cyberspace a global war-fighting domain every minute of every day, airmen in the united states air...

Download CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace

If you can't read please download the document

Upload: mervin-mcgee

Post on 17-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

  • Slide 1
  • CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace
  • Slide 2
  • Right Now Cyber Attack
  • Slide 3
  • Right Now Cyber Theft
  • Slide 4
  • Right Now Cyber Defense
  • Slide 5
  • Right Now Cyber Offense
  • Slide 6
  • Right Now Cyber Espionage
  • Slide 7
  • The Battle for Information Superiority is being fought in Cyberspace Right Now! Right Now
  • Slide 8
  • Cyberspace Defined The Air Force Cyber Mission Cyberspace Superiority The Airmans Perspective Threats and Vulnerabilities Roles and Responsibilities of all Cyber Wingmen Guided DiscussionOverview
  • Slide 9
  • National Security Presidential Directive 54 the interdependent network of information technology infrastructures, and includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries. Cyberspace Defined
  • Slide 10
  • Department of Defense A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. Cyberspace Defined
  • Slide 11
  • Cyberspace Defined (global domain)
  • Slide 12
  • Slide 13
  • Cyberspace Defined Cyberspace Domain A man-made, interconnected operational realm characterized by use of the electromagnetic spectrum to manipulate information.
  • Slide 14
  • Cyberspace Defined Cyberspace Domain A man-made, interconnected operational realm characterized by use of the electromagnetic spectrum to manipulate information.
  • Slide 15
  • Cyberspace Defined Cyberspace Domain A man-made, interconnected operational realm characterized by use of the electromagnetic spectrum to manipulate information.
  • Slide 16
  • Cyberspace Defined Cyberspace Domain A man-made, interconnected operational realm characterized by use of the electromagnetic spectrum to manipulate information.
  • Slide 17
  • Cyberspace Land Air Sea - Space
  • Slide 18
  • SPACECYBERSPACE AIR but how do we accomplish that cyberspace part? The Air Force Mission
  • Slide 19
  • AF Cyber Mission 24 AF Mission to extend, operate and defend the Air Force portion of the Department of Defense network while providing the full spectrum of cyber capabilities for the joint war fighter
  • Slide 20
  • Cyberspace Superiority Global Integrated ISR Personnel Recovery Nuclear Deterrence Operations Command and Control Global Precision Attack Building Partnerships Special Operations Air Superiority Rapid Global Mobility Agile Combat Support Space Superiority Cyberspace Superiority Global Integrated ISR Personnel Recovery Nuclear Deterrence Operations Command and Control Global Precision Attack Building Partnerships Special Operations Air Superiority Rapid Global Mobility Agile Combat Support Cyberspace Superiority Space Superiority Air Force Core Functions
  • Slide 21
  • Space Superiority Air Superiority Cyberspace Superiority Air Force Core Functions
  • Slide 22
  • The operational advantage in, through, and from cyberspace to conduct operations at a given time and in a given domain without prohibitive interference Cyber Superiority
  • Slide 23
  • Mission assurance = operational success AF Cyber Mission
  • Slide 24
  • Mission Assurance Example Range = 0.5 mile
  • Slide 25
  • Mission Assurance ? ? ? ? ?
  • Slide 26
  • Airmans Perspective Airmen think of airpower & the application of force from a functional rather than geographical perspective. Airmen leverage speed, range, flexibility, precision, time, and lethality to create effects from and within all domains. Cyberspace operations are intrinsic to the conduct of modern airpower. Airmen conduct greatest percentage of global operations. Operations should be tightly integrated with capabilities of the air and space domains and should be commanded by an Airman who takes a broader view of war
  • Slide 27
  • Airmans Perspective and Threats
  • Slide 28
  • Threats and Vulnerabilities Threat = Capability + Intent
  • Slide 29
  • Military Critical Technology Annual Report to Congress Countries Targeting The U.S. Number Reported Incidents FY10 FY 09 FY08 FY 2010 FY 2009 Information Systems 25 22 2163 47 Sensors & Lasers17 11 840 46 Electronics11 9 732 37 Armaments/ Energetic Material 12 10 944 26 Aeronautics12 10 936 Marine Systems6 4 232 24 Guidance / Navigation Technologies 8 4 226 15 Space Systems Technologies 6 5 322 19
  • Slide 30
  • Threat = Capability + IntentThreats
  • Slide 31
  • Vulnerability = Weakness Operating Systems Poor Practices Applications OperatorVulnerabilities
  • Slide 32
  • Did You Know Social NetworkingSPAM USB ThumbdrivesCell Phones Wireless DevicesDiscussion
  • Slide 33
  • Nuclear Weapons Facility Locating Cyber Weapons
  • Slide 34
  • Wheres the Cyber Threat? Locating Cyber Weapons
  • Slide 35
  • What do you think you can do to prevent adverse impacts on DOD and AF networks? Where You Fit Into the Fight
  • Slide 36
  • Become a cyber defender. Dont open attachments or click on links unless the email is digitally signed. Dont connect any hardware or download any software, applications, music or information onto our network without approval. Encrypting sensitive but unclassified and/or mission critical information. Have a general understanding of the cyberspace domain as well as basic threats, vulnerabilities, and common countermeasures that any Airman can employ. Where You Fit Into the Fight
  • Slide 37
  • 1.The United States is vulnerable to cyberspace attacks by relentless adversaries attempting to infiltrate our networks at work and at home millions of times a day, 24/7. Ten Things a Cyber Wingman Should Know 2. Our enemies plant malicious code, worms, botnets, and hooks in common websites, software, and hardware such as thumb drives, printers, etc. 3. Once implanted, this code begins to distort, destroy, and manipulate information, or phone it home. Code allows our adversaries to obtain higher levels of credentials to access highly sensitive information. 4. The enemy attacks your computers at work and at home knowing you communicate with the Air Force network by email, or transfer information from one system to another. 5. As cyber wingmen, you have a critical role in defending your networks, your information, your security, your teammates, and your country. 6. You significantly decrease our enemies access to our networks, critical USAF information and even your personal identity by taking simple action. 7. Dont open attachments or click on links unless the email is digitally signed or you can directly verify the source, even if it appears to be from someone you know. 8. Do not connect any hardware or download any software applications, music, or information onto our networks without approval. 9. Encrypt sensitive but unclassified and/or critical information. Ask your computer systems administrator (CSA) for more information. 10. Install the free Department of Defense anti-virus software on your home computer. Your CSA can provide you with your free copy.
  • Slide 38
  • Slide 39
  • Cyberspace Defined The Air Force Cyber Mission Cyberspace Superiority The Airmans Perspective Threats and Vulnerabilities Roles and Responsibilities of all Cyber Wingmen Guided DiscussionSummary