TOPICS & CATEGORIES
By Dolly Rairigh Glass
It’s a topic frequently seen in today’s news cycle. Many computer users have “been hacked” via their personal email or have dealt with the nuisance of a virus, which can do their own bit of damage. But what if crucial military networks or products were maliciously attacked through a computer code or a virus? Just like home computers, military computers are vulnerable to these attacks.
With the enactment of this Cyber Command and the growing importance of preparing for this new way of war, in November 2011, the Team Orlando Executive Board of Directions directed the Team Orlando Board of Directors to explore the cyber domain for common requirements across the teams and identify gaps in the Team Orlando product portfolio.
“The principle collaboration is identifying the emerging cyber training requirements and general approaches for implementation,” said Bill Hopkinson, Ph.D., JTIEC Deputy Director and Chief Technology Officer and the group’s point of contact. “Currently the groups actively participating are JTIEC, AFAMS, PEO STRI, ADL, STTC and NAWCTSD, however we know that all of Team Orlando feels this is an issue that affects us across the board, so we expect the level of participation to grow.”
U.S. Army Gen. Martin E. Dempsey said the Department of Defense announced in June 2013 that over the next four years, 4,000 cyber operators will join the ranks of U.S. Cyber Command, and $23 billion will be invested in cybersecurity.
With the investment in cybersecurity and the projected concern of cyber warfare in the future, America’s next generation of Warfighters will need solid training in this area. Currently, the majority of all training products used by Warfighters in every service are being developed and produced by way of Team Orlando and the Central Florida MS&T community.
“Because Team Orlando and all its associated members and partners have significant influence on the training products used by America’s Warfighters, we feel that it makes perfect sense to examine what each other’s groups are working on and see how we can collaborate and leverage those efforts,” said Hopkinson.
“It won’t be a one solution fits all and it won’t be overnight, but we are committed to continuing our exploration to identify the gaps in our training products and to collaborate across the Team to develop cyber training solutio
People who read this article also found these articles interesting :
- Published On: February 7, 20235.9 min read
- Published On: September 1, 20222.5 min read
- Published On: August 4, 20224.9 min read
- Published On: July 6, 20223.9 min read
- Published On: June 23, 20229 min read