defense systems magazine

22
Defense Systems Magazine Editorial Webcast USCYBERCOM Brief September 27, 2011

Upload: dale-robinson

Post on 24-Mar-2016

216 views

Category:

Documents


0 download

DESCRIPTION

cyber security , cyber warfare

TRANSCRIPT

Page 1: Defense Systems magazine

Defense Systems Magazine

Editorial Webcast

USCYBERCOM Brief

September 27, 2011

Page 2: Defense Systems magazine

Cyber Agenda • The Cyber Environment

• U.S. Cyber Command (USCC) Mission

• Organization

• Authorities

• The Threats/Actors

• What it Takes to Secure Cyberspace

• The Defense Strategy for Operating in Cyberspace

• Q & As

1

Page 3: Defense Systems magazine

The Cyber Environment

• In 2010, 107 trillion e-mails sent – 294 billion every day.

• 600 million on Facebook – 72% of internet users.

• 2.9 billion – the number of e-mail accounts worldwide

• Terrorist groups are active on 4,000 websites.

• 140 Foreign Intelligence organizations are trying to hack into U.S. computers.

• DoD is probed on average 250 k times per hour/ six million times a day.

2

Page 4: Defense Systems magazine

Social Media

3

152 Million - # of Blogs (tracked by BlogPulse)

Twitter

25 Billion - # of Tweets

100 Million - # of new accounts added in 2010

175 Million - # of People as of 09/2010

7.7 Million - # of People following @ladygaga

Facebook

600 Million - # of People at the end of 2010

250 Million - # of new people in 2010

30 Billion - Pieces of content (links, notes,

photos, etc.) shared per month.

20 Million - # of Facebook apps installed daily

70% - Share of user base located outside U.S.

2 Billion+ - # of Videos watched monthly

20 Million - # of Videos uploaded monthly

36 Billion - # of Photos uploaded per year

Flickr

5 Billion - # of Photos hosted

3000+ - # of Photos uploaded per minute

130 Million - # of Photos uploaded per month

YouTube

2 Billion - # of Videos watched

daily

35 - Hours of video uploaded

every minute

186 - # of Online videos the

average U.S. Internet user

watches in a month

Page 5: Defense Systems magazine

Composed of: • 7,000,000 DoD IT Systems Worldwide • 1,000s of Warfighting & Support Applications • 120,000 Commercial Telecom Circuits • 16 Satellite Communications Gateways

Supporting: • 3,500+ Base/Post Camp/Stations/Ships Worldwide • 10 Combatant Commands, 4 Services, 31 Others • Joint Task Forces /Worldwide Expeditionary Forces /Strike Groups

1.8 Billion Internet Users With 10 Internet Access Points

Presence in 88 Nations Intelligence, Coalition &

Federal Networks

Cyber as a Domain

“The national security, economic competitiveness, and public safety of American Citizens are now dependent on what happens in cyberspace. This global information and communications infrastructure… are critical to virtually every aspect of modern life.” 4

Page 6: Defense Systems magazine

Cyberspace

Persona Layer

Cyber Persona Layer

Logical Network Layer

Physical Network Layer

Geographic Layer

5

Page 7: Defense Systems magazine

Evolution and Mission

MISSION

Plan, coordinate, integrate, synchronize, and conduct activities to direct operations and defense of Department of Defense information networks to prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure U.S./Allied freedom of action in cyberspace and deny the same to our adversaries.

6

Page 8: Defense Systems magazine

U.S. Cyber Command

7

Page 9: Defense Systems magazine

Authorities

• Title 10

• Title 50

• Title 32

• Title 18

• Title 42

8

Page 10: Defense Systems magazine

The Threats/ Actors

• Garden Variety Hackers

• Organized Groups/Associations

• Cyber Criminals

• Nation States

• Non-Nation States/Actors

9

Page 11: Defense Systems magazine

What it Takes to Secure Cyberspace

I. Active Defense

II. Collective Defense

III. Extending Protection to Critical Infrastructure

IV. Leveraging U.S. Technological Dominance

10

Page 12: Defense Systems magazine

Active Defense

• Monitoring of the Grid for situational awareness.

• Advisories and patches and updates.

• Anti-virus programs, firewalls.

• Objective security assessments.

• Automatic intrusion detection and blocking measures.

• Active searches for malware

• Forensic response teams.

11

Page 13: Defense Systems magazine

Collective Defense

Whole-of-Government Effort

12

Page 14: Defense Systems magazine

Extending Protection to Critical Infrastructure

“…our digital infrastructure—the networks and computers we depend on every day—will be treated as they should be: as a strategic national asset. Protecting this will be a national security priority…the cyber threat is one of the most serious economic and national security challenges we face as a nation…. We’re not as prepared as we should be, as a government or as a country….” President Barack Obama May 29, 2009

13

Page 15: Defense Systems magazine

Leveraging U.S. Technological Dominance

Success in Securing Cyberspace Requires Partnerships With:

• Private Industry • Research and Development Institutions • Academia • Other Government Departments and Agencies

14

Page 16: Defense Systems magazine

The Defense Strategy for Operating in Cyberspace (DSOC)

• It is the first Defense unified strategy for cyberspace and officially encapsulates a

way forward for DoD’s military, intelligence, and business operations in cyberspace.

• The cyber strategy combines and institutionalizes previous DoD efforts, statements

and initiatives into formal Department policy.

• The cyber strategy provides a framework for future Department priorities for

operating in cyberspace and establishes clear guidelines for the Department and its

components to comprehensively approach operations in cyberspace.

• The DSOC is not a plan for responding to hostile actions in cyberspace. The DSOC

supports the President’s International Strategy for Cyberspace and other relevant

strategic documents. In the President’s International Strategy, the Administration has

made it clear that the United States reserves the right to respond – through

diplomatic, informational, military, or economic means– to significant national

security threats in cyberspace and beyond.

15

Page 17: Defense Systems magazine

The Defense Strategy for Operating in Cyberspace Strategic Initiatives

• Treating cyberspace as an operational domain so that DoD can organize, train, and equip.

• Employing new defense operating concepts.

• Partnering with the interagency and private sector.

• Working with allies and international partners to increase cybersecurity.

• Leveraging our talent and technological capacity.

16

Page 18: Defense Systems magazine

The Bottom Line

17

Page 19: Defense Systems magazine

Thank You

18

Page 20: Defense Systems magazine

19

Page 21: Defense Systems magazine

20

Page 22: Defense Systems magazine

21