Abstract

This paper will examine why its become important for organizations to develop an comprehensive Information Technology (IT) Modernization strategy that focuses on improving their business process and protecting their network infrastructure by leveraging modern-day cybersecurity tools. Most of the topic will focus on the U.S. Department of Defense’s (DOD) strategy towards improving their network security defenses for the department and the steps they’ve taken at the agency level where components under DOD such as DISA (The Defense Information Systems Agency) are working towards adding tools that provides additional capabilities in the cyber space. This approach will be analyzed to determine if DOD goals address any of their vulnerabilities towards protecting their networks. One of the agencies under the DOD umbrella called DISA (The Defense Information Systems Agency) provides DOD a template on how to build a network that relies upon layers of security to help it combat cyber attacks against its network. Whether that provides an effective solution to DOD remains a question due to the many components that operate under its direction. Managing these networks is the principle responsibilities for the Department of Defense. Nevertheless, it does demonstrates that there are tools available to help DOD build an strong enterprise cyber network of situational awareness that strengthens the ability to protect their network infrastructure.

Highlights

  • It’s generally acceptable that the strategic objective of any Information Technology (IT) modernization plan constructed by the U.S Department of Defense (DOD) should allow itself to take advantage of the benefits that enhances it’s ability to innovate

  • DISA’s solution may International Journal of Managing Information Technology (IJMIT) Vol.12, No.3, August 2020 offer a framework for other organizations outside of DOD that takes advantages of innovative cloud solutions tools to protect their network infrastructure from cyber attacks

  • If DOD is committed towards building a modernized cyber defense system, it must consider the risks associated with such a strategy

Read more

Summary

INTRODUCTION

This research will focus on some of the challenges organizations will need to address if they are to mitigate to be efficient in managing their business process Those challenges include analyzing what areas need automation, the relationship between the client, business user and IT department, the different roles in IT that are needed to build a successful system and developing an end to end process that keeps the system updated from cyber attacks. All these principal challenges will be reduce or minimize from the standpoint of addressing inefficiencies of the interfaces between enterprise application systems

TECHNOLOGY AND INFORMATION AWARENESS
DOD’S DIGITAL ENTERPRISE STRATEGY
DEVELOPING A STRATEGY FOR CYBERSECURITY IN THE CLOUD
THE EFFECT OF AUTOMATION ON THE WORKFORCE
THE GENERATIONAL SHIFT FOR IT PROFESSIONALS
ANALYSIS
Findings
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.