Defence Research and Development Canada Recherche et développement pour la défense Canada Canada Social Cyber Networks Joanne Treurniet 18 October 2005.

Slides:



Advertisements
Similar presentations
Marc Grégoire, DRDC Ottawa Luc Beaudoin, Bologik Inc.
Advertisements

On Leadership Dana C. Rooks Dean of Libraries. Why be a Leader? A positive force Vital to success of any group Needed at all levels in all organizations.
Jeff Hart M2 Technology IT Situational Awareness 2.
Defence R&D Canada R et D pour la défense Canada Dynamic VPN Controller Developed by NRNS Inc. July 2, 2003.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
CPT Aneta COUFALÍKOVÁ, Ph.D. CIRC Centre, 34.zKIS, Czech Army CIRC.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Cyber Principles November 2010 Bob Gourley. The 12 Principles of Cyber Conflict 1. Know the enemy: Bad actors in the world are bad actors in cyberspace.
James Sees Senior Network Administrator Management Analyst Cyber Protection Strategies White Hall Business Association - Cyber Security & Awareness Conference.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
© 2003 IBM Corporation Privacy 12 th CACR Workshop Yim Y. Chan Chief Privacy Officer & CIO IBM Canada Ltd. w3.ibm.com/Privacy.
Defence Research and Development Canada Recherche et développement pour la défense Canada Canada Discussion Paper: Can PCT Be applied to Organization Information.
Defence Research and Development Canada Recherche et développement pour la défense Canada Canada Command Approach Keith Stewart.
Multilevel Security in Location Aware Applications Alexander Ng Monash University Masters of Computing (Research) Supervisor: A/P Arkady Zaslavsky.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Direcção - Geral do Desenvolvimento RegionalWorking Group Meeting in Brussels Maria Eduarda Lopes, /23 PORTUGAL COMMUNITY SUPPORT FRAMEWORK.
MEASURING KNOWLEDGE AND ITS ECONOMIC EFFECTS THE ROLE OF OFFICIAL STATISTICS Fred Gault Statistics Canada Advancing Knowledge and the Knowledge Economy.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Defence Research and Development Canada Recherche et développement pour la défense Canada Canada Insurgency in Afghanistan in the Regional Strategic Context.
Networking, Hardware Issues, SQL Server and Terminal Services Session VII.
1 NTC/TCS Training Dallas 2010 TWO Set-ups Wired and Wireless.
CybAIRVision® Next generation of Cyber-attacks : “Air Operations cyber intrusion detection”
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
Client-Server & Peer-to-Peer Networks
©G. Millbery 2001Communications and Networked SystemsSlide 1 Purpose of Network Components  Switches A device that controls routing and operation of a.
16 October 2007 Focus and Convergence Challenges for Complexity Science List of Candidate Topics Focus and Convergence Challenges for Complexity Sciences.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Michael Miller, CISSP Chief Marketing Officer Renesys Corporation.
Defence Research and Development Canada Recherche et développement pour la défense Canada Canada Utilisation of Soft Operational Research Methods within.
Rakovski National Defence Academy Defence Advanced Research Institute Human Dimension of Science and Technology Cooperation in NATO – Bulgarian Viewpoint.
Computers Are Your Future Eleventh Edition
Spatial Information Retrieval. Spatial Data Mining + Knowledge Discovery Used for mining data in spatial databases with huge amounts of data Spatial data.
Defence Research and Development Canada Recherche et développement pour la défense Canada Canada Multinational Experiment 4 on Effects Based Approach to.
Defence Research and Development Canada Recherche et développement pour la défense Canada Canada QUANTITATIVE MODELS FOR PERFORMANCE AND COST OF COMMAND,
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
Systems and Network Design Professional Services for NT Server and NetWare Networks.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
International Cyber Warfare & Security and B2B Conference Participation of Brazilian Cyber Defense Centre ( )
Communications & Networks National 4 & 5 Computing Science.
Communications & Networks National 4 & 5 Computing Science.
Defence R&D Canada R et D pour la défense Canada Dynamic VPN Controller Update Developed by NRNS Inc. November 12, 2003.
PnP Networks Self-Aware Networks Self-Aware Networks Self-Healing and Self-Defense via Aware and Vigilant Networks PnP Networks, Inc. August, 2002.
The Tech that supports the Net Net Tech for CBIS.
Professor Peeter Lorents, CCD COE Chief of the R&D Branch
Joint Forces Command Capability. DSF DG JFD DefAc CDICDIO Future Joint Operations Optimising Special Forces Developing a Transformational Proposition.
Introduction to Networking. What is a Network? Discuss in groups.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Slide 1 February 28 th, 2011 Canadian Interoperability Technology Interest Group NPSTC Update.
Basics of Networking & Internet Services Prof. Sadique Khan.
A BRIEF HISTORY OF THE INTERNET, WEB, AND HTML. Internet vs. World Wide Web What is The Internet? The Internet is a massive network of networks, a networking.
The Internet Created by Miss. Jurgensen LS Technology.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Information Technology
Client1 Client2 Client3 Client4 My network setup Server Pix Des
Implementing and Auditing the Critical Controls
An Urgent National Imperative
Four Generations of Security Devices Putting IDS in Context
TWO Set-ups Wired and Wireless.
Chief, ARSTAF Cyberspace Task Force
Name : __Sajid Ali VU-ID :__ DS
Implementing Client Security on Windows 2000 and Windows XP Level 150
Protocols 2 Key Revision Points.
Credentials Name: Matthew Robson
Introduction to IBM Maintenance Solutions for Network Products
Client/Server and Peer to Peer
World-Leading Research with Real-World Impact!
Thames Valley Chamber / Claire Logic
Presentation transcript:

Defence Research and Development Canada Recherche et développement pour la défense Canada Canada Social Cyber Networks Joanne Treurniet 18 October 2005

Defence R&D Canada R & D pour la défense Canada Context CF Network Operations Centre requires dynamic situational awareness of the state of the network –Security –Availability –Current activities and future plans Goal: to improve computer network defence (CND) on Canadian Forces (CF) networks.

Defence R&D Canada R & D pour la défense Canada Operational Impact Effective decision-making requires knowledge of operations and how they depend on the resources on the network: –Hardware –Software –Services –Information Allows prioritization of alerts based on operational impact

Defence R&D Canada R & D pour la défense Canada Visualisation in CND Concurrent visualisation of: –the physical and logical state of the network –network security events –network defensive posture –the dependence of military operations on the network Each view provides information at different levels of detail as required by a network manager, an analyst or a commander.

Defence R&D Canada R & D pour la défense Canada The Physical/Geospatial View (GIS)

Defence R&D Canada R & D pour la défense Canada Structural View (Visio, Graph Theory) Internet

Defence R&D Canada R & D pour la défense Canada Dependency Example: Encrypted Mail Internet client: sender client: receiver Certificate server Mail Server

Defence R&D Canada R & D pour la défense Canada Parallels between Social Networks and Cyber Networks Dependencies and relationships Conversations/Eavesdropping Trust relationships –“I trust that you will give me correct information” –“I trust that you are who you say you are”

Defence R&D Canada R & D pour la défense Canada Parallels between Social Networks and Cyber Networks On cyber networks, the structural and social views have to be linked to fully understand the impact of a network event on operations: –If a router goes down, if affects services A, B and C required by missions X, Y and Z In a similar social context: –If person A is removed from the social network, and they are the only link to person B, person B becomes unreachable

Defence R&D Canada R & D pour la défense Canada Differences between Social Networks and Computer Networks Humans can adapt to change and computers cannot… yet

Defence R&D Canada R & D pour la défense Canada Discuss…

Defence R&D Canada R & D pour la défense Canada Defence R&D Canada provides Science and Technology leadership in the advancement and maintenance of Canada’s defence capabilities.