1 / 20

Lt General Bob Elder, USAF (Retired) 15 November 2010

Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace. Lt General Bob Elder, USAF (Retired) 15 November 2010. Overview. Evolving Cyber Environment Cyber and Cyber-enabled Business Operations Cyber Security and Defense

lotte
Download Presentation

Lt General Bob Elder, USAF (Retired) 15 November 2010

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Perspectives onCyberspace Research NeedsCyber Research WorkshopLouisiana Tech UniversityCenter for Secure Cyberspace Lt General Bob Elder, USAF (Retired) 15 November 2010

  2. Overview • Evolving Cyber Environment • Cyber and Cyber-enabled Business Operations • Cyber Security and Defense • Mission Assurance • Exploiting Cyberspace • Operational & Strategic Cyber Leaders

  3. Today’s Cyber Environment • National Focus is on cyber security—$18B in FYDP • Effort limited to federal government networks • Critical need for state and local government, commercial, and private use network protection • World focus is development of cyberspace for global business—leaders are found outside the United States • Information now a commodity; knowledge management tools and services prevent information overload • Value Chain is changing—consumers interact with businesses to develop tailored products (Dell) • Social networking drives behaviors, choices, politics The Nation requires cyber and cyber security expertise

  4. Key Cyber Functional Elements

  5. Ways: Information Operations Network Operations Kinetic Actions Law Enforcement Counterintelligence Enablers: Science & Technology Partnering Intelligence Support Law and policy Trained personnel Joint Capability Areas: Battlespace Awareness Force Generation Command and Control Information Operations Net-centric Operations Global Deterrence Homeland Defense Interagency Integration Non-governmental organization coordination National Military Strategyfor Cyberspace Ops (NMS-CO)

  6. Civilian Cyberspace Use • Establish Networks – TELECOMs, ISPs, Businesses • Maintain Networks (Security) – CIOs, CTOs, CISOs • Defend Networks (Business) – COOs, Associations • Business Ops Assurance – Risk Management • Ops through Cyber – Business Enhancement • Ops through Cyber – Marketing/Sales • Ops through Cyber – Knowledge Management • Ops in Cyber – Virtual Travel • Ops in Cyber – Virtual Presence • Ops in Cyber – Producer/Consumer Dialogue

  7. Major Cyber Security Players Defense • Law Enforcement • Intelligence Community • Homeland Security • Counterintelligence • Military • Industry Consortiums • Regulatory Agencies • Commercial Providers Potential Adversaries • Organized Crime • International Terrorists • Domestic Terrorists • Nation-State Intelligence • Nation-State Military • Industrial Intelligence • Cyber “Vandals”

  8. Full Spectrum Cyber Defense Cyberspace Typology • Private/Open • Commercial • Regulated Commercial • Government (.gov) • Military (Admin) • Military (Ops) • Economic Security • Public Safety • WMD/E Defense/I&W Other US Cyberspace (includes DIB) & Associated Cyber Infrastructure CADC FOCUS Global Information Gridand DOD Networks State & Local Gov’t Cyberspace US GovernmentCyberspace

  9. Cyberspace Business Areas • Establish the Domain • Form Cyber Networks • Secure Cyber Networks • Defend the Domain • Passive Defense • Active Defense • Use the Domain • Business Augmentation • Internet Business • Participatory Services Cyber Ops COMMERCE Cyberspace importance is increasing

  10. Information Protection Influence Attack ElectromagneticSpectrumAttack Cyber Attack InfluenceProtection ElectronicProtection Data/CodeProtection Force Protection Physical Attack (includes Directed Energy) Logical Networks Wireless Networks Digital Data & Code Electromagnetic Spectrum Social Networks Cyber Use Law Enforcement Electronics (& Infrastructure) • Effects of Attacks: • Denial of Service • Confidential Data Loss • Data Manipulation • System Integrity Loss Physical Networks Offense

  11. Mission Assurance: Focus on Effects ATTACKS TARGETS EFFECTS Insider Attacks; Social engineering Disinformation Confusion C2 Disruption Alter Behaviors Human Organization Data and policy Corruption Mission Layer Code Manipulation Malware Inaccuracies Induced Failures Denial of Service Data Exfiltration App/Session Layer Worms, viruses Flooding OS/Network Layer Backdoor Implants Malfunctions Performance loss Lost Comms HW/Systems Layer Devices & Linkages Physical Destruction Active Defense Passive Defense Mission Assurance Source: 2008 AFSAB Study

  12. AOC Resiliency Study—C3 View Control (in) Data (out) Sensor Data Sensor(Out) Control (out) Sensor (in) Intel Info Cmd Input Sensors Intel Info Cmd Out (Gnd Cdr) GndStation Cmd Out (Air Cdr) Target Sensor Data (in) Fusion Center AOC/ASOCCoord AOC/ASOCCoord Coord Intel Info (out) AOC RPA Ctrl ASOC AOC-UAS Terrestrial AOC: Air Operations Center ASOC: Air Support Operations Center RPA: Remotely Piloted Aircraft

  13. AOC Resiliency Study—Ops View Dotted lines denote operational connections Control (in) Data (out) Sensor Data Sensor(Out) Control (out) Sensor (in) Sensors GndStation Sensor Data (in) Target Fusion Center Intel Info Coord Intel Info (out) AOC AOC/ASOC Coord RPA Ctrl ASOC AOC-UAS Terrestrial AOC: Air Operations Center ASOC: Air Support Operations Center RPA: Remotely Piloted Aircraft

  14. Degraded Cyberspace Cyberspace Exploitation Situational Awareness Linked Ops Centers Cyber-enabled Global Operations Intelligence Orient Observe Data Integration Sensors Legacy Operations Knowledge Operations Cognitive “Space” Physical Space Cyber Act Decide Ops Integration Effects (Integrated Actions) Logistics

  15. Value Chain in a Cyber World Consumer isa Partner OPPORTUNITIES • Shopper Dialogue • Information Sharing • Synchronized Production • Integrated Logistics • Sustainability • Company Cyber Culture Consumer Behavior FutureValueChain Product Flow Information Flow Open Networkrules Quality isa commodity GCI Initiative, 2008

  16. Warfighter-Industry Collaboration Requirement Developers Programmers WIC-E Military User (Warfighter) Acquisition Community “WIC-E” Process Test &Evaluation Capability Provider (Private Sector) Normal Process

  17. Multi-State CADC Relationships Internet AR Guard LA Guard MS Guard TX Guard AR NOSC LA NOSC MS NOSC TX NOSC AR Network LA Network MS Network TX Network Cyber Assurance and Defense Network Center

  18. Operational & Strategic Leaders CurrentCyber Workforce DevelopmentFocus Cyber-enabled Leadership DevelopmentShortfall StrategicLeader Exploit Cyberspace Operational LeaderSupervise and integrate technical skills with mission Technical SkillsSuch as cyber Security, Info Assurance, Software Assurance, Network Mgmt, Communications, Knowledge Management, Visualization …

  19. Facilitating Cyber Partnerships Cyber Security & Defense Center National Guard Dept of Homeland Security Cyberspace Innovation Center Law Enforcement DoD Cyber (& related) Industries Assurance & SecurityEducation Academic Community

  20. Challenge: Cultural (R)evolution Alternative Strategies are available: Can we “break” the cultural barrier? Hierarchical Culture Cyber Culture Future Hierarchy Level ---- Power---- Connections Hierarchy Level ---- Value----- Contribution

More Related