Panel Discussion: C4I Solutions for Combating

Slides:



Advertisements
Similar presentations
Thai delegation Presentation at 4 th ARF seminar on Cyber-terrorism
Advertisements

Marc Grégoire, DRDC Ottawa Luc Beaudoin, Bologik Inc.
The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
Sensors and location technologies – the front end of ISR
Introduction to Information Operations Attaché Corps- SEP 09
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
The U.S. Coast Guard’s Role in Cybersecurity
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
624 OC Perspective: Directing Cyber Operations
Cambridge International Systems, Inc Clarendon Boulevard, Suite 705 Arlington, Virginia USA +1 (571) Cambridge.
© BT PLC 2005 ‘Risk-based’ Approach to Managing Infrastructure a ‘Commercial Prospective’ Malcolm Page BT UK AFCEA Lisbon 2005.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Threat Modeling for Cloud Computing (some slides are borrowed from Dr. Ragib Hasan) Keke Chen 1.
CIS 2200 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.
Cyber vs Legislation and Ethics Colonel John Doody Panel Chair.
Presentation title SUB TITLE HERE Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Dr. Emmanuel Hooper, PhD, PhD,
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
INFORMATION WARFARE. What is Information Warfare? “All actions taken to defend the military’s information-based processes, information systems and communications.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
Cyber Terrorism Shawn Carpenter Computer Security Analyst
FLTC Perspective Focused Long Term Challenges (FLTCs) are an innovative approach to match user requirements with relevant technology development, while.
23 July 2003 PM-ITTS TSMOTSMO Information Assessment Test Tool (IATT) for IO/IW Briefing by: Darrell L Quarles Program Director U.S. Army Threat Systems.
BAE Systems Small Business Program
IS3220 Information Technology Infrastructure Security
Coast Guard Cyber Command
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Surveillance and Security Systems Cyber Security Integration.
Securing Information Systems
Proactive Incident Response
Network security Vlasov Illia
Securing Information Systems
Threat Modeling for Cloud Computing
Computer Security Incidents
Network Security Basics: Malware and Attacks
PLACEHOLDER SLIDE ON SIPR!
Real-time protection for web sites and web apps against ATTACKS
Cyber Security: State of the Nation
Cyber Resilient Energy Delivery Consortium
Rules of Thumb to Mathematical Rule- A Cyber Security Journey
Securing Information Systems
Cyber defense management
Air Defence Anti Tank System
Information Security CIS 9002 Kannan Mohan Department of CIS
Force Packaging.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 21 March 2018.
Electronic Warfare.
Strategic Partnerships to Increase Student and Faculty Opportunities
Home Internet Vulnerabilities
Four Generations of Security Devices Putting IDS in Context
Chapter 4: Protecting the Organization
Computer Security Incidents
Security Management Platform
Enhanced alerting and collaborative incident management
Networking for Home and Small Businesses – Chapter 8
Confronting Cyber Threats: Cybersecurity from the FBI’s Perspective
Threatcasting Jon Brickey, Ph.D..
THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
DDR&E Advanced Capabilities Overview
Presentation transcript:

Panel Discussion: C4I Solutions for Combating Cyber-Terrorism and Managing Crisis Lieutenant Colonel Dr. Esa Alotaibi Director of Communications and Networks Security Department, Air Defence Forces, Ministry of Defence, KSA

outlines Concept of C4I System Today’s C4I Battle Fields Battlefield Capacity Perspective C4I Challenges & Threats Addressing the Cyber Threats Case Study Top 10 Cyber Security Threat of Future Managing Solutions for Combating Cyber for the Future Cyber Security Market Trends

Concept of C4I System

Today’s C4I Battle Fields Space: Transformational Communications Terrestrial: GIG / Enterprise Service Airborne: Airborne Networking Maritime: Network Centric Warfare

Battlefield Capacity Perspective Group Services by Type (or mission) Surveillance Communications Tactical In operations of any nature its essential to ascertain impact of cyber attack by capability

C4I challenges and threats Monitoring Perspective Computer virus will be introduced via radio channels and laser communication links Jamming Accomplishing Electronic Warfare by jamming enemy communications Corrupting Spoofing Deceiving Introduce computer viruses by agents, over communications channels, or other means Saturate enemy information networks with false commands and reports, misleading him and corrupting his C2 system Deception by imitating the operation of enemy communication and by changing radio traffic volumes Penetrating classified and unclassified info networks and channels to transmit false info Target Destroying Directed beam electromagnetic pulse will become a new means of warfare against C4I and intelligence systems by 2010-2020

Addressing the Cyber Threats Internal: - Overrun Scenarios - Denial Of Service - Deception and False Reporting - Data Exposure External: Monitoring Direction Finding Jamming (EW) Tactical Deception Threat Mitigate Countered By: LPI/LPD technologies Encryption Access Control LPI/LPD : (Low Probability of Intercept/Low Probability of Detection)

Case Study: Cyber Security Threats during Olympic Game 2012

Top 10 Cyber Security Threats of Future Phishing attacks negligent insider apt attacks cyber attacks zero day attacks Malicious insider social engineering DoS attacks brute force attacks

Managing Solutions for Combating of Cyber for the Future Attack Mounted System Intrusion Attacker Reconnaissance Damage Inflicted Access Probe Cover-Up Target Analysis = Attacker events = Defender events Forecast Physical Security Intrusion Detection System Reaction Recovery Defender Reconnaissance Entry Control Impact Analysis Response Threat Analysis Time Fortification Scan Jam Orientate Or Map Traffic Monitor Spoof Direction Find Capture Damage Assessment Education / Awareness / R&D / Testing / Deployment

Cyber Security Market Trends Cloud Security End Point Security Insider Threat Management Internet of Things IoT Managed Services