Se ha denunciado esta presentación.
Se está descargando tu SlideShare. ×

General Elder- Homeland Security Presentation

Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Cargando en…3
×

Eche un vistazo a continuación

1 de 13 Anuncio

Más Contenido Relacionado

Presentaciones para usted (20)

Anuncio

Similares a General Elder- Homeland Security Presentation (20)

Anuncio

Más reciente (20)

General Elder- Homeland Security Presentation

  1. 1. Louisiana-basedPublic-Private Partnershipsin Support ofState, Local, and Federal Government<br />Lt General Bob Elder, USAF (Retired)<br />Louisiana Homeland Defense Forum<br />15 April 2010<br />
  2. 2. Overview<br />Cyber Security<br />Cyber Assurance and Defense<br />Government-Industry Collaboration<br />WorkforceDevelopment<br />Facilitating Cyber Networking<br />
  3. 3. Full Spectrum Cyber Defense<br />Cyberspace Typology<br /><ul><li>Private/Open
  4. 4. Commercial
  5. 5. Regulated Commercial
  6. 6. Government (.gov)
  7. 7. Military (Admin)
  8. 8. Military (Ops)
  9. 9. Economic Security
  10. 10. Public Safety
  11. 11. WMD/E Defense/I&W</li></ul>Other US<br />Cyberspace<br />(includes DIB)<br />&<br />Associated<br />Cyber<br />Infrastructure<br />CADC FOCUS<br />Global Information Gridand DOD Networks<br />State & Local Gov’t Cyberspace<br />US GovernmentCyberspace<br />
  12. 12. Information Protection<br />Influence Attack<br />ElectromagneticSpectrumAttack<br />Cyber<br />Attack<br />InfluenceProtection<br />ElectronicProtection<br />Data/CodeProtection<br />Force Protection<br />Physical Attack<br />(includes Directed Energy)<br />Logical<br />Networks<br />Wireless<br />Networks<br />Digital Data & Code<br />Electromagnetic Spectrum<br />Social Networks<br />CND-RA<br />Cyber Use<br />Electronics (& Infrastructure)<br />Law<br />Enforcement<br />Effects of Attacks:<br /><ul><li> Denial of Service
  13. 13. Confidential Data Loss
  14. 14. Data Manipulation
  15. 15. System Integrity Loss</li></ul>Physical<br />Networks<br />
  16. 16. Proactive Defense & Mission Assurance<br />ATTACKS<br />TARGETS<br />EFFECTS<br />Insider Attacks;<br />Social engineering<br />Disinformation<br />Confusion<br />C2 Disruption<br />Alter Behaviors<br />Human Organization<br />Mission Layer<br />Data and policy<br />Corruption<br />Code Manipulation<br />Malware<br />Inaccuracies<br />Induced Failures<br />Denial of Service<br />Data Exfiltration<br />App/Session Layer<br />Attacker Focus<br />Operator Focus<br />Worms, viruses<br />Flooding<br />OS/Network Layer<br />Backdoor Implants<br />Malfunctions<br />Performance loss<br />Lost Comms<br />HW/Systems Layer<br />Devices & Linkages<br />Physical Destruction<br />Proactive Defense<br />NetworkSecurity<br />Mission Assurance<br />Intelligence & Attack Response<br />Source: 2008 AFSAB Study<br />
  17. 17. Multi-State CADC Relationships<br />Internet<br />AR<br />Guard<br />LA<br />Guard<br />MS<br />Guard<br />TX<br />Guard<br />LA<br />NOSC<br />AR<br />NOSC<br />MS<br />NOSC<br />TX <br />NOSC<br />AR Network<br />LA Network<br />MS Network<br />TX Network<br />Cyber Assurance and Defense Network Center<br />
  18. 18. Government-Industry Collaboration<br />DoD: Warfighter-Industry Collaboration Environment (WIC-E)<br />Requirement<br />Developers<br />Programmers<br />WIC-E<br />Government User<br />(Warfighter)<br />Acquisition<br />Community<br />“WIC-E”<br />Process<br />Test &Evaluation<br />Capability Provider<br />(Private Sector)<br />Normal<br />Process<br />
  19. 19. Workforce Development<br />Partners<br />LSUS<br />LA Tech<br />BPCC<br />NSU<br />Support<br />NSF<br />DoEd<br />NASA<br />DHS<br />NSA<br />StrategicLeader<br />Exploit Cyberspace<br />Operational LeaderSupervise and integratetechnical skills with mission(Mission Assurance)<br />Technical LeaderAreas such as Cyber Security, Info Assurance,Software Assurance, Network Mgmt,Communications, Knowledge Mgmt, Visualization …<br />
  20. 20. CIC Technical Curricula<br /><ul><li>Cyber Science –18 week course offered to 9th & 10th graders
  21. 21. Cyber Security – provides a basic understanding of computer hardware, software, networks, and encryption
  22. 22. Computer Science – curriculum provides students with a basic understanding of computer science, engineering and mathematical concepts as a strong foundation (Web Design & Computer Programming) to further their studies
  23. 23. Digital Media - curriculum provides students with a basic understanding of digital media, animation, visual effects, and interactive command and control environments
  24. 24. Information Assurance/Digital Forensics –Provides basic understanding of computer hardware, data storage and collection, network intrusion, and data degradation</li></ul>PROPRIETARY INFORMATION:Copyright ©2010 by the Cyber Innovation Center<br />
  25. 25. CIC Academic Pathways<br />Animation and Visual Effects Articulation<br />HS Cyber Courses  BPCC Telecommunications LSUS<br />Digital Forensics Articulation<br />HS Cyber Courses  BPCC CIT Div  NSU (Criminal Justice)<br />Computer Science Articulation<br />HS Cyber Courses  BPCC CIT Div  La Tech (Comp-Sci)<br />Associate of Engineering Articulation<br />HS Cyber Courses  BPCC CIT Div (with LA Tech support)<br />Cyber Security Articulation<br />HS Cyber Courses  BPCC CIT Div La Tech Cyber Academy<br />Articulations in Work<br />Energy, Bio-medical, Software Assurance, E-Business<br />PROPRIETARY INFORMATION:Copyright ©2010 by the Cyber Innovation Center<br />
  26. 26. CIC Public-Private Collaboration<br /><ul><li>Awareness Programs
  27. 27. Cyber Day Workshops (K-8)
  28. 28. Cyber Awareness Presentations (9-12)
  29. 29. Outreach to School Boards, Administrators, & Teachers (K-12)
  30. 30. Academic Outreach Program
  31. 31. Professional Development Workshops
  32. 32. Industry Certification Programs
  33. 33. High School Digital Forensics Laboratories
  34. 34. Summer Cyber Camps
  35. 35. Local, Regional, and National Cyber Competitions
  36. 36. Workforce Development Partnerships
  37. 37. Industry: CISCO Academy (Bossier Career & Technical HS), Warfighter-Industry Collaboration Exercises (WIC-E)
  38. 38. Government: Cyber Assurance & Security Education (DHS); NSA, WIC-E (AF), Electronic Systems Command (AF)
  39. 39. Universities and Colleges: LA Tech, BPCC, LSUS, NSU</li></ul>PROPRIETARY INFORMATION:Copyright ©2010 by the Cyber Innovation Center<br />
  40. 40. Facilitating LA Cyber Partnerships<br />Cyber<br />Assurance &<br />Defense<br />Center<br />National<br />Guard<br />Dept of <br />Homeland<br />Security<br />Cyberspace<br />Innovation<br />Center<br />Law<br />Enforcement<br />DoD<br />Cyber<br />(& related)<br />Industries<br />Assurance<br />& SecurityResearch<br />Academic<br />Community<br />
  41. 41. Summary<br />Cyber Security<br />Cyber Assurance and Defense<br />Government-Industry Collaboration<br />WorkforceDevelopment<br />Facilitating Cyber Networking<br />
  42. 42.
  43. 43. Cyberspace Business Areas<br />Cyber Ops<br />Establish the Domain<br />Form Cyber Networks<br />Secure Cyber Networks<br />Defend the Domain<br />Passive Defense<br />Active Defense<br />Use the Domain<br />Business Augmentation<br />Internet Business<br />Participatory Services<br />COMMERCE<br />Cyberspace importance is increasing <br />

Notas del editor

  • Shared Situational Awareness (As States Allow)Enhanced Anomalous Behavior DetectionDoD Attack Vector Support (through Guard)Multi-state Cyber Resiliency OpportunitiesLarge-scale Enterprise Network OperationsActive Defense Tools Research Focused On State NeedsCyber Assurance Research And SupportCyber Workforce Education And Training ProgramsCyber Assurance And Defense AdvocacyCyber Defense Collaboration
  • NSU-Northwestern State
  • Mission: The mission of the Cyber Innovation Center&apos;s academic outreach program is to build a sustainable knowledge-based workforce that can support the needs of government, industry and academia.Focus on Teachers – To ensure Organic &amp; Sustainable Growth

×