The Cyberspace Advantage: Inviting Them In!

January 2020
Topics: Cybersecurity, Threat-informed Defense, Cyber Threat Intelligence, Cyber Resilience, Defense Systems, Defense Industry, Network Security, Policy
Deborah L. Schuh, The MITRE Corporation
Download PDF (932.43 KB)

Building Department of Defense systems that are highly resilient to the cyber threat means employing techniques and technologies that adversaries are unable to anticipate, navigate through, or successfully attack. Options are to embed systems with special-purpose hardware, operating systems, and software, and to employ resiliency techniques listed in NIST 800-160, Volume 2, such as non-persistence and diversity. These mechanisms limit the adversary’s ability to establish a foothold in critical DoD assets.

An often-overlooked approach to cybersecurity that can yield both short- and long-term benefits, is cyber deception. Incorporating deception into cyber defenses can be used to detect malicious actions, manage adversaries once they are inside and collect intelligence about their tactics and techniques. Strategically employing cyber deception, and sharing the cyber intelligence derived from deception, can better inform defense and resilience.


Publication Search