首页    期刊浏览 2025年12月03日 星期三
登录注册

文章基本信息

  • 标题:Why we need to follow the rules
  • 期刊名称:Army Communicator
  • 印刷版ISSN:0362-5745
  • 出版年度:2003
  • 卷号:Spring 2003
  • 出版社:U.S. Army Signal Center

Why we need to follow the rules

The SIPRNET is a fairly fragile system with more than 400,000 users, equally sharing risk. There are very few internal controls and little compartmentalization within the system--once you have access, you're in. Because of the system's fragility, physical-access controls must be kept tight. A poorly secured computer with dial-up secret access in Chicago is just as much of a threat as a misconfigured system in the Middle East.

One aspect of physical security is to know where the system extends and how it's secured. These details are part of the normal SIPRNET connection-approval process. If a unit extends its secret network to another location without permission or interconnects the secret LAN with the Internet because it makes administration easier (this actually happens), the unit puts all networks connected to the SIPRNET at risk. One possible consequence of ignoring the rules is having the unit's SIPRNET connection terminated, regardless of the operational consequences (this also happens from time to time).

Operational security today is paramount. Properly secured, configured and documented networks are an integral part of operational security for network-centric warfare. Otherwise, the network cannot be fully trusted ... and an untrusted network is useless. No networks, no network-centric warfare.

REFERENCES. CJCSI 6211.02A, Defense Information System Network and Connected Systems; DISA, SIPRNET Customer Connection Process Guide; DISA, AUTODIN message 121713Z DEC 95, subject: SIPRNET interim-connection requirements.

More information about the SIPRNET connection process can be found at http://giap.disa.smil.mil.

COPYRIGHT 2003 U.S. Army Signal Center
COPYRIGHT 2003 Gale Group

联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有