The Cyberspace Advantage: Inviting Them In!

By Deborah Schuh

Systems that are highly resilient to the cyber threat must employ techniques and technologies that adversaries are unable to anticipate, navigate through, or successfully attack. Cyber deception can create an asymmetric advantage.

Download Resources

Building Department of Defense systems that are highly resilient to the cyber threat means employing techniques and technologies that adversaries are unable to anticipate, navigate through, or successfully attack. Options are to embed systems with special-purpose hardware, operating systems, and software, and to employ resiliency techniques listed in NIST 800-160, Volume 2, such as non-persistence and diversity. These mechanisms limit the adversary’s ability to establish a foothold in critical DoD assets.

An often-overlooked approach to cybersecurity that can yield both short- and long-term benefits, is cyber deception. Incorporating deception into cyber defenses can be used to detect malicious actions, manage adversaries once they are inside and collect intelligence about their tactics and techniques. Strategically employing cyber deception, and sharing the cyber intelligence derived from deception, can better inform defense and resilience.