MilitarySpot.com

Serving the U.S. Army, Navy, Air Force, Marines, Coast Guard and National Guard

Follow MilitarySpot:
 
  • Home
  • Enlist
    • Join The Army
    • Join The Navy
    • Join The Air Force
    • Join The Marines
    • Join The Coast Guard
    • Join The National Guard
    • ASVAB
    • Army Physical Fitness Test
    • Military Draft
    • Prior Service Army Enlistment
  • Career
    • Join the Military
    • Jobs for Military and Civilians
    • Career Center
    • Prior Service Army Enlistment
    • Criminal Justice
  • Education
    • Online Schools
    • Spouse Education Benefits
    • GI Bill
    • Military Schools
    • Criminal Justice
  • Benefits
    • Army Benefits
    • Navy Benefits
    • Air Force Benefits
    • Marine Corps Benefits
    • National Guard Benefits
    • Coast Guard Benefits
    • Veteran Benefits
    • Basic Pay Rates
    • Allowances
    • Special & Incentive Pay
    • Military Spouse Education Benefits
    • VA Education Benefits
    • GI Bill
  • News
    • Headline News
  • Finance
    • Debt Relief
    • Military Pay Rates
    • Military Personal Loans
    • VA Loans
    • Military Star Card
    • Military MyPay
  • Spouses
    • School Finder
    • Scholarships & Grants
    • PCS, DITY, & Moving
    • Pay Rates
    • MyCAA
    • Education Benefits
  • Community
    • Military Games
    • Military Reunions
    • Classifieds
    • Photo Gallery
    • Buddy Finder
    • MilitarySpot Pinups
    • Military Bases
  • Resources
    • Military Alphabet
    • Military Reunions
    • Military Acronyms
    • Currency Converter
    • Military Tools
    • Ranks
    • Military Time
    • Military Tactics
    • Military Discounts
    • Military Games
    • Military Videos
    • Photo Gallery
    • Infographics
    • How To
  • Travel

Cyber Security – The Digital Front

Cyber Security

January 31, 2017, by David McCauley – The internet is a vast and interconnected world. Cables and computers cross physical boundaries to share information at an increasingly hectic pace. We do business, connect, and share online. The governments of the world rely upon it, and militaries are no exception. Unfortunately, the internet also functions as a secret passageway into even the most secure facilities in the world. Cyber attacks are a serious threat to American citizens, federal and state governments, and infrastructure services. Cyber Security has never been more important.

According to a White House audit, the U.S. Government alone received more than 77,000 cyber attacks in the 2015 fiscal year. This is frightening to imagine because we don’t often hear about these cyber attacks in the news like we do when a corporation is hacked. When a corporation is hacked, it’s regular people who often pay the price. When service members or government organizations are targeted, classified and unclassified information can be leaked – constituting a security breach.

The average American citizen spends more than ten hours per day consuming digital media. More people using the internet means more opportunities for cyber criminals to strike. Seemingly everyone uses the internet in some way – social media, banking online, or even shopping on their phone. Those digital footprints can leave accounts and systems vulnerable to attack. The same holds true for service members, and they must carefully manage their digital footprints.

Millions of U.S. citizens had their information exposed in major data breaches during 2016. Some of the organizations affected include Yahoo, Anthem, Myspace, and the Office of Child Support Enforcement. Many organizations are building up their digital security efforts as a result. Losing sensitive information of this nature is bad for business, and unacceptable for government entities. The U.S. military employs cybersecurity specialists and countermeasures to protect their assets and secured systems.

Many businesses have access to personally identifiable information like names, addresses, phone numbers, credit card info, and sometimes even social security numbers. The theft of this kind of information can be devastating for consumers. Imagine how devastating it could be for national security if sensitive information from the government or military were to become somehow compromised. This is why classified information is so carefully safeguarded and often accessed only via the intranet, typically a service or military specific network that is separated from the traditional internet.

Nearly everything is connected to the internet in some capacity, including the infrastructure of the United States. Communications services, power grids, and many other public systems have gone digital. Certain types of cyber attacks, like those upon the infrastructure, become a matter of homeland security. One challenge that investigators and cyber security experts face is locating and collecting evidence left behind on the internet or in affected systems.

Just like traditional forensics would help solve a crime, digital forensics steps in to gather evidence of these breaches and crimes committed. Digital forensics is the practice that allows investigators to locate and protect evidence of wrongdoing. In domestic matters, it’s not uncommon for the FBI cybersecurity specialists to step in when hacker groups target government and state entities and services.

For regular people who don’t have legions of cyber specialists to protect their information, staying secure can be challenging. The truth is that there are steps you can take to protect your tech and reduce the likelihood of suffering from a malicious cyber attack. Some types of threats are targeted toward a specific individual or entity, but others are more general. It’s not uncommon for individuals to receive an email containing viruses or malware. If the virus were unleashed on your home computer, the damage is fairly localized and might only affect your household. Say that email had been opened instead while at work, it could affect clients as well.

Keeping your work accounts and home accounts separate is important. In fact, many companies specifically prohibit their employees from accessing personal emails or social media from work computers at least partially to prevent this type of incident. The U.S. military often disallows the use of mobile devices in secured locations in part because mobile devices have their own vulnerabilities.

The best deterrent for cyber crime is the safe practice of data handling standards, including the disposal and storage of that information. It is important to follow procedures to operating those systems to ensure that no loopholes or weaknesses can be exploited in the first place.

About the Author: D.M. McCauley is a former U.S. Navy sailor who worked in Intel. After the service, he has dedicated his time to writing and traveling with his significant other.

Comments

Filed Under: Community

  • News
  • Enlist
  • Education
  • Career
  • Finance

USS George Washington Returns to Yokosuka

DECEMBER 12. 2025 – Nimitz-class aircraft carrier USS George Washington (CVN 73), the flagship of Carrier Strike Group (CSG) 5, returned to Commander, Fleet Activities Yokosuka, Japan, on Dec. 11 after completing operations in the U.S. 7th Fleet area of operations. George Washington departed Yokosuka on June 10 to conduct routine operations with embarked Carrier […]

Air National Guard Unveils New Bonus Program

MARCH 11, 2023 – On March 1st, the Air National Guard (ANG) launched a new bonus program to attract and retain personnel in critical specialties. The initiative offers significant financial rewards, with bonuses of up to $90,000 for eligible members, depending on their Air Force Specialty Codes (AFSCs). This strategic move aims to strengthen the […]

Military Students’ Tips to Balance Service and Studies

OCTOBER 10, 2025 – Studying in college while serving in the military can be highly rewarding but also extremely demanding in some respects. Military members, veterans, and their families typically balance demanding duty schedules, deployments, family responsibilities, and school schedules. It requires careful planning, flexibility, and being willing to seek and take advantage of available […]

Former Soldier Navigates Job Hunt

NOVEMBER 19, 2024 — In early 2017, Michael Quinn endured what he called the worst day in the worst year of his life. Quinn, then a sergeant major and 24-year Army Soldier, had weathered deployments in Iraq, Afghanistan and the Philippines. As an Army counter-intelligence agent, he said he learned to operate under grave circumstances […]

How Military Families Can Avoid Financial Panic During a Shutdown

OCTOBER 23, 2025 – Government shutdowns create unique challenges for military families who live on tight budgets, frequently relocate, and manage the constant demands of military service. While the uncertainty can feel overwhelming, following these five strategies can help you navigate the crisis with confidence. Keep Perspective.  This financial disruption will end, just as the […]

Recent Posts

  • USS George Washington Returns to Yokosuka
  • Saltzman Praises Guardians at Spacepower 2025
  • Unified Front Against Evolving Threats in Africa
  • Guard Keeping Streets Safe, Protecting Federal Property
  • West Virginia Guardsman Laid to Rest
MAINMENU




SITESEARCH
Can't find something? Try using our site search to dig through our entire site.



Still having trouble? Try the Advanced Search to refine your searches.
NEWSLETTERSUBSCRIBE
Sign Up To Receive Information, Updates and Special Officers from MilitarySpot.com.



Don't miss an issue! Jump in the Newsletter Archives to catch up on previous issues.
FOLLOWMILITARY SPOT

Follow us on Facebook, Twitter & StumbleUpon and more. Keep up with MilitarySpot.com news & updates. We also have an RSS Feed.

Advertise | About | Contact | Feedback | Unsubscribe | DMCA | Privacy Policy | Terms of Use
 
Copyright 2004-2025 Sun Key Publishing. All Rights Reserved.



 
This is not the official recruiting website of the U.S. Military. The site you are on is run by Sun Key Publishing, a private company, and is not endorsed by or affiliated with the U.S. Military.