US Navy Will Use Data Analytics For Maritime Security

The US Navy has been drowning in data it cannot organise and make sense of. Now, it  is beginning to use automation and data analytics to improve cyber defenses for its unclassified networks and work on improving Naval cyber operators’ work.

Data collected will be used to create structured data sets to support the organisation’s move towards more predictive maintenance planning in the future.

“Instead of an operator having to read through millions and millions of pieces of data to try to identify commonalities and what's going on on one part of the network, and what's going on across another part of the network that might be significantly spread across the world, the analytic is able to point to us and say, ‘This is where you should be concerned,’” said Vice Adm. Craig Clapperton, the head of US Fleet Cyber Command and 10th Fleet said during WEST 2024, an annual Navy IT conference.

These tools, which use a combination of data analysis and automation, can search out suspicious activity and group incidents together. But the helpfulness stops at attribution, which is where the human operators come in. 

“Sometimes the machines aren't as great at dissecting and getting down to the attribution of it and how you should solve the problem,” he said. “So this is where the AI and machine learning and the human [operator] have to come together to maximise the benefit from that.”

Over the past year, US Fleet Cyber Command has expanded its use of these tools that detect when devices are logged onto the network  and those needed for identity verification to all of the Navy’s unclassified networks Clapperton said.

“That includes our overseas platforms, [education] platforms. And…we're in the process of, no kidding, eliminating what we call accepted networks, which have been networks that have been able to operate outside our visibility of those endpoints and that identity, which then poses the greatest risk to adversarial access,” he said.

The US Navy also wants to use the same data analytics capabilities that can help decipher malicious network activity on land to secure platforms at sea.

 USNI     |    Defense One   |   CSO   |    Twitter     |    LinkedIn     |      DTIC    |   Robots & Automation Magazine

Image: Pixabay

You Might Also Read: 

Maritime Cyber Attacks Are A Deadly Threat:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« A Goal Without A Plan Is Just A Wish
Nation State Hackers Deploy AI »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CloudInsure

CloudInsure

CloudInsure is a Cloud Insurance platform designed to specifically address emerging liabilities within the Cloud environment.

Digital Detective

Digital Detective

Digital Detective offer a range of products and services for digital forensic analysis and advanced data recovery.

FFRI Security

FFRI Security

FFRI is committed to research and development of preventing the most advanced cyber-attacks and breaches.

National Cyber Security Center (NCSC) - Hungary

National Cyber Security Center (NCSC) - Hungary

The National Cyber Security Center was established in 2015 by uniting the GovCERT-Hungary, National Electronic Information Security Authority (NEISA) and the Cyber Defence Management Authority (CDMA).

KOS-CERT

KOS-CERT

KOS-CERT is the national Computer Incident Response Team for Kosovo.

CryptoCurrency Certification Consortium (C4)

CryptoCurrency Certification Consortium (C4)

The CryptoCurrency Certification Consortium is a non-profit organization that provides certifications to professionals who perform cryptocurrency-related services.

Luxembourg House of Financial Technology (LHoFT)

Luxembourg House of Financial Technology (LHoFT)

Offering start-up incubation, co-working spaces including a soft-landing platform, the LHoFT connects and creates value for the entire Luxembourg FinTech ecosystem.

Alethea

Alethea

Alethea is a technology company helping companies, nonprofits, and democracies protect themselves from harms stemming from disinformation and social media manipulation.

PeoplActive

PeoplActive

PeoplActive is an IT consulting and recruitment services organization with leading capabilities in digital, cloud and security.

Resillion

Resillion

Resillion (formerly Eurofins Digital Testing) is a global leader in quality engineering and cyber security services with operations in Europe, US, UK, India and China.

Lakera

Lakera

Lakera empowers developers and organizations to build GenAI applications without worrying about AI security risks.

Hacker School

Hacker School

Hacker School offers technology motivated training programs that provide Cyber Security Certifications and Courses.

AuthX

AuthX

AuthX provides secure and seamless log-in capabilities through strong authentication and integrations.

CyberKinetics

CyberKinetics

CyberKinetics specializes in cloud-based services and solutions for federal agencies and commercial clients with compliance mandates.

SecureFlag

SecureFlag

SecureFlag is dedicated to enhancing secure coding across all technical profiles within the Software Development Lifecycle.

Complete Cyber

Complete Cyber

Complete Cyber provide professional cybersecurity services and products to help secure your infrastructure, systems and data.