defense systems magazine
DESCRIPTION
cyber security , cyber warfareTRANSCRIPT
Defense Systems Magazine
Editorial Webcast
USCYBERCOM Brief
September 27, 2011
Cyber Agenda • The Cyber Environment
• U.S. Cyber Command (USCC) Mission
• Organization
• Authorities
• The Threats/Actors
• What it Takes to Secure Cyberspace
• The Defense Strategy for Operating in Cyberspace
• Q & As
1
The Cyber Environment
• In 2010, 107 trillion e-mails sent – 294 billion every day.
• 600 million on Facebook – 72% of internet users.
• 2.9 billion – the number of e-mail accounts worldwide
• Terrorist groups are active on 4,000 websites.
• 140 Foreign Intelligence organizations are trying to hack into U.S. computers.
• DoD is probed on average 250 k times per hour/ six million times a day.
2
Social Media
3
152 Million - # of Blogs (tracked by BlogPulse)
25 Billion - # of Tweets
100 Million - # of new accounts added in 2010
175 Million - # of People as of 09/2010
7.7 Million - # of People following @ladygaga
600 Million - # of People at the end of 2010
250 Million - # of new people in 2010
30 Billion - Pieces of content (links, notes,
photos, etc.) shared per month.
20 Million - # of Facebook apps installed daily
70% - Share of user base located outside U.S.
2 Billion+ - # of Videos watched monthly
20 Million - # of Videos uploaded monthly
36 Billion - # of Photos uploaded per year
Flickr
5 Billion - # of Photos hosted
3000+ - # of Photos uploaded per minute
130 Million - # of Photos uploaded per month
YouTube
2 Billion - # of Videos watched
daily
35 - Hours of video uploaded
every minute
186 - # of Online videos the
average U.S. Internet user
watches in a month
Composed of: • 7,000,000 DoD IT Systems Worldwide • 1,000s of Warfighting & Support Applications • 120,000 Commercial Telecom Circuits • 16 Satellite Communications Gateways
Supporting: • 3,500+ Base/Post Camp/Stations/Ships Worldwide • 10 Combatant Commands, 4 Services, 31 Others • Joint Task Forces /Worldwide Expeditionary Forces /Strike Groups
1.8 Billion Internet Users With 10 Internet Access Points
Presence in 88 Nations Intelligence, Coalition &
Federal Networks
Cyber as a Domain
“The national security, economic competitiveness, and public safety of American Citizens are now dependent on what happens in cyberspace. This global information and communications infrastructure… are critical to virtually every aspect of modern life.” 4
Cyberspace
Persona Layer
Cyber Persona Layer
Logical Network Layer
Physical Network Layer
Geographic Layer
5
Evolution and Mission
MISSION
Plan, coordinate, integrate, synchronize, and conduct activities to direct operations and defense of Department of Defense information networks to prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure U.S./Allied freedom of action in cyberspace and deny the same to our adversaries.
6
U.S. Cyber Command
7
Authorities
• Title 10
• Title 50
• Title 32
• Title 18
• Title 42
8
The Threats/ Actors
• Garden Variety Hackers
• Organized Groups/Associations
• Cyber Criminals
• Nation States
• Non-Nation States/Actors
9
What it Takes to Secure Cyberspace
I. Active Defense
II. Collective Defense
III. Extending Protection to Critical Infrastructure
IV. Leveraging U.S. Technological Dominance
10
Active Defense
• Monitoring of the Grid for situational awareness.
• Advisories and patches and updates.
• Anti-virus programs, firewalls.
• Objective security assessments.
• Automatic intrusion detection and blocking measures.
• Active searches for malware
• Forensic response teams.
11
Collective Defense
Whole-of-Government Effort
12
Extending Protection to Critical Infrastructure
“…our digital infrastructure—the networks and computers we depend on every day—will be treated as they should be: as a strategic national asset. Protecting this will be a national security priority…the cyber threat is one of the most serious economic and national security challenges we face as a nation…. We’re not as prepared as we should be, as a government or as a country….” President Barack Obama May 29, 2009
13
Leveraging U.S. Technological Dominance
Success in Securing Cyberspace Requires Partnerships With:
• Private Industry • Research and Development Institutions • Academia • Other Government Departments and Agencies
14
The Defense Strategy for Operating in Cyberspace (DSOC)
• It is the first Defense unified strategy for cyberspace and officially encapsulates a
way forward for DoD’s military, intelligence, and business operations in cyberspace.
• The cyber strategy combines and institutionalizes previous DoD efforts, statements
and initiatives into formal Department policy.
• The cyber strategy provides a framework for future Department priorities for
operating in cyberspace and establishes clear guidelines for the Department and its
components to comprehensively approach operations in cyberspace.
• The DSOC is not a plan for responding to hostile actions in cyberspace. The DSOC
supports the President’s International Strategy for Cyberspace and other relevant
strategic documents. In the President’s International Strategy, the Administration has
made it clear that the United States reserves the right to respond – through
diplomatic, informational, military, or economic means– to significant national
security threats in cyberspace and beyond.
15
The Defense Strategy for Operating in Cyberspace Strategic Initiatives
• Treating cyberspace as an operational domain so that DoD can organize, train, and equip.
• Employing new defense operating concepts.
• Partnering with the interagency and private sector.
• Working with allies and international partners to increase cybersecurity.
• Leveraging our talent and technological capacity.
16
The Bottom Line
17
Thank You
18
19
20
21