1 / 17

South Carolina Cyber

South Carolina Cyber. Nature of Cyberspace.

alexia
Download Presentation

South Carolina Cyber

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. South Carolina Cyber

  2. Nature of Cyberspace • Cyberspace: (DoD) “A global domain within the information environment consisting of the interdependent network of information technology infrastructures and resident data, including the internet, telecommunications networks, computer systems, and embedded processors and controllers.” Source: Joint Pub 3-12 • However… • Manmade domain/ever changing/privately owned • Virtual • Programming code and protocols define rules of the domain • Environment/TTPs evolve at net speed OF INTERNET TRAFFIC PER DAY (2011); GROWING 60%PER YEAR EMAILS PER DAY HOURS OF VOIP PER DAY 675 265 13 MILLION BILLION PETABYTES Success in this domain means being smarter, more creative, faster,and stealthier than our opponent.

  3. Environment: Exponential Rate of Change UNCLASSIFIED 6.4 Billion 2012 1 Billion Users, 2012 Library of Congress = 10 Terabytes 34% 2010 At best transmission line speed: 1998 = 16.5 days 2013 = .00008 seconds 634 Million 5.3 Billion 5 Billion 2008 28% 255 Million 4 Billion Facebook Launch, 2004 2.3 Billion 2000 20% 740 Million 187 Million Worldwide cell subscribers 5% 758 Million 15.6 Million World population on the Internet 10 Billion Mobile Devices Projected by 2016 (1.4 per person on the planet) 42 Million Number of websites Transistors per microchip UNCLASSIFIED

  4. THREAT ACTORS THREAT ACTORS THREAT VECTORS FOREIGN INTELLIGENCE Supply Chain Vulnerability Negligent Users HACKTIVISTS Wireless Access Points CRIMINAL ELEMENTS Removable media TERRORIST ACTS Insider Threats

  5. A Disturbing TrendThe Threat is Evolving Exploitation Disruption Destruction

  6. 5 Key Challenges in Cyber • USCYBERCOM Mission • Defend the Nation • CCMD Support • GIG Ops and Defense Ends Command & Control Authorities, ROE, Policy Ways &KeyChallenges Trained & Ready Situational Awareness Defensible Architecture Materiel, Technology, Facilities, Engagement Means

  7. UNCLASSIFIED U.S. Federal Cybersecurity Operations Team National Roles and Responsibilities AGREED March 5, 2013 * DoD DHS DOJ/FBI • Investigate, attribute, disrupt and prosecute cyber crimes • Lead domestic national security operations • Conduct domestic collection, analysis, and dissemination of cyber threat intelligence • Support the national protection, prevention, mitigation of, and recovery from cyber incidents • Coordinate cyber threat investigations • Defend the nation from attack • Gather foreign cyber threat intelligence and determine attribution • Secure national security and military systems • Support the national protection, prevention, mitigation of, and recovery from cyber incidents • Investigate cyber crimes under military jurisdiction • Coordinate the national protection, prevention, mitigation of, and recovery from cyber incidents • Disseminate domestic cyber threat and vulnerability analysis • Protect critical infrastructure • Secure federal civilian systems • Investigate cyber crimes under DHS’s jurisdiction US Government Departments and Agencies DoD LEAD FOR National Defense DOJ/FBI LEAD FOR Investigation and Enforcement DHS LEAD FOR Protection SHARED SITUATIONAL AWARENESS ENABLING INTEGRATED OPERATIONAL ACTIONS NPPD, USSS, ICE USCYBERCOM, NSA,DISA, DC3 FBI, NSD, CRM, USAO INTELLIGENCE COMMUNITY: Cyber Threat Intelligence & Attribution PROTECT | PREVENT | MITIGATE | RESPOND | RECOVER Global Cyberspace Coordinate with Public, Private, and International Partners * Note: Nothing in this chart alters existing DOJ, DHS, and DoD roles, responsibilities, or authorities

  8. Partnerships: Team Cyber & International engagements Network Vulnerabilities Are Not Solely a US Problem • Shared Situational Awareness • Agile Tipping and Cueing • Integrated Defensive & Offensive Capabilities • Synchronized Command & Control 10 1/28/2013 4:37 PM

  9. Cyber Partnering Framework

  10. What other proactive partners are doing

  11. Government Industry Academia Cyber South Carolina

  12. Cyber South Carolina Cyber Protection and Awareness Cyber Relevance Leverages Economic Engagement and Opportunity Synergy of Effort and Capabilities Between Government/Industry/Academia

  13. Russian Gang Said to Amass More Than a Billion Stolen Internet Credentials Aug 2014 South Carolina Cyber Partners The Cyber solution

  14. Questions?

More Related