Intelesis Technologies Corp., November 2009 Data Handling and Labeling M ulti- L evel S ecure vs. M ultiple S ecurity L evels The Joint Cross Domain eXchange.

Slides:



Advertisements
Similar presentations
Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
Advertisements

Accel Computerized Maintenance Management System.
Barry Y. Miller GEOG 596A: HLZ Capstone Project Proposal, 26 September 2012.
Founded in 1997, Intelesis is a veteran owned small business supporting the Office of the Secretary of Defense, the Navy, Air Force, Army, Coast Guard,
International CyberSecurity Collaboration: The Technical Cooperation Program Approved for public release; distribution is unlimited. 09 March 2010 Joshua.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Access Control Patterns Fatemeh Imani Mehr Amirkabir university of technology, Department of Computer Engineering & Information Technology.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
ISMT221 Information Systems Analysis and Design Project Management Tools Lab 1 Tony Tam.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System interfaces Updated: November 2014.
Do More In Less Time Will Schoen Microsoft Corporation April 12, 2011 Realize the future of government productivity with online and.
User Domain Policies.
Software Self-Testing
Tutorial 11: Connecting to External Data
© InLoox ® InLoox PM Web App product presentation The Online Project Software.
California Integrated Water Quality System (CIWQS) and Electronic Self Monitoring Reports (eSMR) Presentation to California Dischargers.
PROCAL MULTI DISCIPLINE CALIBRATION SOFTWARE CALIBRATION PROCEDURE MANAGEMENT CONFIGURATION & CUSTOMISATION STAND-ALONE CERTIFICATE PRINTING.
November 2011 At A Glance GREAT is a flexible & highly portable set of mission operations analysis tools that increases the operational value of ground.
PROJECT MANAGEMENT TRAINING FOR THE GCCS M SOFTWARE PROJECT XCELLENCE IN BUSINESS & ENGINEERING SOLUTIONS X FEDS, INC CAMINO DEL RIO NORTH, Suite SAN DIEGO,
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
TechNet Land Forces - South Connecting Joint & Coalition Partners for the Next Fight Brigadier General Michael Lee, USAF (Ret), Partner, National Security,
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
MS Access Advanced Instructor: Vicki Weidler Assistant:
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely John Deere presents:
BAB 2 BASIC OPERATING SYSTEM CONCEPT MANAGEMENT. User interface – –a program that controls a display for the user (usually on a computer monitor) and.
Tim Smith Program Manager Naval Networks
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 SAN Certificate in Unity Connection Presenter Name: Bhawna Goel.
Central Online Grading System COGS Dec15-21 dec1521.sd.ece.iastate.edu.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Framework for Automated Builds Natalia Ratnikova CHEP’03.
Office Live Workspace Visio 2007 Outlook 2007 Groove 2007 Access 2007 Excel 2007 Word 2007.
Configuring Encryption and Advanced Auditing
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Information Assurance Research Group 1 NSA Security-Enhanced Linux (SELinux) Grant M. Wagner Information Assurance.
Coalition Interoperability via Formatted Messaging
PowerPoint Lesson 10 Sharing and Delivering Presentations Microsoft Office 2010 Advanced Cable / Morrison 1.
© Copyright 2007 Arbinet-thexchange, Inc. All Rights Reserved. Voice Peering Steve Heap Chief Technology Officer.
Microsoft SharePoint Server 2010 for the Microsoft ASP.NET Developer Yaroslav Pentsarskyy
C# Tutorial -1 ASP.NET Web Application with Visual Studio 2005.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Eagle rock information systems 199 So Los Robles, Suite 860, Pasadena, CA USA Reporting made easy DataReady for web-based.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Developing Policy and Procedure Management System إعداد برنامج سياسات وإجراءات العمل 8 Safar February 2007 HERA GENERAL HOSPITAL.
Framework for MDO Studies Amitay Isaacs Center for Aerospace System Design and Engineering IIT Bombay.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
A Collaborative Framework for Scientific Data Analysis and Visualization Jaliya Ekanayake, Shrideep Pallickara, and Geoffrey Fox Department of Computer.
1 Technology in Action Chapter 11 Behind the Scenes: Databases and Information Systems Copyright © 2010 Pearson Education, Inc. Publishing as Prentice.
Requirements of an ITS/Simulation Interoperability Standard (I/SIS) Presented by:Dick Stottler Stottler Henke Associates, Inc.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
Trusted Operating Systems
The SELinux of First Look. Prologue After many discussions with a lot of Linux users, I’ve come to realize that most of them seem to disable SELinux rather.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
 ReadSoft 2004 Processing census forms.  ReadSoft 2004 ReadSoft Corporate Profile n Swedish company - founded1991 n Listed in Stockholm stock exchange.
The Hierarchical Trust Model. PGP Certificate Server details Fast, efficient key repository –LDAP, HTTP interfaces Secure remote administration –“Pending”
Lecture 3 Page 1 CS 236 Online Prolog to Lecture 3 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
As of W Oct 11 UNCLASSIFIED 1 Pacific Warfighting Center Training and Exercises Directorate USPACOM J73 5 October 2011.
Store and exchange data with colleagues and team Synchronize multiple versions of data Ensure automatic desktop synchronization of large files B2DROP is.
ILink Systems, Inc Feb, 2014 Government IT Solutions.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
Case Management System
Chapter 3: Windows7 Part 4.
InLoox PM Web App product presentation
Computer software 2.
Understanding Android Security
NSA Security-Enhanced Linux (SELinux)
Presentation transcript:

Intelesis Technologies Corp., November 2009 Data Handling and Labeling M ulti- L evel S ecure vs. M ultiple S ecurity L evels The Joint Cross Domain eXchange is a computing platform that can process information at multiple security levels and safely exchange information between them. It is an all-source data management, display, fusion, processing and near real-time dissemination system. Multi-Level Secure (MLS) Runs on Security-Enhanced Linux (SELinux) Role-based clearances support multiple access levels System capabilities not limited to tactical military networks Certified and operational Since 1998 While collaboration has typically required complex sanitization procedures (treating all information as though it originated from the highest level domain), JCDX provides a much more effective solution where collaboration can occur seamlessly between users in different security domains. When JCDX receives information, it is assigned a persistent sensitivity label and its classification is color coded. All files of the current sensitivity and below can be visually viewed from a working window. Data is only accessible if the user and the application are authorized for the level of the data. Users with different clearance levels can share data and view an operational picture in near real-time across multiple security domains while ensuring data dissemination is limited to each user’s clearance level. intelesis Joint Cross Domain eXchange JCDX Common Operational Picture (COP) viewed at two different levels of access TM External Data Inputs Manual Input/Edits Legacy Networks Legacy Networks Legacy Networks Level C Level B Level A Multi-Level Network Multilevel Labeled Databases and Processing Automated Validation And Labeling Human Validation And Label Selection AUDITAUDIT AUDITAUDIT

Unrivaled Security JCDX supports NATO and US security domains and has extensive automated dissemination controls. No other C4I system in the world does! JCDX is fielded in Unified Command Centers, Joint Intelligence Centers, and at the National Headquarters of our closest allies around the world: US Sites: Joint Forces Intelligence Center (JFIC), Virginia Joint Battle Center (JBC), Virginia Joint Intelligence Center Pacific (JICPAC), Hawaii USS Mount Whitney (LCC 20) United Kingdom Sites: Joint Analysis Center (JAC) Molesworth Permanent Joint Headquarters (PJHQ), Northwood Australia Sites: Australian Theater Joint Intelligence Center (ASTJIC), Sydney Japan Sites: Operational Intelligence Center (OIC), Funakoshi Korea Sites: Maritime Tactical Intelligence Center (MTIC), Chinhae Seven other sites throughout the country Detailed FeaturesOperational World-Wide intelesis Technologies JCDX is formally accredited for automated multilevel operations, protection-level 4 (PL4), at the Cat II and Cat III levels by DIA SYS-4 and SSONavy-521 (Service Certification Organization). Certified by DISA. Intelesis Technologies 9666 Business Park Ave., Suite 110 San Diego, CA Office: FAX: (858) (858) Automatically generates products for coalition forces: Narrative messages, formatted event by output broadcast Supported Message formats: USMTF, Gold, TRETAB, JMTF, Coastline, and others Integrated Radiant Mercury sanitizer/downgrader Integrated Gale Lite tools Provides supporting data (e.g., MIDB, NWTDB, StrikePLot, on-line Jane’s publications) MLS AMHS-JETS message profiling and high-speed text retrieval Multilevel track database supports over 10,000 tracks simultaneously intelesis Joint Cross Domain eXchange JCDX Labeling JCDX provides a mechanism to label all stored data and enforce Mandatory Access Control (MAC) policy based on these labels. Labels are applied and managed by the operating system (OS). Secure OS controls all file, data, and process access via the MAC policy. JCDX labeling policy mimics the way information is protected by real-world intelligence organizations. Security/sensitivity labels are applied to every process and every user on the system. Accreditations