Your SlideShare is downloading. ×
0
Securing Cyberspace : A Military Perspective, by Arif Shouqi
Securing Cyberspace : A Military Perspective, by Arif Shouqi
Securing Cyberspace : A Military Perspective, by Arif Shouqi
Securing Cyberspace : A Military Perspective, by Arif Shouqi
Securing Cyberspace : A Military Perspective, by Arif Shouqi
Securing Cyberspace : A Military Perspective, by Arif Shouqi
Securing Cyberspace : A Military Perspective, by Arif Shouqi
Securing Cyberspace : A Military Perspective, by Arif Shouqi
Securing Cyberspace : A Military Perspective, by Arif Shouqi
Securing Cyberspace : A Military Perspective, by Arif Shouqi
Securing Cyberspace : A Military Perspective, by Arif Shouqi
Securing Cyberspace : A Military Perspective, by Arif Shouqi
Securing Cyberspace : A Military Perspective, by Arif Shouqi
Securing Cyberspace : A Military Perspective, by Arif Shouqi
Securing Cyberspace : A Military Perspective, by Arif Shouqi
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Securing Cyberspace : A Military Perspective, by Arif Shouqi

1,447

Published on

C4I2 Summit was a two day exclusive event organized from October 18-19, 2011 at the Manekshaw Convention Center in New Delhi with the sole objective of enhancing the defense capabilities of the Indian …

C4I2 Summit was a two day exclusive event organized from October 18-19, 2011 at the Manekshaw Convention Center in New Delhi with the sole objective of enhancing the defense capabilities of the Indian Armed Forces. By bringing together decision makers from the Indian Army, Navy, Air Force and HQ IDS with senior representatives from the Industry, the Summit served as a platform to enable discussion of the advancements and requirements for Network-Centric technologies within the Defense Forces. It also provided the perfect stage for the Industry to showcase its CSI4 capabilities and offerings for the Armed Forces.
As one of the leaders in the Network solutions space and a key player in the Indian Defense Forces, Cisco participated in this high level event by nominating senior speakers for the conference and by manning a stall in the exhibition area.
Col. (Retd) KPM Das, Vice President, Cisco shared his thoughts and insights on Net-Centric Operations In C4i2: Strategic to the Tactical Level on 18th October while Mr Arif Shouqi, Chief Defense Architect- Asia Pacific, Cisco Systems participated in a high level discussion on Policy And Conduct Of Cyber Security Operations/Joint Services Perspective on 19th October

Published in: Technology, Education
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,447
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
48
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Securing Cyberspace : AMilitary PerspectiveSqn Ldr Arif Shouqi (Retd)National Security and Defense© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1
  • 2. “Just as in the 19th century we had to secure the seas for our national safety and prosperity, and in the 20th century we had to secure the air, in the 21st century we also have to secure our advantage in cyber space”© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
  • 3. • Basic definitions and principles of cyber security• Vulnerabilities and examples• Sample study (Tactical Communication Systems)• Conclusion • Things to keep in mind when designing/choosing products and technology© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
  • 4. Risk = Vulnerability x Probability x Impact© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
  • 5. • Availability • Confidentiality • Integrity • Authentication & Access Control • Non-repudiation© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
  • 6. H U M A N S© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
  • 7. 25 Years old, eastern European looking lady MIT Graduate Cyber Threat Analyst with the Naval Warfare College 10 years of work experience Address of Blackwater, the infamous US contractor* Data from US Secret Service© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
  • 8. • 300 Linkedin/FB connections in 1 month • Senior officers in Joint Chiefs of Staff • CIO of the National Security Agency •Intelligence Director of the US Marines •Chief of staff for the U.S. House of Representatives •Serving soldiers in Iraq and Afghanistan, some of whom sent her snaps with GPS co-ordinates in them •Job offers with Lockheed, Northrop •And of course, dozens of dinner offers to discuss employment© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
  • 9. • Mission critical• Vulnerabilities are plenty• Threats are plenty• Security is only beginning to evolveRisk = Vulnerability x Probability x Impact© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
  • 10. H U M A N Application S OS Infra OS Transport NETWORK© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
  • 11. Source : Cornell University, Zhou et al© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
  • 12. • The malicious node participates in a route but simply drops some of the data packets. • The malicious node transmits falsified route updates. • The malicious node could potentially replay stale updates. • The malicious node reduces the TTL (time-to-live) field in the IP header so that the packet never reaches the destination.© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
  • 13. • Success of the network depends upon trust • Trust is established by Authentication and Encryption • Key management and distribution is a glaring weakness • A tactical system without trust can be worse than not having one© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
  • 14. • A tactical Communication System is sure to be attacked • ….is full of vulnerabilities • Impact is catastrophic ……what can we say about the risk? Risk = Vulnerability x Probability x Impact© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
  • 15. Thank you.

×