Secure Communications in the Cyber World Phil Mar September 2010 Securing the Network Assets Transforming Secure Communications to the Tactical Edge Securing the Networks Securing the Waveform Securing the End-Points The Adversary Attacks the Weakest Areas To Steal, Alter Your Data and Prohibit You From Communicating 2 Security Enables Communications Securing the Waveform – Data In Transit Protection • The right encryption algorithms • Suite A and Suite B • Network Enabled Waveforms • HAIPE, IPMEIR • Secure Key Distribution • PKI, NSA KMI, H2H, Secret and Below Keying Securing the End Points – Data in At Rest Protection and Platform Integrity Securing the Network – Cyber Defense Network • C4ISR of Cyber Space • Cyber Sensors • Early Warning Systems • Dynamics/Active Cyber Defense • Graceful Degradation • Operational Ability • Incident Response Team • Forensics • Network Repair under Attack Securing the Assets - Applying DIT, DIR and CND Everywhere • • • • • • • • • • • Hard Disk Encryption USB Encryption Host-Based Security Systems Mobile Device Integrity Last-Mile DIT • WiFi, Cellular, WiMax Space Networks ISR Networks Radio/Waveform Networks Wireless Networks Key Management Infrastructure ….and everything connected to THE NETWORK with or without wires 3 ViaSat Security Communications Portfolios Data In Transit Data in At Rest Protection and Platform Integrity 1 Gbps KG-255 100 Mbps KG-250 TRANSEC Module KG-201 Laptop Embeddable PSIAM Crypto KG-250x Securing the Network – Cyber Defense Network ` KG-200 Securing the Assets - Applying DIT, DIR & CND everywhere HAF-100x Metasploit HAF-100 RE1 RF1 network HD3 Server B llo HD3 Server A Ms g RA2 Dynamic Cyber Sensors FAB-T Hello Msg He ` DCS RB1 HD3 Node F HD3 Node E RA1 He llo Ms Blue Force Tracking RB2 g RB3 HD3 Server C HD3 Node D Government SATCOM RC1 RD1 Secure Ad-hoc Networking JTRS/Link 16 4