kumoh national institute of technology
Networked Systems Lab.

Military IoT

NSL > Researches> Military IT> Military IoT
The Trends Increasing Military Network Vulnerabilities(SDN, BYOA, VDI)
By :
Date : 2017-04-17
Views : 393

Title : The Trends Increasing Military Network Vulnerabilities
Date : April 11, 2017

SDN, BYOA, VDI. This alphabet soup of technologies and approaches has complicated U.S. Defense Department networks.

Trends such as bring your own device (BYOD), bring your own application (BYOA), software-defined networking (SDN) and virtual desktop infrastructure (VDI) have dramatically increased network vulnerabilities, where failures, slowdowns or breaches can cause great damage. For the military, specifically, such occurrences can be serious and mission altering, exposing incredibly sensitive data.
The network always has been and will be the foundation of defense information technology as we know it. The question is: How do you manage this foundation to address current challenges and those on the horizon? The solution is a combination of network simplicity and sophistication and good old-fashioned best practices. IT encompasses automation, network monitoring, configuration management and BYOA guidelines.

Resource constraints—specifically, a small budget and lack of IT staff—are a constant for any military organization. Automating various processes for network management can help agencies free up resources for allocation to other mission-focused tasks. For example, agencies can automate compliance by using configuration and patching tools that locate and remediate known vulnerabilities with limited human interaction.

This task is vital. Continuous network monitoring provides a complete view of users, devices, network activity and traffic. Log data can be used for real-time event correlation to improve security. The goal is to achieve network stabilization amid growing complexity. Similarly, as the Defense Department moves to hybrid IT environments, monitoring tools provide critical information about which elements of the infrastructure make sense to migrate from both a cost and workflow standpoint. And once applications are migrated, availability must be monitored and performance verified.

Configuration management
This offers another powerful tool. Backing up configurations lets changes be rolled back for fast recovery. Configurations can be monitored, and those that are noncompliant automatically can be remediated. Manual configuration management doesnt scale and is nearly impossible based on the primary constraints of any organization—low budget and small IT staff.

The BYOA dilemma
The Defense Department has struggled with this trend for years. It comes down to security and bandwidth. Off-duty personnel need fewer restrictions to use Internet-enabled devices—OK, we call them game consoles, at least in certain military zones. Of course, bandwidth isnt cheap, and availability is significantly limited in deployed areas.
The department needs guidelines and necessary tools to enforce restrictions. Its not difficult to eliminate rogue devices on the network, and users are more apt to follow guidelines if IT enforces them.

Looking ahead
Historically, the government was five to 10 years behind businesses in implementing new technologies. This no longer rings true. Even in military environments, SDN quickly became a preferred method for greater network situational awareness, a centralized point of control and the ability to introduce new applications and services while lowering costs. While SDN still is in its infancy, it is quickly becoming the new norm for networks. The rapid speed of technology demands a change to the network, and SDN is a primary component of this change.
Interestingly, being at the forefront of technology implementation, federal IT professionals might find that industry does not yet have all the appropriate tools, strategies and processes in place to alleviate potential issues. The solution? Network administrators should educate themselves ahead of the trends so theyre equipped to test, prepare and, balance risk versus reward as it affects mission requirements.
(Total:46 articles / page:1/5 )
No. Subject By Date Views
46  Internet of Things, 5G, and Cybersecurity Dominate CES.. new Rizki Rivai Ginanjar 2019-01-14 0
45  Enhancing Military Logistics and Supply Chains with Io.. Rizki Rivai Ginanjar 2019-01-02 3
44  U.S. Navy to Deploy Venture Research MultiTrak RFID/.. Rizki Rivai Ginanjar 2018-12-17 6
43  AT&Ts Mike Leff: Robust Network for Military IoT.. Rizki Rivai Ginanjar 2018-09-17 46
42  Special Session on Military Applications of IoT (in co.. ȫ 2018-08-13 54
41  The internet of battlefield things will depend on mode.. Rizki Rivai Ginanjar 2018-08-06 541
40  British Army testing autonomous vehicles to supply fro.. ȣ 2018-07-30 55
39  US Army is using IoT tech and data to transform warfare ȫ 2018-07-30 89
38  Military readiness: How emerging technologies can tran.. Rizki Rivai Ginanjar 2018-07-23 47
37  Military documents about MQ-9 Reaper drone leaked on d.. Rizki Rivai Ginanjar 2018-07-17 120