The United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent utilizing cyber capabilities in combination with all of their military and intelligence capabilities. While the Department of Defense takes great care to secure the use and operation of the “hardware” of its weapon systems, these security practices have not kept up with the cyber adversary tactics and capabilities. Further, the same level of resource and attention is not spent on the complex network of information technology (IT) systems that are used to support and operate those weapons or critical cyber capabilities embedded within them. This book provides recommendations for a workable framework; details about how the Department could prepare to operate in a cyber-contested environment; and the task force describes the specificaspects of the cloud computing configuration that are relevant to avoid the simple choice of public or private clouds. (Imprint: Nova)
{{comment.content}}