{"id":9683,"date":"2022-04-06T11:49:44","date_gmt":"2022-04-06T14:49:44","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=9683"},"modified":"2022-04-06T11:49:44","modified_gmt":"2022-04-06T14:49:44","slug":"la-marina-de-los-eeuu-se-equivoco-en-materia-de-ciberseguridad","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=9683","title":{"rendered":"La marina de los EEUU se equivoc\u00f3 en materia de ciberseguridad"},"content":{"rendered":"<p>La marina de los EEUU ha llevado incorrectamente la seguridad cibern\u00e9tica durante a\u00f1os y ahora est\u00e1 trabajando en un nuevo enfoque que se adapte mejor al entorno contempor\u00e1neo, dijo el director de informaci\u00f3n del servicio. El personal militar fue objeto de ciberataques en medio de las conflictivas relaciones chino-estadounidenses y la invasi\u00f3n rusa de Ucrania. Al parecer, el enfoque por listas de control ya no es efectivo ante las nuevas amenazas.<\/p>\n<hr \/>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">NATIONAL HARBOR, Md. \u2014 The U.S. Navy has framed cybersecurity incorrectly for years and is now chipping away at a new approach that better suits the contemporary environment, the service\u2019s chief information officer said Tuesday.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">\u201cI have made the assertion now, publicly, multiple times. You may have heard me say it. But I believe that the way that we view cybersecurity in the Department of Navy is wrong,\u201d Aaron Weis said at the\u00a0<a href=\"https:\/\/www.defensenews.com\/digital-show-dailies\/navy-league\/\" target=\"_blank\" rel=\"noopener\">Sea-Air-Space conference<\/a>. \u201cWe view cybersecurity as a compliance problem, and it is most definitely not a compliance problem.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Instead, Weis explained, cybersecurity should be treated like the broader concept of military readiness. A more holistic lens would emphasize active cyber management \u2014 considering a range of factors \u2014 and could inch away from red tape, audits and boxes that need checking. Essentially, traditional assessments of equipment, logistics, training and personnel, among other things, could find their equal in\u00a0<a href=\"https:\/\/www.c4isrnet.com\/cyber\/2022\/03\/28\/pentagon-seeks-112-billion-for-cyber-in-fy23-budget-request\/\" target=\"_blank\" rel=\"noopener\">the digital domain<\/a>.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">\u201cWe have 15 years of track record that proves that the current approach to cybersecurity, driven by a checklist mentality, is wrong,\u201d Weis said. \u201cIt doesn\u2019t work.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Sailors and other military officials\u00a0<a href=\"https:\/\/www.c4isrnet.com\/cyber\/2022\/03\/02\/us-navy-memo-warns-of-cyber-risks-amid-global-tensions\/\" target=\"_blank\" rel=\"noopener\">were warned in February<\/a>\u00a0they were targets for cyberattacks amid troubled Sino-U.S. relations and Russia\u2019s invasion of Ukraine.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">\u201cCyberattacks against businesses and U.S. infrastructure are increasing in frequency and complexity,\u201d Navy Vice Adm. Jeffrey Trussler said in an unclassified memo at the time. \u201c[Department of Defense] and federal law enforcement report adversary interest in our remote work infrastructure. This means that you are a target \u2014 for your access and your information.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Hackers previously exploited mistakes on Navy and private networks by stealing or brute-forcing credentials as well as surreptitiously installing malware, according to the memo. Defense News in June 2018 reported\u00a0<a href=\"https:\/\/www.defensenews.com\/cyber\/2018\/06\/08\/chinese-hackers-steal-sensitive-navy-program-data\/\" target=\"_blank\" rel=\"noopener\">Chinese-sponsored cyberattacks<\/a>\u00a0breached a Navy contractor\u2019s computers, jeopardizing sensitive data related to secret work on an anti-ship missile.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">\u201cWith heightened tensions throughout the world,\u201d Trussler said in his February missive, \u201censure your team understands how the actions of a single user can impact our global force.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Weis\u00a0<a href=\"https:\/\/events.govexec.com\/accelerating-naval-modernization\/\" target=\"_blank\" rel=\"noopener\">earlier this year<\/a>\u00a0credited Trussler, who is the deputy chief of naval operations for information warfare, Navy Secretary Carlos Del Toro and other leaders for supporting the move away from the compliance mindset.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">\u201cThis is happening,\u201d he said in a dispatch from the earlier WEST 2022 conference. \u201cAnd I think, one, it\u2019s really needed. Two, it will put the Department of Navy, again, as a leader in this area as we\u2019re looking to change and improve how we\u2019re operating and how we\u2019re defending.\u201d<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.c4isrnet.com\/digital-show-dailies\/navy-league\/2022\/04\/05\/us-navy-had-cybersecurity-wrong-expect-change\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La marina de los EEUU ha llevado incorrectamente la seguridad cibern\u00e9tica durante a\u00f1os y ahora est\u00e1 trabajando en un nuevo enfoque que se adapte mejor&hellip; <\/p>\n","protected":false},"author":1,"featured_media":9684,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/9683"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9683"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/9683\/revisions"}],"predecessor-version":[{"id":9685,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/9683\/revisions\/9685"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/9684"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}