Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Threat and Mitigation


Published on

The cyber threat to our Army and Nation is pervasive and most often target, human behavior through social engineering. The best mitigation measure for this risk is to increase cyber awareness by educating our Soldiers, Family Members, Government Civilians, and Contractors. HQDA has directed Army Antiterrorism Quarterly Theme Cyber Threat Awareness (2Q/FY13). For more information on Cyber Security, visit

  • Be the first to comment

  • Be the first to like this

Threat and Mitigation

  1. 1. What is the Threat? Cyber Warriors Needed♦ From Hactivists to Nation-States, these threats continue to attempt to penetrate Army Cyber Command will recruit, develop and retain qualified personnel Threat AND our networks everyday. to grow Cyber Professionals as the♦ Cyberspace threats are growing, evolving, cornerstone of the Army Cyber Force. Mitigation and sophisticated.♦ Cyberspace crime is the largest threat to individuals.♦ Loss of intellectual property is a significant National security risk to our information and technological advantage. U.S. Army Cyber Command♦ Loss of operational security information Second Army puts units, soldiers, and families at risk. How Can Leaders Help?∗ Cyberspace threats and mitigation of those threats is commander’s business. Know and mitigate the risks.∗ Recognize Cyberspace as a contested Operational Domain. “While some people may think cyber is all about technology, people are the center of∗ Ensure strong 2/3/6 integration in your all we do.” unit formations. Lt. Gen. Rhett Hernandez Commanding General, Army Cyber Command∗ Respect the Threat...It’s Not Random.∗ Enforce compliance with basic standards For More Information and discipline. Information Assurance is Second to None! not a given & remediation is expensive.
  2. 2. U.S. Army Cyber Command What Should I Know? What Should I Protect? What Should I Do at Home?What is Malware? Do not Store Passwords on your Computer Update Your Computer Software♦ Malicious software delivered through email ♦ Easy access to usernames and can result in ♦ Newer software has security enhancements. and the internet. identity theft, loss of money and revealing ♦ Harder for hackers to gain unauthorized♦ Performs unauthorized actions on the personal information about friends and family. access. computer. ♦ Look for software that:♦ Examples of malware are: Protect Physical Access to Devices ∗ Viruses ∗ Spyware ∗ Checks automatically for software ♦ The data on the computer is just as valuable as the hardware. updates. ∗ Worms ∗ Scareware ∗ Includes anti-virus, anti-spyware, anti- ∗ Trojan horses ∗ Crimeware ♦ Physical access makes it easy to circumvent security measures. phishing, safe browsing and firewall ∗ Dishonest Adware ∗ Most Rootkits capabilities.What is Phishing? Protect your Personally Identifiable Information (PII). Choose Privacy Settings on Social♦ Email messages from apparent legitimate Networking Sites that Provide the Greatest people or institutions targeting users. ♦ Limit PII on the Internet and social Security. networking sites.♦ Email messages may contain malicious ♦ Limit information shared with the social attachments (.pdf, .doc, .xls, .jpg). ♦ PII can be used for social engineering networking community.♦ Phishing is used to trick users into divulging attacks and identity theft. ♦ Limit who can view your profile. Personally Identifiable Information (PII) such ♦ Military members as well as families and as: ♦ Limit who can add you to their network. friends should not discuss or post any ∗ Passwords, SSNs, DoB information related to unit locations, assigned duties, work schedules, or ∗ Credit Card numbers deployment information. ∗ PINs, Addresses Doing nothing is not an option regarding cyber security. Be vigilant. Everyone has a part to play in ensuring Army networks stay secure and our national assets are protected.