1 / 6

Davy M. Belk, PhD, SES Director, Information Directorate Air Force Research Laboratory

Meeting the Cyber Needs. Davy M. Belk, PhD, SES Director, Information Directorate Air Force Research Laboratory. Information Directorate Core Technical Competency Portfolio. RI Programs are organized and planned by CTC. Action Knowledge Information Data Sensing. Domains

jason
Télécharger la présentation

Davy M. Belk, PhD, SES Director, Information Directorate Air Force Research Laboratory

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Meeting the Cyber Needs Davy M. Belk, PhD, SES Director, Information Directorate Air Force Research Laboratory

  2. Information Directorate Core Technical Competency Portfolio RI Programs are organized and planned by CTC Action Knowledge Information Data Sensing Domains Air • Cyberspace • Space Command and Control Information Fusion & Understanding CyberOperations Information Management Information Exploitation Connectivity Advanced Computing Architectures Our seven core technical competencies… Command and Control, Information Management, Information Exploitation, Cyber Operations, Information Fusion & Understanding, Connectivity, and Advanced Computing Architectures provide technologies to translate sensed data to actionable knowledge.

  3. AFRL’s Information DirectorateMission-Based Cyber Defense • Analyze, understand, defeat, and recover from unavoidable attacks • Provide continuity of operations from mission-to-mission • Assure long-term objectives DEFEAT AVOID SURVIVE • Avoid most attacks • Ability to fight through unavoidable attacks and bugs in “mission time” • Assure mission essential functions (MEF) RECOVER

  4. Acquisition Approach Centrally Managed Architecture Emerging Technical Capability Capability Response to Urgent Needs t Cyber Agile Acq Construct User Priorities User Priorities User Priorities Baseline 0 (~12 mo cycle) Baseline 1 (~12 mo cycle) Baseline 2 (~12 mo cycle) RT Capability #1 Rapid Capability #2 RT Capability #3 RT Capability #4 Rapid Capability #5 Rapid Capability #6 RT Config Mgt Rapid Incorporate RTC #1 Incorporate RC #2 Stand up initial capability Incorporate RTC #3 Incorporate RTC #4 Foundational

  5. System Interdependency “Tip of the Spear” Number of Units 10^1 10^3 10^4 10^6 Variable quantities Variable configurations Embedded Custom App/Sys Small quantity Unique configurations C2 Strat Space TST Log Moderate quantity Industry Std configurations Custom COTS E-mail Router Server Firewall Large quantity Single configuration COTS AF/SDC & NIST/FDCC

More Related