200 likes | 355 Views
Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace. Lt General Bob Elder, USAF (Retired) 15 November 2010. Overview. Evolving Cyber Environment Cyber and Cyber-enabled Business Operations Cyber Security and Defense
E N D
Perspectives onCyberspace Research NeedsCyber Research WorkshopLouisiana Tech UniversityCenter for Secure Cyberspace Lt General Bob Elder, USAF (Retired) 15 November 2010
Overview • Evolving Cyber Environment • Cyber and Cyber-enabled Business Operations • Cyber Security and Defense • Mission Assurance • Exploiting Cyberspace • Operational & Strategic Cyber Leaders
Today’s Cyber Environment • National Focus is on cyber security—$18B in FYDP • Effort limited to federal government networks • Critical need for state and local government, commercial, and private use network protection • World focus is development of cyberspace for global business—leaders are found outside the United States • Information now a commodity; knowledge management tools and services prevent information overload • Value Chain is changing—consumers interact with businesses to develop tailored products (Dell) • Social networking drives behaviors, choices, politics The Nation requires cyber and cyber security expertise
Ways: Information Operations Network Operations Kinetic Actions Law Enforcement Counterintelligence Enablers: Science & Technology Partnering Intelligence Support Law and policy Trained personnel Joint Capability Areas: Battlespace Awareness Force Generation Command and Control Information Operations Net-centric Operations Global Deterrence Homeland Defense Interagency Integration Non-governmental organization coordination National Military Strategyfor Cyberspace Ops (NMS-CO)
Civilian Cyberspace Use • Establish Networks – TELECOMs, ISPs, Businesses • Maintain Networks (Security) – CIOs, CTOs, CISOs • Defend Networks (Business) – COOs, Associations • Business Ops Assurance – Risk Management • Ops through Cyber – Business Enhancement • Ops through Cyber – Marketing/Sales • Ops through Cyber – Knowledge Management • Ops in Cyber – Virtual Travel • Ops in Cyber – Virtual Presence • Ops in Cyber – Producer/Consumer Dialogue
Major Cyber Security Players Defense • Law Enforcement • Intelligence Community • Homeland Security • Counterintelligence • Military • Industry Consortiums • Regulatory Agencies • Commercial Providers Potential Adversaries • Organized Crime • International Terrorists • Domestic Terrorists • Nation-State Intelligence • Nation-State Military • Industrial Intelligence • Cyber “Vandals”
Full Spectrum Cyber Defense Cyberspace Typology • Private/Open • Commercial • Regulated Commercial • Government (.gov) • Military (Admin) • Military (Ops) • Economic Security • Public Safety • WMD/E Defense/I&W Other US Cyberspace (includes DIB) & Associated Cyber Infrastructure CADC FOCUS Global Information Gridand DOD Networks State & Local Gov’t Cyberspace US GovernmentCyberspace
Cyberspace Business Areas • Establish the Domain • Form Cyber Networks • Secure Cyber Networks • Defend the Domain • Passive Defense • Active Defense • Use the Domain • Business Augmentation • Internet Business • Participatory Services Cyber Ops COMMERCE Cyberspace importance is increasing
Information Protection Influence Attack ElectromagneticSpectrumAttack Cyber Attack InfluenceProtection ElectronicProtection Data/CodeProtection Force Protection Physical Attack (includes Directed Energy) Logical Networks Wireless Networks Digital Data & Code Electromagnetic Spectrum Social Networks Cyber Use Law Enforcement Electronics (& Infrastructure) • Effects of Attacks: • Denial of Service • Confidential Data Loss • Data Manipulation • System Integrity Loss Physical Networks Offense
Mission Assurance: Focus on Effects ATTACKS TARGETS EFFECTS Insider Attacks; Social engineering Disinformation Confusion C2 Disruption Alter Behaviors Human Organization Data and policy Corruption Mission Layer Code Manipulation Malware Inaccuracies Induced Failures Denial of Service Data Exfiltration App/Session Layer Worms, viruses Flooding OS/Network Layer Backdoor Implants Malfunctions Performance loss Lost Comms HW/Systems Layer Devices & Linkages Physical Destruction Active Defense Passive Defense Mission Assurance Source: 2008 AFSAB Study
AOC Resiliency Study—C3 View Control (in) Data (out) Sensor Data Sensor(Out) Control (out) Sensor (in) Intel Info Cmd Input Sensors Intel Info Cmd Out (Gnd Cdr) GndStation Cmd Out (Air Cdr) Target Sensor Data (in) Fusion Center AOC/ASOCCoord AOC/ASOCCoord Coord Intel Info (out) AOC RPA Ctrl ASOC AOC-UAS Terrestrial AOC: Air Operations Center ASOC: Air Support Operations Center RPA: Remotely Piloted Aircraft
AOC Resiliency Study—Ops View Dotted lines denote operational connections Control (in) Data (out) Sensor Data Sensor(Out) Control (out) Sensor (in) Sensors GndStation Sensor Data (in) Target Fusion Center Intel Info Coord Intel Info (out) AOC AOC/ASOC Coord RPA Ctrl ASOC AOC-UAS Terrestrial AOC: Air Operations Center ASOC: Air Support Operations Center RPA: Remotely Piloted Aircraft
Degraded Cyberspace Cyberspace Exploitation Situational Awareness Linked Ops Centers Cyber-enabled Global Operations Intelligence Orient Observe Data Integration Sensors Legacy Operations Knowledge Operations Cognitive “Space” Physical Space Cyber Act Decide Ops Integration Effects (Integrated Actions) Logistics
Value Chain in a Cyber World Consumer isa Partner OPPORTUNITIES • Shopper Dialogue • Information Sharing • Synchronized Production • Integrated Logistics • Sustainability • Company Cyber Culture Consumer Behavior FutureValueChain Product Flow Information Flow Open Networkrules Quality isa commodity GCI Initiative, 2008
Warfighter-Industry Collaboration Requirement Developers Programmers WIC-E Military User (Warfighter) Acquisition Community “WIC-E” Process Test &Evaluation Capability Provider (Private Sector) Normal Process
Multi-State CADC Relationships Internet AR Guard LA Guard MS Guard TX Guard AR NOSC LA NOSC MS NOSC TX NOSC AR Network LA Network MS Network TX Network Cyber Assurance and Defense Network Center
Operational & Strategic Leaders CurrentCyber Workforce DevelopmentFocus Cyber-enabled Leadership DevelopmentShortfall StrategicLeader Exploit Cyberspace Operational LeaderSupervise and integrate technical skills with mission Technical SkillsSuch as cyber Security, Info Assurance, Software Assurance, Network Mgmt, Communications, Knowledge Management, Visualization …
Facilitating Cyber Partnerships Cyber Security & Defense Center National Guard Dept of Homeland Security Cyberspace Innovation Center Law Enforcement DoD Cyber (& related) Industries Assurance & SecurityEducation Academic Community
Challenge: Cultural (R)evolution Alternative Strategies are available: Can we “break” the cultural barrier? Hierarchical Culture Cyber Culture Future Hierarchy Level ---- Power---- Connections Hierarchy Level ---- Value----- Contribution