Combating a silent attacker: Using information assurance to protect federal agencies // by Stan Tyliszczak

— and skilled professionals — are needed to defeat attackers’ intent on intruding to steal information or to disable the network itself. Systems analysts can monitor networks 24/7, watching for unusual patterns. In the case of a security breach, devices containing secure information can be completely locked down or, in some cases, open a trail leading to the cyber attacker.

Often, an agency believes that the best protection is to put all of their valuable information in a “walled” environment. The challenge, then, is allowing access to that information. As a solution, many Federal agencies build virtual fortresses that house packages of sensitive data. Depending on the situation, select groups have access to the data package, and once the task that requires the information is complete, access is restricted again. With emerging technologies, this process can be automated so that information protection and information access can exist harmoniously together.

Enabling security and access
No matter the level of sensitivity, completely restricting data access can do more harm than good. Intelligence must frequently be shared to maximize its value. For example, state law enforcement agencies need access to criminal information held by the FBI. To enable access and security, many agencies have adopted a man-in-the-loop approach, assigning a designated approval authority (DAA). The DAA evaluates the value of the information versus the risk of sharing the information. The DAA can help prevent an information tug-of-war — allowing parties from multiple agencies to access information, while keeping the sensitive information out of the wrong hands.

While collaborative information sharing tools continually advance that offer more and better security measures, the number of highly skilled people to perform analytics, and act as a DAA, remains stagnant. To meet the increasing need for information assurance professionals, the Department of Defense has initiated the Information Assurance Workforce Training Program, which specifies six levels of skills applicable to every agency employee, ranging from the person answering the phone all the way up to the DAA.

Other federal departments and agencies are deploying similar programs. This is a step in the right direction. To defeat the next generation of cyber threats, agencies will need to not only deploy the latest cyber security tools, but also cultivate and maintain an information security-savvy workforce through concerted, longstanding training initiatives. In doing so, Federal agencies can harness information assurance to its fullest potential — restricting access to sensitive data, ensuring information integrity, protecting the network and enabling collaboration.

Stan Tyliszczak is senior director of Technology Integration, Chief Technology Office, General Dynamics Information Technology