Security Technologies and Methodology in the United Essay

Total Length: 1262 words ( 4 double-spaced pages)

Total Sources: 3

Page 1 of 4

Security Technologies and Methodology in the United States Air Force

The objective of this study is to evaluate the effectiveness of security technologies and methodology in the U.S. Air Force. This work will first determine uncertainties and calculate the risk for each threat. This work will additionally identify any needed controls including technical, administrative and managerial controls. Finally, this work will describe the network security methodology and technology used in the Air Force and the access control technology utilized by the Air Force.

Cyberspace is reported as "pervasive in military operations across all domains" and reported as well is that it is "vital to how the United States conducts those operations." (Wimmer, 2012) Cyberspace was identified by Secretary of the Air Force, Michael Wynne and Air Force Chief of Staff, general T. Michael Moseley to be "a domain equal with Land, Sea, Air and Space." ( )

The Risk

It is reported that in May 2007, "Secretary Wynne issued another Letter to Airmen in which he stated 'our adversaries are attempting to access American servers that contain sensitive data. In response to these threats, Airmen are actively 'flying and fighting' in cyberspace. Our cyber Airmen's work is a prerequisite to all military operations: ensuring freedom of action across the electromagnetic spectrum, which in turn contributes to freedom from attack and freedom to attack in all other domains: land, sea, air and space As the advantages gained through cyberspace were increasing, so were the threats from adversaries." (Wimmer, 2012) Cyberspace training that is received by all enlisted members includes: (1) Cyberspace and the Air Force training at Basic Military Training (BMT); and (2) Advanced Distributed Learning System (ADLS) annual training. (Wimmer, 2012)

II. The Solution

According to Wimmer's report, "CyTCoE was charted to be "a unifying and synergistic body for promoting cyberspace education, training, research, and technology development. The AF CyTCoE developed material for inclusion in the Airman's study guide, which included a review exercise to assist Airmen as they prepare for the end-of-course exam." (Wimmer, 2012) Also developed was a four-hour block of classroom training that would be administered by Military Training Instructors including "a flash media presentation and a Plan of Instruction to guide instructors during the presentation of the material.

Stuck Writing Your "Security Technologies and Methodology in the United" Essay?

" (Wimmer, 2012) Also developed were questions to be included in at the end of course in a written test that is given during week seven of training and that is focused on analysis of the trainee's "comprehension of the academic material presented during BMT." (Wimmer, 2012)

The first BMT trainees graduated in October 2010. Once the BMT is completed, the trainee's must complete annual ancillary training, which is "universal training, guidance or instruction regardless of Air Force Specialty Code (AFSC) that contributes to mission accomplishment." (Wimmer, 2012) All members of the Air Force military, civilian employee's even nonappropriated fund, and contractor personnel must complete Information Assurance Awareness modules of training. This training is described as 'general awareness-level training'." (Wimmer, 2012)

Information Protection training is reported as such that is designed with the purpose of ensuring security and protection of DoD information and Information Assurance Awareness is such that makes sure that personnel are up-to-date on the latest computer security threat risks and the protective measures against those threats." (Wimmer, 2012) This training is received by Airmen who complete two modules of training using the Advanced Distributed Learning (ADL) methods. The ADLS provides ADL content and tracks the progress of students.

IV. Core Curriculum

The core curriculum is reported as a "mandatory set of courses all cadets must complete regardless of their academic major. Additionally, cyberspace training is included in various military training events such as the Basic Cadet Training. Finally, USAFA offers upper-class cadets the opportunity to spend one of their summer sessions in Cyber 256, Basic….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Security Technologies And Methodology In The United" (2012, November 04) Retrieved May 6, 2025, from
https://www.aceyourpaper.com/essays/security-technologies-methodology-united-82874

Latest MLA Format (8th edition)

Copy Reference
"Security Technologies And Methodology In The United" 04 November 2012. Web.6 May. 2025. <
https://www.aceyourpaper.com/essays/security-technologies-methodology-united-82874>

Latest Chicago Format (16th edition)

Copy Reference
"Security Technologies And Methodology In The United", 04 November 2012, Accessed.6 May. 2025,
https://www.aceyourpaper.com/essays/security-technologies-methodology-united-82874