Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
West Point cadets train for cyber frontlines
Thursday - 3/17/2011, 2:54pm EDT
Federal News Radio
Cadets at West Point are teaming up with Raytheon to test software that enables them to identify insider security threats at home and abroad.
Steve Hawkins, Raytheon's vice president of information security solutions, told the DorobekINSIDER Thursday that West Point's electrical engineering and computer science departments are working with the company to determine how cadets will handle insider threats in a forward operating base.
"We created some software that we sell fairly widely across the government and Fortune 500 customers that work on the desktop to do auditing to make sure that individuals are adhering to organization's policies," Hawkins said. "It also examines different activities that could represent and insider threat, either unintentionally or maliciously, being able to detect them around a group of policies."
The study consists of red teams, which attack the network, and lets cadets react and assess situations for practical use on the front lines. "Not only are they seeing how they might set these policies as a result of this activity, but if you think about it, this also has the capability, as they do this in exercise, [to be] a training environment for what you might see and how people react given the stress of a command environment," Hawkins said.
Hawkins added the study is emulating as best as it can an environment similar to the front lines.
"When you get to a forward operating base and the cadence they have to operate under and the intensity of the very, very fast decisions to perform their mission, it creates a different dynamic," Hawkins said. "Insider threats can be an inadvertent activity that allows a threat into your system. An example would be accepting a socially engineered e-mail with an attachment that has mal-ware in it."
The software also includes a DVR-like feature which detects violations and tracks them. This lets cadets determine if the action was an accident or malicious in order to take the appropriate action.
The cadets are halfway through their training and are planning to be done in July.
John Buckner is an intern with Federal News Radio.
(Copyright 2011 by FederalNewsRadio.com. All Rights Reserved.)
This story is part of Federal News Radio's daily Cybersecurity Update brought to you by Tripwire. For more cybersecurity news, click here.