Air Force

April 25, 2014

CCRI reaps ‘excellents’

Tags:
Airman 1st Class PEDRO MOTA
56th Fighter Wing Public Affairs

Senior Airman Shane Armour, 56th Communications Squadron networks operation technician, checks the file-share hard drives April 16 at Luke Air Force Base to ensure the drives were running properly to maintain the wing’s documents and files.

As technology continues to grow, the digital world of zeros and ones has now become a cyber battleground for information.

Luke Air Force Base scored an “Excellent” twice during a Command Cyber Readiness Inspection for cyber security and physical networking security March 17 through 22.

An inspection team from the Defense Information Systems Agency used retina computer scans and compiled data from the 56th Communications Squadron to make sure the entire base’s cyber security systems were compliant with the rules and regulations set by the Defense Department.

“With the advances in the cyber world being exponential, the capabilities of hackers are considered dangerous,” said 2nd Lt. David Lucas, 56th CS battle captain. “We maintain security because of the constant threat from hackers and their attempts to explore every option available to breach.”

Even common products that are used by bases, such as computer software and accessories, have to be tested and patched with updates to fix possible breach holes to maintain security.

“Because of the wing-wide team effort of Luke, we received two excellent scores on the branch networks security systems inspection,” said Senior Master Sgt. Jason Lohr, 56th CS flight operations superintendent. “The nonsecure protocol router branch network inspection scored in the top 10 percent throughout the DOD and the secure protocol router branch network was the second highest throughout the DOD.”

Realizing the cyber threat is real, the 56th CS works with the entire wing to ensure all classified information stays out of hostile hands.

“With the new F-35 mission, our information is about to get more sensitive, so greater security in the networks will be needed,” Lohr said. “Staying cyber safe requires a wing-wide effort.”




All of this week's top headlines to your email every Friday.


 
 

 
Tech. Sgt. Timothy Boyer

Construction plan supports F-35 program

Tech. Sgt. Timothy Boyer An Australian F-35 Lightning II joint strike fighter prepares to launch Aug. 25 at Luke Air Force Base. Luke is scheduled to have 144 F-35s by 2024 with 11 countries training pilots and maintainers here...
 
 
frana_g

The Psychology of Leadership

Lt. Col. Gregory Frana When given the opportunity to lead, how do great leaders ensure people want to follow them? In the military it is sometimes the case that followers simply have to follow, but what makes people “want” ...
 
 

Refuse to fear change

Are you afraid of change? Most people are. Every day we experience change in our lives, and we certainly can’t hide from it. We learn and grow from changes; that’s what makes the world go around. With all of the Air Force and day-to-day life changes, learning to deal with change must be one of...
 

 
3_150818-F-LC301-007

Munition flight’s isolation strengthens unit

Senior Airman Christopher Bolling, 56th Equipment Maintenance Squadron Munitions Flight precision guided missiles bay chief, and Eddie Hutton, 56th EMS Munitions Flight crew member, work on an air-to-air missile. The munitions ...
 
 

IN BRIEF

Stand up for vets The 3rd Annual Stand Up For Veterans event is 8 a.m. to 4 p.m. Sept. 26 at the Glendale Community College Student Union. There will be employment opportunities, social services, legal services, free hair cuts for veterans, free lunch for vets and their families, and more. Vets can apply for healthcare and...
 
 
4_150810-F-LC301-003

Reservist lends hand

Master Sgt. Steven Joubert, 944th Detachment 1, is the first Air Reserve aircrew chief to hold a position within the 309th Aircraft Maintenance Unit since 2007 when the 944th Fighter Wing underwent changes in the base realignme...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>