1 / 4

Secure Communications in the Cyber World

Secure Communications in the Cyber World. Phil Mar September 2010. Securing the Network Assets. Transforming Secure Communications to the Tactical Edge. Securing the Networks. Securing the Waveform. Securing the End-Points.

asasia
Télécharger la présentation

Secure Communications in the Cyber World

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure Communications in the Cyber World Phil Mar September 2010

  2. Securing the Network Assets Transforming Secure Communications to the Tactical Edge Securing the Networks Securing the Waveform Securing the End-Points The Adversary Attacks the Weakest Areas To Steal, Alter Your Data and Prohibit You From Communicating

  3. Security Enables Communications Securing the Waveform – Data In Transit Protection Securing the End Points – Data in At Rest Protection and Platform Integrity • The right encryption algorithms • Suite A and Suite B • Network Enabled Waveforms • HAIPE, IPMEIR • Secure Key Distribution • PKI, NSA KMI, H2H, Secret and Below Keying • Hard Disk Encryption • USB Encryption • Host-Based Security Systems • Mobile Device Integrity • Last-Mile DIT • WiFi, Cellular, WiMax Securing the Assets - Applying DIT, DIR and CND Everywhere Securing the Network – Cyber Defense Network • C4ISR of Cyber Space • Cyber Sensors • Early Warning Systems • Dynamics/Active Cyber Defense • Graceful Degradation • Operational Ability • Incident Response Team • Forensics • Network Repair under Attack • Space Networks • ISR Networks • Radio/Waveform Networks • Wireless Networks • Key Management Infrastructure • ….and everything connected to THE NETWORK with or without wires

  4. ViaSat Security Communications Portfolios Data In Transit Data in At Rest Protection and Platform Integrity 1 Gbps KG-255 100 Mbps KG-250 KG-201 KG-200 TRANSEC Module Laptop Embeddable PSIAM Crypto KG-250x Securing the Network – Cyber Defense Network Securing the Assets - Applying DIT, DIR & CND everywhere HAF-100x HAF-100 FAB-T Blue Force Tracking Dynamic Cyber Sensors Government SATCOM JTRS/Link 16 Secure Ad-hoc Networking

More Related