Upload
elizabeth-hall
View
231
Download
1
Tags:
Embed Size (px)
Citation preview
Secure Communications in the Cyber World
Phil Mar
September 2010
2
Transforming Secure Communications to the
Tactical Edge
Securing the Waveform
Securing the End-Points
Securing the Network Assets
Securing the Networks
The Adversary Attacks the Weakest Areas To Steal, Alter Your Data and Prohibit You From Communicating
3
Security Enables Communications Security Enables Communications
Securing the Waveform – Data In Transit Protection
• The right encryption algorithms• Suite A and Suite B
• Network Enabled Waveforms• HAIPE, IPMEIR
• Secure Key Distribution• PKI, NSA KMI, H2H, Secret and
Below Keying
Securing the End Points – Data in At Rest Protection and Platform Integrity
• Hard Disk Encryption• USB Encryption• Host-Based Security Systems• Mobile Device Integrity• Last-Mile DIT
• WiFi, Cellular, WiMax
Securing the Network – Cyber Defense Network• C4ISR of Cyber Space
• Cyber Sensors• Early Warning Systems• Dynamics/Active Cyber Defense• Graceful Degradation
• Operational Ability • Incident Response Team• Forensics• Network Repair under Attack
Securing the Assets - Applying DIT, DIR and CND Everywhere
• Space Networks• ISR Networks• Radio/Waveform Networks• Wireless Networks• Key Management Infrastructure• ….and everything connected to THE
NETWORK with or without wires
4
ViaSat Security Communications Portfolios ViaSat Security Communications Portfolios Data In Transit Data in At Rest Protection and
Platform Integrity
Securing the Assets - Applying DIT, DIR & CND everywhere
100 Mbps KG-250 1 Gbps KG-255
PSIAM Crypto
KG-200KG-201
Laptop EmbeddableKG-250x
TRANSEC Module
HAF-100
HAF-100x
network `
` Metasploit
DCS
Dynamic Cyber Sensors
FAB-T Blue Force Tracking
JTRS/Link 16Government SATCOM
HD3 Server A
RA1
RA2
HD3 Server B
RB1
RB2
RB3
HD3 Server C
RC1
HD3 Node D
HD3 Node E
HD3 Node F
RD1
RE1 RF1
Hello Msg
Hello Msg
Hello M
sg
Secure Ad-hoc Networking
Securing the Network – Cyber Defense Network