Download presentation
Presentation is loading. Please wait.
Published byElizabeth Hall Modified over 9 years ago
1
Secure Communications in the Cyber World Phil Mar September 2010
2
2 Transforming Secure Communications to the Tactical Edge Securing the Waveform Securing the End-Points Securing the Network Assets Securing the Networks The Adversary Attacks the Weakest Areas To Steal, Alter Your Data and Prohibit You From Communicating
3
3 Security Enables Communications Securing the Waveform – Data In Transit Protection The right encryption algorithms Suite A and Suite B Network Enabled Waveforms HAIPE, IPMEIR Secure Key Distribution PKI, NSA KMI, H2H, Secret and Below Keying Securing the End Points – Data in At Rest Protection and Platform Integrity Hard Disk Encryption USB Encryption Host-Based Security Systems Mobile Device Integrity Last-Mile DIT WiFi, Cellular, WiMax Securing the Network – Cyber Defense Network C4ISR of Cyber Space Cyber Sensors Early Warning Systems Dynamics/Active Cyber Defense Graceful Degradation Operational Ability Incident Response Team Forensics Network Repair under Attack Securing the Assets - Applying DIT, DIR and CND Everywhere Space Networks ISR Networks Radio/Waveform Networks Wireless Networks Key Management Infrastructure ….and everything connected to THE NETWORK with or without wires
4
4 ViaSat Security Communications Portfolios Data In TransitData in At Rest Protection and Platform Integrity Securing the Assets - Applying DIT, DIR & CND everywhere 100 Mbps KG-250 1 Gbps KG-255 PSIAM Crypto KG-200 KG-201 Laptop Embeddable KG-250x TRANSEC Module HAF-100 HAF-100x Dynamic Cyber Sensors FAB-T Blue Force Tracking JTRS/Link 16 Government SATCOM Secure Ad-hoc Networking Securing the Network – Cyber Defense Network
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.