{"id":7532,"date":"2021-04-05T11:36:16","date_gmt":"2021-04-05T14:36:16","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=7532"},"modified":"2021-04-06T13:15:42","modified_gmt":"2021-04-06T16:15:42","slug":"el-ejercito-de-eua-desarrolla-una-herramienta-para-que-las-ciudades-entrenen-respuestas-a-ciberataques","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=7532","title":{"rendered":"El Ej\u00e9rcito de EUA desarrolla una herramienta para que las ciudades entrenen respuestas a ciberataques"},"content":{"rendered":"<p>El Army Cyber Institute est\u00e1 construyendo una plataforma port\u00e1til y adaptable para que las ciudades practiquen la respuesta a los ciberataques dirigidos a la infraestructura cr\u00edtica.\u00a0La idea surge de la serie de ejercicios creados por el instituto, el grupo de expertos del Ej\u00e9rcito en West Point, para investigar c\u00f3mo los ciberataques afectan la infraestructura cr\u00edtica a nivel local, como las telecomunicaciones o el servicio de agua. En algunos casos, los ejercicios examinaron c\u00f3mo un ataque cibern\u00e9tico grave podr\u00eda afectar el despliegue de las fuerzas militares.<\/p>\n<hr \/>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">WASHINGTON \u2014 The Army Cyber Institute is building a portable, tailorable platform for cities to practice responding to cyberattacks targeting critical infrastructure.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">\u201cFor a long time we assumed uncontested homeland, and now that\u2019s not necessarily as good of an assumption as it used to be,\u201d said Lt. Col. Erica Mitchell, research lead for the critical infrastructure\/key resources team at the Army Cyber Institute.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">The idea stems from the series of exercises created by the institute, the Army\u2019s cyber think tank at West Point, to investigate how cyberattacks affect critical infrastructure at the local level \u2014 for systems such as telecommunications or water service, for example. In some cases, the exercises examined\u00a0<a href=\"https:\/\/www.c4isrnet.com\/dod\/army\/2019\/07\/30\/how-the-army-is-strengthening-cyber-cities\/\" target=\"_blank\" rel=\"noopener\">how a serious cyber assault could impact military forces stateside<\/a>\u00a0from deploying overseas.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Given these exercises take 18-24 months to plan, leaders wanted cities and other municipalities to be able to run similar events more frequently.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">\u201cOne of the challenges we have is that a municipality\u2019s goal needs to align with the DoD\u2019s goals or the Army\u2019s goals and what we\u2019re doing with these tools is basically opening it up where anyone can use them,\u201d Mitchell told C4ISRNET before a virtual demonstration of the platform March 31.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">The Army would like military installations to work on the exercises with civilian counterparts in their region, she said.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">\u201cIt also allows for increased frequency. I can conduct one of these, let\u2019s say it\u2019s six months from now. Then I know what I need to work on, I see what works, what doesn\u2019t work \u2026 Six months later I can do another one. Have I improved, what do I still need to improve? I can track that progress and actually see where I started, how it\u2019s going and where I want to be.\u201d<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Currently in its beta form and not publicly available, the open-source platform consists in three components, including a writer application for developing scenarios and a planning application for developing a playbook for the exercise. Both of those feed into the last component, a platform that participants log into to perform the tabletop exercise.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Each are separate, web-based tools that do not require software downloads.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Beyond the tabletop exercise, Mitchell said there are plans to incorporate a cyber range where participants can conduct \u201clive fires\u201d in a simulated cyberspace. This live environment is about two years off and requires more funding.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">The plan is to secure more funding for testing and development and begin to roll out the beta version for test exercises, with the first likely in the fall. The cyber institute plans to make full operational capability available in fourth quarter of fiscal 2023.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">The bigger picture idea is for this platform to contribute to a greater sense of cybersecurity across society.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">\u201cOur goal as the Army Cyber Institute is to make this available to anyone regardless of their city budget,\u201d Mitchell said. \u201cBecause to us, the whole of community approach being done across the nation is going to better protect our critical infrastructure than anything else.\u201d<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">The platform is also of use to the military to provide a database for certain decisions.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Organizations such as the Army\u2019s Surface Deployment and Distribution Command, which provides logistics assistance in moving assets, can use data from exercises on the platform to challenge assumptions about using ports or other points to move capabilities.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Moreover, military installations rely upon the critical infrastructure, such as power supplies. Being able to work with municipalities to better understand how to protect these assets improves the strength of the collective community, Mitchell said.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">The more cities that use the platform, the more beneficial it will be because once a scenario is created, others can use it or tweak it to fit their specific needs.<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.c4isrnet.com\/cyber\/2021\/03\/31\/army-developing-tool-for-us-cities-to-practice-cyberattack-response\/?utm_source=Sailthru&amp;utm_medium=email&amp;utm_campaign=C4ISRNET%204.1&amp;utm_content=Final&amp;utm_term=Editorial%20-%20Daily%20Brief\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El Army Cyber Institute est\u00e1 construyendo una plataforma port\u00e1til y adaptable para que las ciudades practiquen la respuesta a los ciberataques dirigidos a la infraestructura&hellip; <\/p>\n","protected":false},"author":1,"featured_media":7533,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7532"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7532"}],"version-history":[{"count":2,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7532\/revisions"}],"predecessor-version":[{"id":7541,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7532\/revisions\/7541"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/7533"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}