Interoperability versus Cyber Security/Information Assurance?

Slides:



Advertisements
Similar presentations
1 Susan Alexander Chief Technology Officer for Information and Identity Assurance Office of the Assistant Secretary of Defense, Networks and Information.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Qusay H. Mahmoud CIS* CIS* Service-Oriented Computing Qusay H. Mahmoud, Ph.D.
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
Rejuvenated MiCOM P40 Double the practicality
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Chapter 12 Network Security.
GSC16-OBS-03 ITU-T GSC – 16 Observer Presentation Karen Higginbottom, JTC 1 Chair.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Integrated Information Technology (IT) & Information Assurance (IA)
Remedy, a BMC Software company Change Management Maximize Speed and Minimize Risk in the Change Process.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Network Techlab (India) Pvt. Ltd.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Data/Analysis Challenges in the Electronic Business Environment Dr. Howard Frank Dean Robert H. Smith School of Business University of Maryland College.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Chapter 6 of the Executive Guide manual Technology.
THE OSI REFERENCE MODEL Open Systems Interconnection (OSI) International Organization for Standardization( ISO)
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
Today’s Lecture Covers < Chapter 6 - IS Security
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
1 Networking Chapter Distributed Capabilities Communications architectures –Software that supports a group of networked computers Network operating.
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Information Security What is Information Security?
A Combat Support Agency Defense Information Systems Agency GIG EWSE IA and NetOps (EE213) 17 August 2011 UNCLASSIFIED Tactical Edge Service: NetOps and.
Page 1 Unclassified _NB_Next Steps.ppt Phillip E. Paulsen Space Communications Office NASA Glenn Research Center (GRC) Cleveland, Ohio 6 November.
App. TypeApp. Name Distributed or Parallel A parallel version of the Gaussian elimination application SAGE (SAIC's Adaptive Grid Eulerian hydrocode) Adaptive.
Network Centric Operations Industry Consortium The Intersection of Cloud Computing and Cyber Security Melvin Greer, NCOIC Vice Chair, Cloud Computing Working.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Network Management Unit 4 Course Name – IT Network Management Instructor – Jan McDanolds, MS,
Copyright © 2009 Trusted Computing Group An Introduction to Federated TNC Josh Howlett, JANET(UK) 11 June, 2009.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
Information Security KRISHNAKUMAR RAGHAVAN (KK) NASWA's Information Technology Support Center 1.
Information Security, Theory and Practice.
Trust-based Service Composition and Binding with Multiple Objective Optimization in Service- Oriented Mobile Ad Hoc Networks Yating Wang†, Ing-Ray Chen†,
Defense Information Systems Agency A Combat Support Agency
TeleManagement Forum The voice of the OSS/BSS industry.
ISO/IEC Joint Technical Committee 1 ISO/IEC JTC 1
Evaluation Forms for Blockchain- Based System ver. 1.0
e-Health Platform End 2 End encryption
Introduction to Information Security
Module 8: Securing Network Traffic by Using IPSec and Certificates
Load Weighting and Priority
QOS Requirements for Real-Time Services over IP
Dugki Min Konkuk University
Information Security: Risk Management or Business Enablement?
Data collection with Internet
Overlay Networking Overview.
ISO/IEC Joint Technical Committee 1 ISO/IEC JTC 1
Data/Analysis Challenges in the Electronic Business Environment
Data/Analysis Challenges in the Electronic Business Environment
Quality of Service For Mobile IP.
VPN: Virtual Private Network
CVE.
Module 8: Securing Network Traffic by Using IPSec and Certificates
Identity and Trust Management Platform in DICOM
Data collection with Internet
Configuration management
Shibboleth 2.0 IdP Training: Introduction
Security in SDR & cognitive radio
Walter Legrand CTO office
Data collection with Internet
Data collection with Internet
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Interoperability versus Cyber Security/Information Assurance? Mr. Jack Zavin Advisor Council Member, NCOIC Member Executive Representative, & Vice Chair Net Centric Attributes Functional Team 11 June 2010 Approved for Public Release Distribution Unlimited NCOIC-DefDailyCyber-JZ20100611rev1

Net Centric Environment (NCE): Objective, Goals & Description Objective: All users, whether known or unanticipated, are able to easily discover, access, trust, and use the data/information that supports their business/mission objectives unconstrained by their location or time of day. Goals: Evolve & Populate the NCE Protect & Defend the NCE Manage & Operate the NCE The NCE is implemented with evolving balanced & synchronized sets of Process, Organization, People, Information & Materiel (POPIM) Solutions. Interoperability whether in an NCE or not is more than just the technical exchange of information rather it is composed of evolvable POPIM Solutions Sets. Interoperability must be synergized with Information Assurance to assure obtaining the best of both.

Net Centric Environment: Functional Performers Managers/Operators** IA* IA Information Services Providers IA IA Computing Resource Providers Users/Consumers** Info Producers/publishers** IA Information Transport Providers IA Behavior and relationship characteristics include: Quality of Service; Quality of Protection; Addressing; Tagging of content & roles/Identities; Information Forms include voice, video, images, text, graphics…. * IA = Information Assurance – protecting & defending the information and information technology. ** Includes Software Applications whether hosted locally or by a computing resource provider.

Interoperability Model: A composite of Materiel & Non-materiel solutions Layers of Interoperability Data/Object Model Interoperability Network Interoperability Physical Interoperability Information Interoperability Knowledge/Awareness Aligned Procedures Aligned Operations Harmonized Strategy/Doctrines Mission/Business Objectives IA Non-Materiel Solutions Process, Organization, People Materiel Solutions Data, Information, Knowledge Information Transport

Interoperability Model & End to End Quality of Service (QoS) Layers of Interoperability Data/Object Model Interoperability Network Interoperability Physical Interoperability Information Interoperability Knowledge/Awareness Aligned Procedures Aligned Operations Harmonized Strategy/Doctrines Mission/Business Objectives IA Organizational Drivers Quality of Operation Services (QoOS) Quality of Information Services (QoIS) Technical Drivers Quality of Transport Services (QoTS)

End-to-End Quality of Service Q u a l i t y o f O p e r a t i o n Services Quality of Transport Services End-to-End Quality of Service + = Quality of Information Services Key Needs: Network interoperability Physical interoperability Key Metrics: Urgency: Transport lag or delay, jitter, packet loss, packet errors Priority: Class of service, differentiated service, precedence, preemption, guaranteed service Information Assurance: Data Trust: Availability, Connectivity (fixed, mobile) Security: encryption, intrusion detection, authentication, authorization, access control Key Metrics: Urgency: Timeliness Priority: Degree of cooperation Information Assurance (IA) Fluidity of response Clarity of understanding Ubiquity or extent of influence Accuracy Key Needs: Mission or business objectives Harmonized strategy or doctrines Aligned operations Aligned procedures Knowledge/awareness of actions by people and processes Key Needs: Discoverability & availability Transport interoperability Data/object model interoperability Key Metrics: Urgency: Data/topic latency, service response time, application timeliness Priority: Precedence of user requests, data, and services Information Assurance (IA) Data Trust: integrity & availability, fault tolerance, accessibility Security: data confidentiality, authentication, non-repudiation

The unique values of NCOIC NCOIC is the only organization dedicated to net centric operations. NCOIC provides vendor neutral products & services. NCOIC provides multinational dialog. NCOIC provides a multi-discipline cadre of experts.

Net-Enabled Future Stovepiped Systems, Point-to-Point Networks