computing Archives - A Cyber Fellow
Currently viewing the tag: "computing"

Download (PDF, 3.86MB)

Navy Information Dominance Corps Human Capital Strategy 2012-2017

navy-informatino-dominance-human-capital-strategyIDC Human Capital Mission – Build and sustain an agile Total Force that acquires, exploits, and employs ID capabilities to achieve Navy mission requirements.

IDC Human Capital Vision – Attract, develop, and retain a cohort of highly trained and competent officers, enlisted, and civilian professionals who are fully integrated with the Navy’s combat forces, and delivering warfighting effects (including Cyber Warfare) to Naval and Joint forces across the full spectrum of military operations.

Developing and sustaining a viable and responsive Information Dominance Corps (IDC) requires a commitment to workforce planning and management processes, delivery of a Corps-wide learning continuum, and cultivation of an identifiable, inclusive Information Dominance culture and ethos. This Human Capital Strategy constitutes the first installment on that commitment and provides a structured, balanced and deliberate approach for ensuring the Navy’s IDC is qualified, ready and sustainable. It is framed on four strategic goals, each supported by a set of measurable objectives, which drive their implementation:

  • Manage the Corps as a Total Force
    1. Develop a strategy for the effective utilization of all components of the Total Force, including a specific plan of action for the civilians across the IDC.
    2. Identify which ID human capital advantages are complementary to the overarching operational mission.
    3. Create and strengthen partnerships with centers of innovation and thought leadership within the Federal, Defense, and private sectors.
  • Build Competencies through Training, Education, and Experience
    1. Validate IDC core competency framework and refresh the Community-specific competency models.
    2. Conduct competency-based training needs assessments.
    3. Conduct analyses to prioritize, resource, and sequence training development, modification, and repurposing efforts.
    4. Develop cross-functional ID career paths.
  • Strategically Integrate and Align the IDC Workforce with Mission and Capability Requirements
    1. Define the mission requirement (duties and tasks).
    2. Translate mission requirements into capability requirements.
    3. Develop a resourcing strategy for the fulfillment of capability requirements (manpower).
    1. Orient the total Navy workforce to the IDC mission and vision through a multi-mode, leadershipdelivered strategic communication initiative.
    2. Leverage kill chain concepts (integrated fires) to depict and communicate the process through which ID discipline contributes to the delivery of warfighting effects.

The Information Dominance Corps Human Capital Strategy reflects the essential value we place on people at the leading-edge of the Navy’s Information Dominance capability. It likewise reinforces the IDC’s commitment to creating an environment that capitalizes on talent, further develops expertise, advances professional careers, and promotes the fullest contribution to the ID mission. The Human Capital Strategy provides direction to the workforce and to the supporting Manpower, Personnel, Training & Education domain that ultimately drives the IDC as a profession. This strategy sets the IDC on a path towards success as information becomes a principal warfighting pillar in the Navy’s arsenal. The IDC’s success depends on agility, flexibility, and adaptability to deliver the right people with the right skills, at the right time and place, and at the best value. We are committed to leveraging the best

This IDC Human Capital Strategy supports the Navy Strategy for Achieving Information Dominance, additional related supporting documents include: the Navy Information Dominance Roadmap, 2013-2028; Navy Cyber Power 2020; the Naval Intelligence Strategy, 2013-2020; and, the 2013 Navy Space Strategy. Within this integrated framework, the Navy begins in earnest the process of marshaling its resources, galvanizing the workforce, and aligning Navy’s Information Dominance capabilities to fully enable the Navy’s primary tenet of Warfighting First.

[via TENTH FLEET]

 

fireeye-threat-report-2012

FireEye, Inc. has released its Advanced Threat Report for the First Half of 2012 and the findings aren’t in your favor.  Unfortunately the trend of the attacker getting stronger – defenses getting weaker has continued.  The main report consists of 5 overall findings which are quite alarming:

  • Finding 1: Explosion in Advanced Malware Bypassing Traditional Signature-Based Defenses.  What this means to you is that the Anti-virus, Anti-Malware, Intrusion Detection, and Intrusion Prevention capabilities on your devices are becoming less effective compared to the progress which attackers are making in getting around them.
  • Finding 2: Patterns of Attacks Vary Substantially by Industry—Attacks on Healthcare up 100%, 60% in Energy/Utilities.  The attackers are shifting toward different industries differently.  Often we as humans like to think of everything being uniform.  If I got attacked and you got attacked… then we got attacked the same way… or at least we’d like to think so.  This is often no longer the case.  Attackers in Cyberspace are quite adept at profiling you and customizing an attack to fit your individual vulnerabilities.  The importance of Internet security to secure our data and information continues to increase as more and more of ever industry becomes more dependent upon the Internet.
  • Finding 3: The Intensified Dangers of Email-Based Attacks, Both Via Links and Attachments.  Checking your email is now more dangerous than ever!  If it wasn’t bad enough that most of us sit sedentary for way to long checking the stuff.  There is a noted role reversal with malicious Links within emails now becoming more common then malicious attachments.  Yet both vectors still represent significant vulnerabilities to our network security, data, and systems.  This challenge also has a very wide spread business sector creating part of the problem.  More and more businesses are opening Affiliate programs.  These programs pay individuals a small share of any sale made.  Enter the malicious and devious attacker and you have a very easy manner in which to achieve monetary gain.
  • Finding 4: Increased Prevalence of Limited-Use Domains in Spear Phishing Attacks. We are seeing custom built, single use, email accounts being used to Spear Phish individuals.  Have you left that Facebook Friends list open to the public?  Did someone just email you that hasn’t in years (the name will be in the exact format from their Facebook account).  Usually this can easily be spotted by examining the email address of the sender to expose an actual email address that has been created just to attack you.  For example the email address will look like “John Smith” but the email might be from a0023836@somedomain.com.  You know that “Jon Smith” doesn’t have an email like that… and of course there will be some form of payload in the email like Finding 3 notes – probably a Link or even an attachment.
  • Finding 5: Increased Dynamism of Email Attachments.  Simply put the ability of protective systems to examine all forms of email attachments continues to be more important.  Simply looking at EXE, DOC, DOCX, PDF, etc. is no longer enough.  Every file requires inspection and potential action.

About FireEye, Inc.

FireEye is the leader in stopping advanced targeted attacks that use advanced malware, zero-day
exploits, and APT tactics. The FireEye solutions supplement traditional and next-generation firewalls,
IPS, anti-virus, and gateways, which cannot stop advanced threats, leaving security holes in networks.
FireEye offers the industry’s only solution that detects and blocks attacks across both Web and email
threat vectors as well as latent malware resident on file shares. It addresses all stages of an attack
lifecycle with a signature-less engine utilizing stateful attack analysis to detect zero-day threats. Based
in Milpitas, California, FireEye is backed by premier financial partners including Sequoia Capital, Norwest
Venture Partners, and Juniper Networks.

[via FireEye]

So Google Glasses (coded Project Glass) has received all the rave reviews lately.  And I’m sure they’ll be awesome when they are available late this year.  But what if you’re in a slightly disconnected environment and unable to utilize the Google cloud?

I tried on a Golden-i headset at CES in January 2012 (picture).  If developed further I believe they could have decent application in a Maritime environment.  Billed as the world’s first hands-free mobile, head-worn computing experience they have the ability to enable and use the cloud when available but could also be adapted to use a Cloudlet (think mini cloud on a ship).  These have the possibility to significantly improve safety, productivity, and efficiency of an individual solely on freeing up their hands.

The software side runs Windows Embedded CE 6.0 and communicates via Bluetooth (v2.1 EDR) and WIFI (b/g) pathways (obviously we’d want to either augment this with storage memory for full disconnected ops).

I’d be concerned though after the news about Project Glass if I were Golden-i.  Google’s targeted your market share and have fun opposing the giant but if you’ve got Microsoft backing you as a Windows platform provider you might be able to make it interesting.  I’d strive to lower the $2500 price point and continue to iterate your design.  A morph between the current Golden-i headset and the looks of Google’s Glasses could pose an interesting competitive product.

[via Golden-i]