Posted on Mar 31, 2015
1SG(P) 1st Sergeant
7.37K
47
21
5
5
0
I ask this question, because in the past, I always saw this as an IT piece of network security. Today, those lines are blurred. There are so many pieces of Security that tie in to Cyber Security. Think of social engineering and physical security. We need to physically have areas locked down and guarded so we don't have someone inserting a device somewhere and opening a port on a network.

In the military, we have Force Protection/Anti-Terrorism units that have Cyber Security sections. Many different areas of the civilian world have Cyber Security seperate from the IT departments altogether.

So where do you think this fits in the military, in our world today?

I'm also attaching an article I read:

http://www.defense.gov/news/newsarticle.aspx?id=128305
Avatar feed
Responses: 12
COL Jason Smallfield, PMP, CFM, CM
11
11
0
Edited >1 y ago
Where Cyber Security belongs depends upon how it is defined and visualized. These are important things that should be critically thought about along with DOTMLPF (doctrine, organization, training development, material, leader development, personnel, facilities) considerations. Some historical examples.
- Tank. The tank was introduced in 1917. The British and French saw the tank as an infantry support vehicle and thus developed their DOTMLPF to support this vision. The Germans saw the tank as an independent vehicle and thus developed their DOTMLPF to support this vision. End result: the Germans kicked the British and French butts within six weeks in May 1940 even though the British and French had more tanks and their tanks were better (more powerful and heavily defended but less mobile).
- Airplane. The plane was first seen in 1904 and used in WWI. The Germans created a separate Air Force but saw the purpose of that Air Force to be tactical (support the Army). This is one reason why the Germans were not able to set proper air conditions for the invasion of Great Britain during the Battle of the Blitz. The Americans kept the Air Force as part of the Army (Army Air Corps) during WWII but created both strategic and tactical capability. The Air Force split from the Army in 1947. End result: The US was able to set tactical and strategic air conditions for the invasions of Europe, Germany, and Japan.
- Machine guns. Originally heavy and immobile thus Machine Gun Battalions were created in WWI. Eventually became lighter and more mobile which allowed for infusion into all elements at the platoon level.
- Cyber Security. Short answer is that I do not yet know where Cyber Security belongs but I know the methodology I will use to answer that question were I passionate about it to pursue it. Cyber security includes many different elements including but not limited to: offensive capability, defensive capability, engineering aspects (physical structures), IT aspects, private and public implications, etc.
(11)
Comment
(0)
SFC Mark Merino
SFC Mark Merino
>1 y
Untitled
I was taking notes on this response. Great input COL Jason Smallfield, PMP, CFM, CM!
(2)
Reply
(0)
TSgt Joshua Copeland
TSgt Joshua Copeland
>1 y
Great answer and better history lesson to boot COL Jason Smallfield, PMP, CFM, CM!!
(2)
Reply
(0)
1SG(P) 1st Sergeant
1SG(P) (Join to see)
>1 y
That was exactly the answer I was looking for, Sir. I have worked in the private sector in IT sales for quite a few years and have seen that evolve. You hit the head right on the nail!
(0)
Reply
(0)
Avatar small
1SG(P) 1st Sergeant
5
5
0
Image
To see real time Cyber attacks, try: http://map.ipviking.com
(5)
Comment
(0)
TSgt Tim (lj) Littlejohn
TSgt Tim (lj) Littlejohn
>1 y
wowholyshit, amazing site. thanks
(1)
Reply
(0)
1SG(P) 1st Sergeant
1SG(P) (Join to see)
>1 y
There are some other sites that collect and show this data in real time too, but this is my favorite. I work in IT Sales and when I ask a client how secure they are, I wait for their answer and then show them this site. Jaw dropping to say the least.
(1)
Reply
(0)
Avatar small
TSgt Joshua Copeland
4
4
0
I think it is an emerging new area that fits in either on it's own, in IT or in traditional security just depending on the size, scope and mission of the organization. It is hard to be the master of all things. A large IT based firm would likely have a separate cyber security dept in addition to a traditional security dept. A very small company might have their IT dept handle it. A company with no "in house" IT would likely have their traditional security handle it.
(4)
Comment
(0)
Avatar small

Join nearly 2 million former and current members of the US military, just like you.

close