{"id":1624,"date":"2016-12-19T17:22:28","date_gmt":"2016-12-19T20:22:28","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=1624"},"modified":"2016-12-19T17:22:28","modified_gmt":"2016-12-19T20:22:28","slug":"las-operaciones-ciberneticas-del-ejercito-usa-tienen-un-problema-de-datos","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=1624","title":{"rendered":"Las operaciones cibern\u00e9ticas del Ej\u00e9rcito USA tienen un problema de datos"},"content":{"rendered":"<p>Las operaciones cibern\u00e9ticas del Ej\u00e9rcito USA son desafiadas por el an\u00e1lisis de Big Data que fluye a trav\u00e9s de la red, seg\u00fan el director cibern\u00e9tico G-3\/5\/7 del Ej\u00e9rcito USA.<!--more--><\/p>\n<p>The Army\u2019s cyber operations are challenged by the amount of data flowing through the network, according to the service\u2019s cyber director in the Army\u2019s G-3\/5\/7 branch.<\/p>\n<p>\u201cWe are challenged with big data analytics,\u201d Brig. Gen. Patricia Frost said at <a href=\"http:\/\/www.federaltimes.com\/cybercon\">Federal Times&#8217; CyberCon conference<\/a> in Washington on Wednesday. The Army and the other services are working on how to cull through \u201ca tremendous amount of data\u201d in a way that brings appropriate knowledge or information to the decision-makers in the field.<\/p>\n<p>\u201cAt echelon, when you talk to our commanders, they are overwhelmed, they rarely feel they [have] the information required to get to the decision,\u201d Frost said.<\/p>\n<p>Solutions to understanding the cyber battle space and help process the data could include visualization tools to aid commanders in the electronic warfare spectrum; the ability to pinpoint an adversary, if the adversary can see you in cyberspace; and where one may be denied the ability to operate, she said.<\/p>\n<p>Brig. Gen. Jennifer Buckner, deputy commander of operations at U.S. Cyber Command\u2019s Cyber National Mission Force, said the force\u2019s relationship with the Defense Innovation Unit Experimental (DIUx) has helped bring some technologies to light that could help offensive and defensive operations in cyberspace, to include better ways to speed through or harvest data and even respond automatically based on data ingested into the system.<\/p>\n<p>The need to process large amounts of data into usable information for commanders is just the \u201ctip of the spear\u201d of cyber operations.<\/p>\n<p>The network itself, Frost noted, is a war fighting platform for the \u201cdigitized\u201d military. \u201cIf you are denied service on that war fighting platform, portions of what you are trying to achieve as a commander\u201d cannot be accomplished, she said.<\/p>\n<p>\u201cWe look at the capabilities needed and so we have to train our forces to understand the war fighting platform defensively, but then what do we actually want to put in the hands of our commanders at echelon that would give them an offensive advantage,\u201d Frost said. \u201cI truly believe that our commanders at each echelon need to have capability to visualize this battle space, this [Department of Defense Information Network] DoDIN.\u201d<\/p>\n<p>And cyber operators need to see the battle space and how data is moving within that\u00a0\u2014\u00a0whether they are sitting in a contingency-operating base or a forward-operating base\u00a0\u2014\u00a0in order to shape operations, according to Frost. Then the Army needs to ensure it&#8217;s providing the right tools to act on the offense within cyberspace when necessary.<\/p>\n<p>On the defensive side of cyber operations, the Army is getting ready to conduct an event it\u2019s calling Hack the Army, recently announced by Army Secretary Eric Fanning, Frost noted.<\/p>\n<p>The concept is similar to the Defense Department\u2019s \u201cbug bounty program\u201d that pays outside hackers to discover and disclose vulnerabilities on DoD networks. Hack the Army will launch at the end of November.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Fuente:<\/strong> <em><a href=\"http:\/\/www.federaltimes.com\/articles\/the-armys-cyber-ops-has-a-data-problem\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.federaltimes.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Las operaciones cibern\u00e9ticas del Ej\u00e9rcito USA son desafiadas por el an\u00e1lisis de Big Data que fluye a trav\u00e9s de la red, seg\u00fan el director cibern\u00e9tico&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/1624"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1624"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/1624\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1624"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1624"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}