40 likes | 476 Vues
Secure Communications in the Cyber World. Phil Mar September 2010. Securing the Network Assets. Transforming Secure Communications to the Tactical Edge. Securing the Networks. Securing the Waveform. Securing the End-Points.
E N D
Secure Communications in the Cyber World Phil Mar September 2010
Securing the Network Assets Transforming Secure Communications to the Tactical Edge Securing the Networks Securing the Waveform Securing the End-Points The Adversary Attacks the Weakest Areas To Steal, Alter Your Data and Prohibit You From Communicating
Security Enables Communications Securing the Waveform – Data In Transit Protection Securing the End Points – Data in At Rest Protection and Platform Integrity • The right encryption algorithms • Suite A and Suite B • Network Enabled Waveforms • HAIPE, IPMEIR • Secure Key Distribution • PKI, NSA KMI, H2H, Secret and Below Keying • Hard Disk Encryption • USB Encryption • Host-Based Security Systems • Mobile Device Integrity • Last-Mile DIT • WiFi, Cellular, WiMax Securing the Assets - Applying DIT, DIR and CND Everywhere Securing the Network – Cyber Defense Network • C4ISR of Cyber Space • Cyber Sensors • Early Warning Systems • Dynamics/Active Cyber Defense • Graceful Degradation • Operational Ability • Incident Response Team • Forensics • Network Repair under Attack • Space Networks • ISR Networks • Radio/Waveform Networks • Wireless Networks • Key Management Infrastructure • ….and everything connected to THE NETWORK with or without wires
ViaSat Security Communications Portfolios Data In Transit Data in At Rest Protection and Platform Integrity 1 Gbps KG-255 100 Mbps KG-250 KG-201 KG-200 TRANSEC Module Laptop Embeddable PSIAM Crypto KG-250x Securing the Network – Cyber Defense Network Securing the Assets - Applying DIT, DIR & CND everywhere HAF-100x HAF-100 FAB-T Blue Force Tracking Dynamic Cyber Sensors Government SATCOM JTRS/Link 16 Secure Ad-hoc Networking