How can you help keep Army networks safe? The cyber threat facing the Army is pervasive and increasingly sophisticated. Cyber attacks constantly threaten Army network, information and personnel. Here are a few major threats and basic things you can do about them:
What is it? The act of manipulating people into providing sensitive information or performing a desired action. Social engineering can lead to loss of confidential information, systems intrusions and identity theft.
What can I do? Be suspicious of unsolicited phone calls, emails or individuals asking about organizational or personal information. When submitting personal information, ensure the website is legitimate and starts with https.
PHISHING AND SPEARPHISHING
What is it? Email-based attacks where the attacker attempts to fool you into taking an action such as clicking a link or opening an attachment by pretending to be a legitimate business or someone you know.
What can I do? Delete emails you think are a phishing attack. Be suspicious of attachments and links, and only open those you were expecting. Limit the information you post about yourself online.
What is it? Websites that appear legitimate by copying the look of other, well-known sites. These fake websites prey on people who are looking for the lowest price possible by searching the web for products they’d like to buy, and then add words such as “cheapest” or “lowest price.” In return, the search engine will present many websites selling the item, to include the fake sites.
What can I do? Be wary of unknown stores offering prices dramatically cheaper than anyone else. Look for missing sales or contact information, or different website and email domain names. Shop at trusted online stores that have an established reputation. Monitor your credit card statements to identify suspicious charges.
THEFT, LOSS, OR NEGLIGENT DISCLOSURE OF INFORMATION
What is it? Loss of control over sensitive and protected data happens when attackers gain unauthorized access to information or when authorized users negligently transfer classified information to a network or computing device with a lower classification.
What can I do? Always encrypt sensitive information. Do not store or process classified information on any system not approved for classified processing. Review classification levels including hidden data – e.g. notes on PowerPoint slides, images, and recoverable traces of deleted data.
What is it? Software used to perform malicious actions on computing devices, including tablets and smartphones. Attackers’ goals can include stealing confidential data, collecting passwords, sending spam emails, or identity theft.
What can I do? Keep your software up-to-date by enabling automatic updates, install trusted anti-virus software from well-known vendors and be alert for anyone attempting to fool or trick you into infecting your own computer.
Army Cyber on U.S. Army website
1st IO Command
780th MI Brigade (Cyber)
Department of Defense
U.S. Cyber Command
Air Forces Cyber
U.S. Fleet Cyber
Marine Corps Forces Cyber
Coast Guard Cyber
U.S. Army Reserve
Army National Guard
U.S. Army Cyber Center of Excellence
Developing tomorrow’s cyberspace strategies today.
Army Cyber School
Army Cyber Institute
National Defense University College of Information and Cyberspace
Air Force Institute of Technology
Defense Cyber Investigations Training Academy
Hacking for Defense
Defense Advanced Research Projects Agency
Defense Digital Service