Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center...

20
Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired) 15 November 2010

description

Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace. Lt General Bob Elder, USAF (Retired) 15 November 2010. Overview. Evolving Cyber Environment Cyber and Cyber-enabled Business Operations Cyber Security and Defense - PowerPoint PPT Presentation

Transcript of Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center...

Page 1: Perspectives on Cyberspace Research  Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace

Perspectives onCyberspace Research Needs

Cyber Research WorkshopLouisiana Tech University

Center for Secure Cyberspace

Lt General Bob Elder, USAF (Retired)15 November 2010

Page 2: Perspectives on Cyberspace Research  Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace

Overview

• Evolving Cyber Environment • Cyber and Cyber-enabled Business

Operations• Cyber Security and Defense• Mission Assurance• Exploiting Cyberspace• Operational & Strategic Cyber Leaders

Page 3: Perspectives on Cyberspace Research  Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace

The Nation requires cyber and cyber security expertise

Today’s Cyber Environment• National Focus is on cyber security—$18B in FYDP

– Effort limited to federal government networks– Critical need for state and local government,

commercial, and private use network protection• World focus is development of cyberspace for global

business—leaders are found outside the United States• Information now a commodity; knowledge management

tools and services prevent information overload• Value Chain is changing—consumers interact with

businesses to develop tailored products (Dell)• Social networking drives behaviors, choices, politics

Page 4: Perspectives on Cyberspace Research  Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace

Key Cyber Functional Elements

Data CollectionKnowledge Creation(Info Management)

Network OpsNetwork Security

(Communications)

Legacy EnhancementGlobal Integrated Ops

Administrative OpsMission Assurance

(Operations)

Actions in & through Cyberspace

Page 5: Perspectives on Cyberspace Research  Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace

Ways:• Information Operations• Network Operations• Kinetic Actions• Law Enforcement• CounterintelligenceEnablers:• Science & Technology• Partnering• Intelligence Support• Law and policy• Trained personnel

6

National Military Strategyfor Cyberspace Ops (NMS-CO)

Joint Capability Areas:• Battlespace Awareness• Force Generation• Command and Control• Information Operations• Net-centric Operations• Global Deterrence• Homeland Defense• Interagency Integration• Non-governmental

organization coordination

Page 6: Perspectives on Cyberspace Research  Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace

Civilian Cyberspace Use

• Establish Networks – TELECOMs, ISPs, Businesses• Maintain Networks (Security) – CIOs, CTOs, CISOs• Defend Networks (Business) – COOs, Associations• Business Ops Assurance – Risk Management • Ops through Cyber – Business Enhancement• Ops through Cyber – Marketing/Sales• Ops through Cyber – Knowledge Management• Ops in Cyber – Virtual Travel • Ops in Cyber – Virtual Presence• Ops in Cyber – Producer/Consumer Dialogue

7

Page 7: Perspectives on Cyberspace Research  Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace

Major Cyber Security Players

Defense• Law Enforcement• Intelligence Community• Homeland Security• Counterintelligence• Military• Industry Consortiums• Regulatory Agencies• Commercial Providers

Potential Adversaries• Organized Crime• International Terrorists• Domestic Terrorists• Nation-State

Intelligence• Nation-State Military• Industrial Intelligence• Cyber “Vandals”

8

Page 8: Perspectives on Cyberspace Research  Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace

Full Spectrum Cyber DefenseCyberspace Typology

• Private/Open• Commercial• Regulated Commercial• Government (.gov)• Military (Admin)• Military (Ops)• Economic Security• Public Safety• WMD/E Defense/I&W

Glo

bal I

nfor

mat

ion

Grid

and

DO

D N

etw

orks

US

Gov

ernm

ent

Cyb

ersp

ace

Stat

e &

Loc

al G

ov’t

Cyb

ersp

ace Other US

Cyberspace(includes DIB)

&Associated

CyberInfrastructure

CADC FOCUS

Page 9: Perspectives on Cyberspace Research  Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace

Cyberspace Business Areas

COMMERCE

Cyberspace importance is increasing

Cyber Ops

• Establish the Domain– Form Cyber Networks– Secure Cyber Networks

• Defend the Domain– Passive Defense– Active Defense

• Use the Domain– Business Augmentation– Internet Business– Participatory Services

Page 10: Perspectives on Cyberspace Research  Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace

PhysicalNetworks

Information Protection

Electronics (& Infrastructure)

Elec

trom

agne

tic S

pectr

um Digital Data & Code

Cyber Use

Force Protection

Electro

nic

Protec

tion

Data/Code

Protection

InfluenceProtection

Physical Attack(includes Directed Energy)

CyberAttack

ElectromagneticSpectrumAttack

Influence Attack

LogicalNetworksWireless

Networks

Effects of Attacks:• Denial of Service• Confidential Data Loss • Data Manipulation• System Integrity Loss

Social Networks

LawEnforcement

Offense

Page 11: Perspectives on Cyberspace Research  Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace

Mission Assurance: Focus on Effects

ATTACKS TARGETS EFFECTS

Human Organization

Mission Layer

App/Session Layer

OS/Network Layer

HW/Systems Layer

Devices & Linkages

DisinformationConfusionC2 DisruptionAlter Behaviors

InaccuraciesInduced FailuresDenial of ServiceData Exfiltration

MalfunctionsPerformance lossLost Comms

Insider Attacks;Social engineering

Data and policyCorruption

Worms, virusesFlooding

Backdoor Implants

Physical Destruction

Code ManipulationMalware

Source: 2008 AFSAB Study

Passive Defense Active Defense Mission Assurance

Page 12: Perspectives on Cyberspace Research  Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace

SensorData

SensorData (in)

IntelInfo (out)

IntelInfo

Intel InfoCmd Input

GndStation

Cmd Out(Gnd Cdr)

Control (in)Data (out)

Cmd Out(Air Cdr)

Control (out)Sensor (in)

Sensor(Out)

CoordAOC/ASOC

CoordAOC/ASOC

Coord

AOC-UAS Terrestrial

Sensors

RPA: Remotely Piloted AircraftAOC: Air Operations CenterASOC: Air Support Operations Center

Target

AOC Resiliency Study—C3 View

RPA Ctrl

AOC

ASOC

FusionCenter

Page 13: Perspectives on Cyberspace Research  Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace

AOC Resiliency Study—Ops View

RPA Ctrl ASOC

FusionCenter

GndStation

AOC

SensorData

Sensors

Intel Info

SensorData (in)

IntelInfo (out)

Control (out)Sensor (in)

Sensor(Out)

Coord

Control (in)Data (out)

AOC/ASOCCoord

AOC-UAS Terrestrial

Dotted lines denote operational connections

RPA: Remotely Piloted AircraftAOC: Air Operations CenterASOC: Air Support Operations Center

Target

Page 14: Perspectives on Cyberspace Research  Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace

Degraded Cyberspace

15

Observe

PhysicalSpace

Cognitive “Space”

Sensors DataIntegration

OpsIntegration

Effects(Integrated Actions)

KnowledgeOperations

LegacyOperations

Intelligence

Cyberspace Exploitation

Logistics

Cyber

Orient

DecideAct

Situational Awareness

Linked Ops CentersCyber-enabled Global Operations

Page 15: Perspectives on Cyberspace Research  Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace

Value Chain in a Cyber WorldOPPORTUNITIES• Shopper Dialogue• Information

Sharing• Synchronized

Production• Integrated

Logistics• Sustainability• Company Cyber

Culture

16

Consumer isa Partner

Quality isa commodity

OpenNetworkrules

ConsumerBehavior

Prod

uct

Flow

Information

Flow

FutureValueChain

GCI Initiative, 2008

Page 16: Perspectives on Cyberspace Research  Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace

Warfighter-Industry Collaboration

Military User

(Warfighter)WIC-E

RequirementDevelopers Programmers

AcquisitionCommunity

Capability Provider(Private Sector)

NormalProcess

“WIC-E”Process

Test &Evaluation

Page 17: Perspectives on Cyberspace Research  Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace

Multi-State CADC Relationships

LANOSC

ARNOSC

MSNOSC

TX NOSC

Cyber Assurance and Defense Network Center

ARGuard

LAGuard

MSGuard

TXGuard

Internet

AR Network LA Network MS Network TX Network

Page 18: Perspectives on Cyberspace Research  Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace

Operational & Strategic Leaders

Operational LeaderSupervise and

integrate technical skills with mission

Technical SkillsSuch as cyber Security, Info Assurance,

Software Assurance, Network Mgmt, Communications, Knowledge Management, Visualization …

StrategicLeader

Exploit Cyberspace

CurrentCyber WorkforceDevelopmentFocus

Cyber-enabledLeadershipDevelopmentShortfall

Page 19: Perspectives on Cyberspace Research  Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace

Facilitating Cyber Partnerships

NationalGuard

LawEnforcement

Cyber(& related)Industries

Dept of HomelandSecurity

CyberSecurity &DefenseCenter

CyberspaceInnovation

Center

AcademicCommunity

Assurance& SecurityEducation

DoD

Page 20: Perspectives on Cyberspace Research  Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace

Challenge: Cultural (R)evolution

Hierarchical Culture Cyber Culture

21

Hierarchy Level ---- Power ---- ConnectionsHierarchy Level ---- Value ----- Contribution

Future

Alternative Strategies are available: Can we “break” the cultural barrier?