Course Hero Logo

And control of forces real time provision of

This preview shows page 1 - 2 out of 2 pages.

and control of forces, real-time provision of intelligence, and remote operations. Every one ofthese functions depends heavily on the military's global communications backbone, whichconsists of thousands of networks and millions of computing devices across hundreds of militaryposts in dozens of countries (Lynn, 2014).In less than a generation, information technology has evolved within the confounds of the U.Smilitary from the applications of administrative tool to enhancing force productivity into anational strategic asset in its own right. The U.S. military’s digital infrastructure now gives theUnited States critical advantages over any adversary. However, its reliance on such advanceconnectivity may also be a potential hazard that enables adversaries to gain valuable intelligenceabout its capabilities and operations. These hazards may impede its kinetic forces and disrupt thehealth and social economic development. Specifically, cyberwarfare is asymmetric, the low costof computing devices means that U.S. adversaries do not have to build expensive weapons, suchas stealth fighters or aircraft carriers, to pose a significant threat to its military capabilities.Indeveloping a strategy to counter these dangers, the USCYBERCOM is focusing on attributes ofthe cyberthreat by providing protection of all defense networks and supports and

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 2 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags
United States Department of Defense

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture