Download presentation
Presentation is loading. Please wait.
Published byMervin McGee Modified over 9 years ago
1
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace
2
Right Now… Cyber Attack
3
Right Now… Cyber Theft
4
Right Now… Cyber Defense
5
Right Now… Cyber Offense
6
Right Now… Cyber Espionage
7
The Battle for Information Superiority is being fought in Cyberspace… Right Now! Right Now…
8
Cyberspace Defined The Air Force Cyber Mission Cyberspace Superiority The Airman’s Perspective Threats and Vulnerabilities Roles and Responsibilities of all Cyber Wingmen Guided DiscussionOverview
9
National Security Presidential Directive 54 “the interdependent network of information technology infrastructures, and includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries.” Cyberspace Defined
10
Department of Defense “A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.” Cyberspace Defined
11
Cyberspace Defined (global domain)
13
Cyberspace Defined Cyberspace Domain A man-made, interconnected operational realm characterized by use of the electromagnetic spectrum to manipulate information.
14
Cyberspace Defined Cyberspace Domain A man-made, interconnected operational realm characterized by use of the electromagnetic spectrum to manipulate information.
15
Cyberspace Defined Cyberspace Domain A man-made, interconnected operational realm characterized by use of the electromagnetic spectrum to manipulate information.
16
Cyberspace Defined Cyberspace Domain A man-made, interconnected operational realm characterized by use of the electromagnetic spectrum to manipulate information.
17
Cyberspace – Land – Air – Sea - Space
18
SPACECYBERSPACE AIR …but how do we accomplish that cyberspace part? The Air Force Mission
19
AF Cyber Mission 24 AF Mission “…to extend, operate and defend the Air Force portion of the Department of Defense network while providing the full spectrum of cyber capabilities for the joint war fighter”
20
Cyberspace Superiority Global Integrated ISR Personnel Recovery Nuclear Deterrence Operations Command and Control Global Precision Attack Building Partnerships Special Operations Air Superiority Rapid Global Mobility Agile Combat Support Space Superiority Cyberspace Superiority Global Integrated ISR Personnel Recovery Nuclear Deterrence Operations Command and Control Global Precision Attack Building Partnerships Special Operations Air Superiority Rapid Global Mobility Agile Combat Support Cyberspace Superiority Space Superiority Air Force Core Functions
21
Space Superiority Air Superiority Cyberspace Superiority Air Force Core Functions
22
The operational advantage in, through, and from cyberspace to conduct operations at a given time and in a given domain without prohibitive interference Cyber Superiority
23
Mission assurance = operational success AF Cyber Mission
24
Mission Assurance Example Range = 0.5 mile
25
Mission Assurance ? ? ? ? ?
26
Airman’s Perspective Airmen think of airpower & the application of force from a functional rather than geographical perspective. Airmen leverage speed, range, flexibility, precision, time, and lethality to create effects from and within all domains. Cyberspace operations are intrinsic to the conduct of modern airpower. Airmen conduct greatest percentage of global operations. Operations should be tightly integrated with capabilities of the air and space domains and should be commanded by an Airman who takes a broader view of war
27
Airman’s Perspective and Threats
28
Threats and Vulnerabilities Threat = Capability + Intent
29
Military Critical Technology Annual Report to Congress Countries Targeting The U.S. Number Reported Incidents FY10 FY 09 FY08 FY 2010 FY 2009 Information Systems 25 22 2163 47 Sensors & Lasers17 11 840 46 Electronics11 9 732 37 Armaments/ Energetic Material 12 10 944 26 Aeronautics12 10 936 Marine Systems6 4 232 24 Guidance / Navigation Technologies 8 4 226 15 Space Systems Technologies 6 5 322 19
30
Threat = Capability + IntentThreats
31
Vulnerability = Weakness Operating Systems Poor Practices Applications OperatorVulnerabilities
32
Did You Know… Social NetworkingSPAM USB ThumbdrivesCell Phones Wireless DevicesDiscussion
33
Nuclear Weapons Facility Locating Cyber Weapons
34
Where’s the Cyber Threat? Locating Cyber Weapons
35
What do you think you can do to prevent adverse impacts on DOD and AF networks? Where You Fit Into the Fight
36
Become a cyber defender. Don’t open attachments or click on links unless the email is digitally signed. Don’t connect any hardware or download any software, applications, music or information onto our network without approval. Encrypting sensitive but unclassified and/or mission critical information. Have a general understanding of the cyberspace domain as well as basic threats, vulnerabilities, and common countermeasures that any Airman can employ. Where You Fit Into the Fight
37
1.The United States is vulnerable to cyberspace attacks by relentless adversaries attempting to infiltrate our networks at work and at home – millions of times a day, 24/7. Ten Things a Cyber Wingman Should Know 2. Our enemies plant malicious code, worms, botnets, and hooks in common websites, software, and hardware such as thumb drives, printers, etc. 3. Once implanted, this code begins to distort, destroy, and manipulate information, or “phone” it home. Code allows our adversaries to obtain higher levels of credentials to access highly sensitive information. 4. The enemy attacks your computers at work and at home knowing you communicate with the Air Force network by email, or transfer information from one system to another. 5. As cyber wingmen, you have a critical role in defending your networks, your information, your security, your teammates, and your country. 6. You significantly decrease our enemies’ access to our networks, critical USAF information and even your personal identity by taking simple action. 7. Don’t open attachments or click on links unless the email is digitally signed or you can directly verify the source, even if it appears to be from someone you know. 8. Do not connect any hardware or download any software applications, music, or information onto our networks without approval. 9. Encrypt sensitive but unclassified and/or critical information. Ask your computer systems administrator (CSA) for more information. 10. Install the free Department of Defense anti-virus software on your home computer. Your CSA can provide you with your free copy.
39
Cyberspace Defined The Air Force Cyber Mission Cyberspace Superiority The Airman’s Perspective Threats and Vulnerabilities Roles and Responsibilities of all Cyber Wingmen Guided DiscussionSummary
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.