Phil Mar - The Security Network

advertisement
Secure Communications in the
Cyber World
Phil Mar
September 2010
Securing the Network Assets
Transforming Secure
Communications to the
Tactical Edge
Securing the Networks
Securing the Waveform
Securing the End-Points
The Adversary Attacks the Weakest Areas To Steal, Alter
Your Data and Prohibit You From Communicating
2
Security Enables Communications
Securing the Waveform – Data In
Transit Protection
• The right encryption algorithms
• Suite A and Suite B
• Network Enabled Waveforms
• HAIPE, IPMEIR
• Secure Key Distribution
• PKI, NSA KMI, H2H, Secret and
Below Keying
Securing the End Points – Data in
At Rest Protection and Platform
Integrity
Securing the Network – Cyber
Defense Network
• C4ISR of Cyber Space
• Cyber Sensors
• Early Warning Systems
• Dynamics/Active Cyber Defense
• Graceful Degradation
• Operational Ability
• Incident Response Team
• Forensics
• Network Repair under Attack
Securing the Assets - Applying
DIT, DIR and CND Everywhere
•
•
•
•
•
•
•
•
•
•
•
Hard Disk Encryption
USB Encryption
Host-Based Security Systems
Mobile Device Integrity
Last-Mile DIT
• WiFi, Cellular, WiMax
Space Networks
ISR Networks
Radio/Waveform Networks
Wireless Networks
Key Management Infrastructure
….and everything connected to THE
NETWORK with or without wires
3
ViaSat Security Communications Portfolios
Data In Transit
Data in At Rest Protection and
Platform Integrity
1 Gbps KG-255
100 Mbps KG-250
TRANSEC
Module
KG-201
Laptop
Embeddable
PSIAM Crypto
KG-250x
Securing the Network – Cyber
Defense Network
`
KG-200
Securing the Assets - Applying
DIT, DIR & CND everywhere
HAF-100x
Metasploit
HAF-100
RE1
RF1
network
HD3 Server
B
llo
HD3 Server
A
Ms
g
RA2
Dynamic Cyber
Sensors
FAB-T
Hello Msg
He
`
DCS
RB1
HD3 Node
F
HD3 Node
E
RA1
He
llo
Ms
Blue Force Tracking
RB2
g
RB3
HD3 Server
C
HD3 Node
D
Government SATCOM
RC1
RD1
Secure Ad-hoc Networking
JTRS/Link 16
4
Download