• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
DocomUSA Cyber Security
 

DocomUSA Cyber Security

on

  • 629 views

 

Statistics

Views

Total Views
629
Views on SlideShare
612
Embed Views
17

Actions

Likes
0
Downloads
0
Comments
0

4 Embeds 17

http://www.docomusa.com 12
http://docomusa.com 3
http://docomusa.net 1
http://www.docomusa.net 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    DocomUSA Cyber Security DocomUSA Cyber Security Presentation Transcript

    • CyberSecurity for Critical Infrastructure Protection of DocomUSA facilities
      Compiled by Terry L. Easley
      Proprietary and Confidential
      1
    • Computers are crucial to DocomUSA refining operations , distribution networks, feedstock delivery and credit card verification system.
      Computers and networks essentially run the critical infrastructures that are vital to DocomUSA.
      Proprietary and Confidential
      2
    • Unfortunately, many computer systems and networks were not designed with security in mind. As a result, the core of our critical infrastructure is riddled with vulnerabilities that could enable an attacker to disrupt operations or cause damage to these infrastructures.
      Proprietary and Confidential
      3
    • DocomUSA Critical infrastructure protection (CIP) involves activities that enhance the security of our company’s cyber and physical infrastructure.
      Defending against attacks on our digital and analog information technology.
      CyberSecurity and Global Satellilte Tracking of critical assets.—is a major concern of DocomUSA.
      Proprietary and Confidential
      4
    • DocomUSA Security has reviewed previous studies on cybersecurityand critical infrastructure protection, including those from the National Research Council, the CERT® Coordination Center (CERT/CC), the Institute for Information Infrastructure Protection (I3P), the National Institute of Standards and Technology (NIST), and GAO.
      We have accessed various data collection instruments to interview representatives of several critical infrastructure sectors, as identified in national strategy documents. We have reviewed transcripts of meetings with officials from the Department of Homeland Security’s (DHS) Information Analysis and Infrastructure Protection (IAIP) directorate to discuss their efforts in organizing and coordinating critical infrastructure protection activities.
      Proprietary and Confidential
      5
    • In addition, information was gleaned from meetings held with representatives of the National Science Foundation (NSF), NIST, the National Security Agency (NSA), the Advanced Research and Development Activity, the Infosec Research Council, and DHS’s Science and Technology directorate to discuss current and planned federal CyberSecurity research efforts.
      Representatives from two Department of Energy national laboratories, Sandia National Laboratories and Lawrence Livermore National Laboratory, and from Software Engineering Institute's CERT/CC were also consulted.
      Proprietary and Confidential
      6
    • Interviews were conducted of CyberSecurity researchers from academic institutions (Carnegie Mellon University, Dartmouth College, and the University of California at Berkeley) and corporate research centers (AT&T Research Laboratories, SRI International, and HP Laboratories).
      The DocomUSA Cyber Security Protocols are based on our analysis of information obtained from these and other sources.
      DocomUSA Security includes physical protection and cyber protection of all critical assets.
      7
      Proprietary and Confidential
      7
    • DocomUSA Solution Sets
      Powered by:
      Proprietary and Confidential
      8
    • Supported Communication Architectures
      Powered by
      Proprietary and Confidential
      9
    • What is Machine to Machine (M2M)?
      communications consist of:
      • using a device(e.g., sensor, meter, etc.)
      • to capture an "event" (e.g., temperature, inventory level, location, environment status, etc.),
      • relayed through a network(e.g., wireless, wired or hybrid)
      • to an application(software program),
      • translating the captured event into meaningful information (e.g., there is a breach, corrosion requires attention, items need to be restocked, an accident has occurred, etc.)
      • DocomUSA Security responds responds to the threat.
      • Innovative, fast, reliable, and affordable
      Proprietary and Confidential
      10
    • DN2K Communications Integration at DocomUSA
      • Comprehensive Experience w/Carriers, Architectures & Operations
      • Local
      • Wi-Fi, WiMax, AdHoc
      • Line of Sight
      • Radio (RF) 802.11
      • Over the Horizon
      • Satellite L band, Ku band, C band, X band
      • Private Networks
      • Customer defined and shared backup networks with priority data rules
      • Integrated Legacy Networks
      • Aggregation of multiple communication types
      Combat-Proven Products
      Secure / Scalable / Reliable / Intuitive
      Proprietary and Confidential
      11
    • Proprietary and Confidential
      12
      DN2K NOC Capabilities employed to protect DocomUSA
      • Operational monitoring
      • Critical infrastructure
      • High value assets
      • Communications links
      • Network services
      • Bandwidth management
      • Private redundant network
      • Converged critical infrastructure protection
      • Physical security monitoring
      • Specialized cyber listening correlators
    • Proprietary and Confidential
      13
      Current and Historical Location of DocomUSA Assets
      Information readily accessible to authorized DocomUSApersonnel anywhere in the world
      • Requires little to no training
      • Red, green, yellow alerts
      • “Bread crumb” trail to track movement of assets
      • Drill down to source in six clicks or less
      • Rapidly configurable for any environment
      • Extensible to any data source
      Turning volumes of data into actionable information
    • CyberSecurity for Critical Infrastructure Protection of DocomUSA facilities
      Compiled by Terry L. Easley and Stewart Nazzaro
      Proprietary and Confidential
      14