Cyberspace security crucial to GWOT Published May 7, 2007 By Airman 1st Class Shane Dunaway 4th Fighter Wing Public Affairs SEYMOUR JOHNSON AIR FORCE BASE, N.C. -- When Airmen deploy downrange, they are given the tools and training to fight the Global War on Terror. Armed with M16s and protected by body armor, they take the fight to the enemy. Recently, Air Force senior leaders expanded their focus to include a new battlefield - a frontier where terrorists can wreak havoc with viruses, worms and Trojan Horses - weapons of mass disruption. In this environment, anti-virus software replaces the M16 and firewalls serve as body armor. That field of battle is called cyberspace. "Defending and fighting in the cyber domain is absolutely critical to maintain operations in ground, sea, air and space," said Michael Wynne, Secretary of the Air Force, in a speech Nov. 2. The ability of joint force commanders to keep pace with information and incorporate it into a campaign plan is crucial, according to the Air Force Mission Statement, further emphasizing the importance of securing free-floating information in cyberspace. Cyberspace includes all digital data which can be transmitted through wired or wireless means, said Tech. Sgt. Jay Sowder, 4th Communications Squadron non-commissioned officer-in-charge of network security. "The battle in cyberspace affects the fight on the ground," Sergeant Sowder said. "Almost everything we do in today's Air Force is communicated through cyberspace." All unclassified material is susceptible to interception by terrorists. This is where the network security team steps in to prevent terrorists from putting two-and-two together from ones and zeroes. Network security is responsible for ensuring the workstations and servers are properly patched. "Software vendors issue patches or fixes for their software and operating systems when a security breach is discovered," Sergeant Sowder said. "When an attacker finds a way to access a network, the software vendor will issue a fix to prevent unwanted access." Once the patches are installed, network security makes sure the proxy and firewall configurations are in place, according to Sergeant Sowder. Firewalls block or accept inbound and outbound network traffic based on specific rules. Proxies allow network users to access the internet, and can be configured to block predetermined Web sites. Other tools network security Airmen use to protect the network from cyberterrorism include vulnerability-assessment sensors, internet security scanners, information encryption and fiber optic cable, which is more resilient than copper wiring in preventing terrorists' attempts to retrieve information, Sergeant Sowder said. Network security Airmen aren't the only ones who must fight the battle against cyberterrorism. "All Airmen across the Air Force can affect this fight," Sergeant Sowder said. Safeguarding passwords and preventing physical access to workstations and servers is the first step in thwarting cyberterrorism, Sergeant Sowder said. Leaving passwords or personal identification numbers unprotected so others can gain access to the network, negatively impact our senior leaders' goal of cyberspace superiority. Another way Airmen can contribute to the fight against cyberterrorism is by reporting suspicious network activity to their work center's client support administrators, who can then push that information up the chain of command. "Network security is only as good as our users," Sergeant Sowder said. The Air Force initiated a cyberspace task force to lead its Airmen to victory on the digital battlefield, according to the Air Force Vision Statement. This will afford us offensive capabilities and deliberate target sets, and will be at the vanguard of protecting the nation from an electronic Pearl Harbor.