4
Secure Communications in the Cyber World Phil Mar September 2010

Secure Communications in the Cyber World Phil Mar September 2010

Embed Size (px)

Citation preview

Page 1: Secure Communications in the Cyber World Phil Mar September 2010

Secure Communications in the Cyber World

Phil Mar

September 2010

Page 2: Secure Communications in the Cyber World Phil Mar September 2010

2

Transforming Secure Communications to the

Tactical Edge

Securing the Waveform

Securing the End-Points

Securing the Network Assets

Securing the Networks

The Adversary Attacks the Weakest Areas To Steal, Alter Your Data and Prohibit You From Communicating

Page 3: Secure Communications in the Cyber World Phil Mar September 2010

3

Security Enables Communications Security Enables Communications

Securing the Waveform – Data In Transit Protection

• The right encryption algorithms• Suite A and Suite B

• Network Enabled Waveforms• HAIPE, IPMEIR

• Secure Key Distribution• PKI, NSA KMI, H2H, Secret and

Below Keying

Securing the End Points – Data in At Rest Protection and Platform Integrity

• Hard Disk Encryption• USB Encryption• Host-Based Security Systems• Mobile Device Integrity• Last-Mile DIT

• WiFi, Cellular, WiMax

Securing the Network – Cyber Defense Network• C4ISR of Cyber Space

• Cyber Sensors• Early Warning Systems• Dynamics/Active Cyber Defense• Graceful Degradation

• Operational Ability • Incident Response Team• Forensics• Network Repair under Attack

Securing the Assets - Applying DIT, DIR and CND Everywhere

• Space Networks• ISR Networks• Radio/Waveform Networks• Wireless Networks• Key Management Infrastructure• ….and everything connected to THE

NETWORK with or without wires

Page 4: Secure Communications in the Cyber World Phil Mar September 2010

4

ViaSat Security Communications Portfolios ViaSat Security Communications Portfolios Data In Transit Data in At Rest Protection and

Platform Integrity

Securing the Assets - Applying DIT, DIR & CND everywhere

100 Mbps KG-250 1 Gbps KG-255

PSIAM Crypto

KG-200KG-201

Laptop EmbeddableKG-250x

TRANSEC Module

HAF-100

HAF-100x

network `

` Metasploit

DCS

Dynamic Cyber Sensors

FAB-T Blue Force Tracking

JTRS/Link 16Government SATCOM

HD3 Server A

RA1

RA2

HD3 Server B

RB1

RB2

RB3

HD3 Server C

RC1

HD3 Node D

HD3 Node E

HD3 Node F

RD1

RE1 RF1

Hello Msg

Hello Msg

Hello M

sg

Secure Ad-hoc Networking

Securing the Network – Cyber Defense Network