| 
			 It's difficult not to be aware of the news of cyber breaches and 
			incidents hitting the news of late. Whether it is the recent Officer 
			Personnel Management breach that potentially disclosed sensitive 
			info of millions of federal workers or the NSA website being hacked, 
			cyber is in the news.
  Rarely has there been a time where 
			cyber attacks have been so far reaching, impacting all sectors, be 
			it public or private. Historically, it seemed the cyber headlines 
			were made up breaches and attacks at the commercial brand mega 
			stores. This created a prevalent feeling easy to embrace that if I 
			am not a consumer at these stores, such as Barnes & Noble or Target, 
			I have nothing to be concerned about.
  One could have the 
			false sense of security that surely these Fortune 500 companies will 
			protect my sensitive information or perhaps you were potentially 
			impacted and received a form letter that entitles you to free credit 
			checks, which you disregard and toss aside. Consider the surreal 
			reality of suspected North Korean actors hacking Sony Pictures in 
			retaliation of a movie release they viewed as objectionable. These 
			are just a few cyber security incidents that have hit the news radar 
			and are not inclusive of the many events that have occurred under 
			the radar. This underscores the critical importance of cyber 
			security in our daily operations as these attacks have widespread 
			and far reaching impacts and potential to hit everyone, all sectors. 
			 Most attacks start their root at the micro level as in one 
			compromised system, such as an unsuspecting end user opening a 
			malicious link or a system administrator inappropriately using the 
			root account installing unapproved software with vulnerabilities. 
			Certain attacks can leverage remote code execution and can be 
			implemented on non-secure websites via SQL injection or cross site 
			scripting. There are many exploits within software (i.e. MS Office, 
			Internet Explorer, Adobe Flash etc.) that cyber professionals and 
			system administrators constantly guard against by managing risk and 
			applying patches and hardening systems. 
  However, attackers 
			just need one vulnerability, only one opening to exploit and take 
			advantage of to penetrate a network and impact one of the tenets of 
			security be it confidentiality, integrity, or availability. Impact 
			on any of these can marginally or massively disrupt operations. In 
			some cases, it can be drip phenomenon in which cyber analysts don't 
			detect the attack until months later as these adversaries leverage 
			stealth techniques to disguise their tracks and incrementally 
			perform data theft undetected.
  Hackers may leverage phishing 
			emails, which appear benign but may have underlying malicious 
			software to penetrate network security. Perhaps unsuspecting users 
			will submit their personal info into a fake website compromising 
			their personal and/or professional account information. When a 
			hacker has access to an Army computer network, the hacker may be 
			able to disrupt unit command and control, as well exfiltrate 
			critical information that could impact the unit's mission. As these 
			attacks get more provocative and sophisticated, it is all our 
			responsibility (cyber professionals or systems users) to be more 
			cognizant of proper security.
  The cyber landscape has become 
			the medium in which attackers want to steal or manipulate personal 
			information to violate confidentially and integrity. Our missions 
			all heavily rely on automation and any disruptions can have major 
			consequences impacting vital operations. Their motives may be 
			personal in nature for financial gain as cyber fraud, script kiddies 
			in conquest of attack for sure thrills, or they may be malcontent 
			attackers representing their political agenda as state or non-state 
			actors. Worse yet, their tactics may couple of cyber-attacks and 
			conventional means to threaten our security.
  Regardless of 
			intent, doctrine has changed just as the traditional war front has 
			changed, with an additional dimension. We must protect our interests 
			via air, land, sea, and now cyber. These actors, be it state or 
			non-state, are increasing their threat vectors and we have to be 
			ready at both the individual and the enterprise system level. 
			 The Army has made major inroads with our training to create 
			awareness of cyber threats. This foundation is where it starts. The 
			technical controls have to be implemented at the enterprise level 
			but the common denominator is user access, which tier approach of 
			security relies on. 
  A common refrain in the Army is that we 
			all serve as property book officers because property is everyone's 
			business to ensure protection of equipment and to be good stewards 
			of tax payers' money. Another adage should be added to our 
			collective consciousness, “We are all cyber warriors playing a 
			critical role in protecting vital information and network security.” 
			 Here are some important rules to follow to practice cyber 
			security: 
			
				- Utilizing the proper classification level for 
			correspondence to protect personally identifiable information and 
			sensitive information, ensuring there are no cross domain 
			violations, and exercise good operations security for all 
			communications to include social media engagement (Facebook, Google 
			+, Twitter, LinkedIn, Foursquare etc).
 
				- 
				
Don't post sensitive 
			work information or photographs (some include geo-locations) on the 
			internet; always assume a threat adversary is reading your material. 
			Additionally, be cognizant and careful who you allow into your 
			social network. 
				 
				- 
				
Always securing one's common access card 
			and adhering to good ‘cyber hygiene' as to not fall prey to phishing 
			scams or click on suspicious links that may activate malicious 
			injects or lead to unintended sharing of personal info on fake 
			websites. 
				 
				- 
				
Be cognizant of social engineering tactics that 
			try to take advantage of one of the weakest links, human behavior. 
			Manage our network boundary by never connecting unauthorized 
			devices. 
				 
				- 
				
Manage password complexity on systems you engage 
			with that don't require a public key infrastructure certificate. 
			It's about managing the cross section of human behavior and 
			technical controls to minimize and manage cyber risk via policies 
			and technical guides.  
				 
				- 
				
Be wary of open wireless networks 
			where hackers can prey on open networks with packet analysis to 
			capture sensitive information such as passwords and banking 
			information. Therefore always connect via VPN if available to 
			protect your information or minimize use of open wireless networks. 
				 
			 
			We all play vital roles as links in the proper defense of our 
			networks and more appropriately cyber warriors. Let us all be security 
			conscious throughout the year and enhance our security posture 
			across the spectrum of our operations.  
			By Asheesh Nikore, 335th Signal Command, U.S. Army 
					Provided 
					through DVIDS Copyright 2016 
			About the author: Mr. Asheesh Nikore works as a Cyber 
			Security Professional (Information Assurance Manager) at the 335th 
			Signal Command (Theater) in East Point, Georgia in support of risk 
			management and maintaining secure operations. As a citizen soldier, 
			Capt. Asheesh Nikore is a 15 year veteran of the U.S. Army Reserve 
			as a Signal officer and currently a Cyber Defense Detachment 
			Commander within the DISA Army Reserve Element leading Defensive 
			Cyber Operations. With a BS of Engineering at Georgia Tech, he holds 
			his CISSP, CEH, ITILv4, Security and Network Plus certifications. 
					
					Comment on this article  |