy conducts research in the field of dynamic reconfiguration. This term refers to “changes in router rules, access control lists, intrusion detection / prevention system settings, and filtering rules for firewalls and gateways.”

Organizations will have to perform dynamic reconfiguration of information systems in order, for example, to stop attacks, mislead intruders and isolate system components, thereby limiting the extent of damage from violations.

A recent study at the University of Maryland found that predictive analytics, used in conjunction with dynamic reconfiguration tactics, can lead to successful development of detection models that can identify specific classes of malware, such as money extortion programs.

Deception tactics

Experts have long been using physical war strategies in digital battles, including the use of denial and deception tactics. The US Navy intends to improve its understanding of this area in order to better secure its weapon systems.


Using the classical methods of denial and deception to understand the specifics of cyber attacks of attackers allows the organization to create active cyber defense based on repelling threats.

The use of misleading software and hardware in cybersecurity is still in its infancy. In such technologies, there are no experimental measures of efficiency, that is, specialists are currently unable to determine how a defense mechanism can change the behavior of an attacker.

Artificial Intelligence

Currently, most military experts agree that the focus should be on artificial intelligence. The US Navy began using artificial intelligence since its Task Force Cyber ​​Awakening project in 2015. Nevertheless, at least many people like to use the phrases “artificial intelligence” and “machine learning”, but there are not that many people who are well-versed in artificial intelligence, so developments in this area are just beginning.


Читайте больше на https://military.pravda.ru/defence/09-01-2019/1404229-cyberattacks-0/


EDITORIAL DISCLOSURE
All content herein is owned by author exclusively.  Expressed opinions are NOT necessarily the views of VT, authors, affiliates, advertisers, sponsors, partners, technicians or Veterans Today Network (VT).  Some content may be satirical in nature. 
All images within are full responsibility of author and NOT VT.
About VT - Read Full Policy Notice - Comment Policy

3 COMMENTS

  1. Exactly. The Pisraelis have everything backdoored for their own amusement so when and if all these cyber safeguards are in place, the Pisraelis will still be able to hack into them, after all they are God’s chosen people…..and you’re not.
    Was there ever any investigation into who was involved in the theft of nine nuclear tipped missiles and a B-52? Anyone ever convicted?
    If anything happens such as this you can bet the farm the Pisraelis are involved. So it won’t matter much concerning cyber security as long as the Pisraelis have the ability to hack their way past them.

  2. it’s NOT ” How much Israeli technology is being used? “:

    Try Guessing How Much The Israeli Stole Already And How Much have The Evil Israelis Backdoored …..

Comments are closed.