Cyberspace Operations

Cyberspace Operations

A wide ranges of actors, from nation states to individuals, engage in malicious cyber activity to undermine the economy and threaten national security.

The Army must account for Cyberspace Operations in a tactical environment, like a Tactical Operations Center where military specific operations occur. The tactical environment provides unique challenges to the Army from a defensive and offensive perspective. Army Cyberspace Operations include a broad spectrum of capabilities and initiatives that provide tactical decision makers with the assurance, awareness and protection needed to operate effectively in the cyberspace environment and the ability to exploit, deny and disrupt the adversary's use of it. The cyber domain continues to grow, and the DOD has identified cyber as a defense domain much like air, land, maritime and space; however, unlike the other domains there is not a specific military service to deal with cyber. CERDEC provides Soldiers with state-of-theart tools and techniques for offensive and defensive cyber operations. CERDEC looks at challenges such as mitigating threats posed by voice, video and data services available on the Internet that could affect Internet-connected devices. CERDEC support to the Army's cyber mission includes research of overseas contingency operations technologies and the implementation of a standardized software framework and specifications. This support reduces the timeline and costs required for the development of new capabilities and reduces operator- training requirements. CERDEC provides continued information superiority and ensures that mission critical information is available, connected and secured in an environment of information warfare attacks and unintentional disruptions. Assurance against disruption can include detecting malicious code against zero-day attacks that exploit previously unknown vulnerabilities; enabling information sharing across multiple security boundaries properly; and developing, testing and evaluating intrusion detection, user authentication, cryptography and biometric capabilities.