The Cyber Defense Exercise Hosted By The National Security Agency

1652 Words7 Pages
Knowledge of the techniques of the information security discipline, including encryption, access control, physical security, training, threat analysis, and authentication. As an Information Technology major at the United States Naval Academy (USNA), I was selected to participate on USNA’s team for the 2010 Cyber Defense Exercise hosted by the National Security Agency. Our team, which won the competition, had to design, operate, and defend our virtual network. As File Systems Manager, I was directly responsible for the encryption, user authentication, and intrusion analysis of our web server, exchange services, and databases. Transitioning out of the classroom and into the U.S. Navy, I am assigned as the Anti-Submarine Warfare (ASW)…show more content…
From my course instruction and indoctrination at the Academy to operating in the Sea of Japan, my exposure to the core tenets of the information security discipline has gone from unpacking what is taught in the classroom to applying it on the U.S Navy’s most capable warship. Knowledge of the human factors in information security, including human computer interaction, design, training, sabotage, human error prevention and identification, personal use policies, and monitoring. At the operator level, my work group of 16 Sailors requires the use of sophisticated information systems to perform daily tasks and execute our mission. From submitting classified SONAR contact reports via our network to interacting with the server cluster responsible for launching torpedoes, my team’s respect for, and proper use of, the systems they are utilizing is my responsibility. Whether it be reporting email phishing attempts or ensuring USB drives and other unauthorized equipment are not introduced into the network, my team plays an important role in ensuring our ship’s networks remain secure and free from intrusion. Additionally, the proper maintenance of our information systems and attention to detail with regards to operator input into the weapons’ programs is vital to the effective employment of our capabilities. During my time on the ship, although my team was not directly involved, we have had
Open Document