south carolina cyber. cyberspace: (dod) “a global domain within the information environment...
TRANSCRIPT
Nature of Cyberspace
• Cyberspace: (DoD) “A global domain within the information environment consisting of the interdependent network of information technology infrastructures and resident data, including the internet, telecommunications networks, computer systems, and embedded processors and controllers.” Source: Joint Pub 3-12
• However…– Manmade domain/ever changing/privately owned– Virtual– Programming code and protocols define rules of the domain– Environment/TTPs evolve at net speed
41/28/2013 4:37 PM
Success in this domain means being smarter, more creative, faster,and stealthier than our opponent.
675 265 13OF INTERNET TRAFFIC PER DAY (2011); GROWING 60%PER YEAR
EMAILS PER DAY
HOURS OF VOIP PER DAY
PETABYTES BILLION MILLION
5
Environment: Exponential Rate of Change
Number of websites
2008
2010
2000
15.6
Million
187
Million
634
Million
World population
on the Internet
5%
20%
28%
34%
2012
255
Million
740
Million
4Billi
on
Worldwide cell
subscribers
5.3Billi
on
6.4Billi
on
Facebook Launch, 2004
1 BillionUsers, 2012
Transistors per
microchip
42Millio
n
758
Million
5 Billi
on
2.3Billi
on
Library of Congress = 10 TerabytesAt best transmission line speed: 1998 = 16.5 days 2013 = .00008 seconds
10 Billion Mobile Devices Projected by 2016
(1.4 per person on the planet)
UNCLASSIFIED
UNCLASSIFIED
THREAT ACTORS
6
TERRORIST ACTS
CRIMINALELEMENTS
HACKTIVISTS
FOREIGNINTELLIGENCE
SUPPLY CHAIN VULNERABILITY
WIRELESS ACCESS POINTS
REMOVABLE MEDIA
NEGLIGENT USERS
INSIDER THREATS
THREAT ACTORS THREAT VECTORS
Ends
Ways &KeyChallenges
Means
5 Key Challenges in Cyber
8
Materiel, Technology, Facilities, Engagement
Trained & Ready Situational Awareness
Defensible Architecture
Command & Control
Authorities, ROE, Policy
USCYBERCOM Mission
1. Defend the Nation2. CCMD Support3. GIG Ops and Defense
1/28/2013 4:37 PM
Glo
bal C
yber
spac
eU
S G
over
nmen
t Dep
artm
ents
and
Age
ncie
sUNCLASSIFIED
U.S. Federal Cybersecurity Operations Team National Roles and Responsibilities
• Investigate, attribute, disrupt and prosecute cyber crimes
• Lead domestic national security operations
• Conduct domestic collection, analysis, and dissemination of cyber threat intelligence
• Support the national protection, prevention, mitigation of, and recovery from cyber incidents
• Coordinate cyber threat investigations
• Defend the nation from attack• Gather foreign cyber threat intelligence
and determine attribution• Secure national security and military
systems• Support the national protection,
prevention, mitigation of, and recovery from cyber incidents
• Investigate cyber crimes under military jurisdiction
DOJ/FBI DoD DHS• Coordinate the national protection,
prevention, mitigation of, and recovery from cyber incidents
• Disseminate domestic cyber threat and vulnerability analysis
• Protect critical infrastructure• Secure federal civilian systems• Investigate cyber crimes under DHS’s
jurisdiction
DHSLEAD FOR
ProtectionNPPD, USSS,
ICE
DOJ/FBILEAD FOR
Investigation and EnforcementFBI, NSD, CRM,
USAO
DoDLEAD FOR
National DefenseUSCYBERCOM, NSA,
DISA, DC3
Coordinate with Public, Private, and International Partners* Note: Nothing in this chart alters existing DOJ, DHS, and
DoD roles, responsibilities, or authorities
*AGREEDMarch 5, 2013
Partnerships: Team Cyber & International engagements
10
• Shared Situational Awareness
• Agile Tipping and Cueing
• Integrated Defensive & Offensive Capabilities
• Synchronized Command & Control
Network Vulnerabilities Are Not Solely a US Problem
1/28/2013 4:37 PM 101/28/2013 4:37 PM
Cyber South Carolina
Cyber Protection and Awareness
Cyber RelevanceLeverages Economic Engagement
and Opportunity
Synergy of Effort and CapabilitiesBetween Government/Industry/Academia
Russian Gang Said to Amass More Than aBillion Stolen Internet Credentials
Aug 2014
South Carolina CyberPartners Governmen
t
Academia
Industry
The Cyber solution