Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

General Elder- Homeland Security Presentation

881 views

Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

General Elder- Homeland Security Presentation

  1. 1. Louisiana-basedPublic-Private Partnershipsin Support ofState, Local, and Federal Government<br />Lt General Bob Elder, USAF (Retired)<br />Louisiana Homeland Defense Forum<br />15 April 2010<br />
  2. 2. Overview<br />Cyber Security<br />Cyber Assurance and Defense<br />Government-Industry Collaboration<br />WorkforceDevelopment<br />Facilitating Cyber Networking<br />
  3. 3. Full Spectrum Cyber Defense<br />Cyberspace Typology<br /><ul><li>Private/Open
  4. 4. Commercial
  5. 5. Regulated Commercial
  6. 6. Government (.gov)
  7. 7. Military (Admin)
  8. 8. Military (Ops)
  9. 9. Economic Security
  10. 10. Public Safety
  11. 11. WMD/E Defense/I&W</li></ul>Other US<br />Cyberspace<br />(includes DIB)<br />&<br />Associated<br />Cyber<br />Infrastructure<br />CADC FOCUS<br />Global Information Gridand DOD Networks<br />State & Local Gov’t Cyberspace<br />US GovernmentCyberspace<br />
  12. 12. Information Protection<br />Influence Attack<br />ElectromagneticSpectrumAttack<br />Cyber<br />Attack<br />InfluenceProtection<br />ElectronicProtection<br />Data/CodeProtection<br />Force Protection<br />Physical Attack<br />(includes Directed Energy)<br />Logical<br />Networks<br />Wireless<br />Networks<br />Digital Data & Code<br />Electromagnetic Spectrum<br />Social Networks<br />CND-RA<br />Cyber Use<br />Electronics (& Infrastructure)<br />Law<br />Enforcement<br />Effects of Attacks:<br /><ul><li> Denial of Service
  13. 13. Confidential Data Loss
  14. 14. Data Manipulation
  15. 15. System Integrity Loss</li></ul>Physical<br />Networks<br />
  16. 16. Proactive Defense & Mission Assurance<br />ATTACKS<br />TARGETS<br />EFFECTS<br />Insider Attacks;<br />Social engineering<br />Disinformation<br />Confusion<br />C2 Disruption<br />Alter Behaviors<br />Human Organization<br />Mission Layer<br />Data and policy<br />Corruption<br />Code Manipulation<br />Malware<br />Inaccuracies<br />Induced Failures<br />Denial of Service<br />Data Exfiltration<br />App/Session Layer<br />Attacker Focus<br />Operator Focus<br />Worms, viruses<br />Flooding<br />OS/Network Layer<br />Backdoor Implants<br />Malfunctions<br />Performance loss<br />Lost Comms<br />HW/Systems Layer<br />Devices & Linkages<br />Physical Destruction<br />Proactive Defense<br />NetworkSecurity<br />Mission Assurance<br />Intelligence & Attack Response<br />Source: 2008 AFSAB Study<br />
  17. 17. Multi-State CADC Relationships<br />Internet<br />AR<br />Guard<br />LA<br />Guard<br />MS<br />Guard<br />TX<br />Guard<br />LA<br />NOSC<br />AR<br />NOSC<br />MS<br />NOSC<br />TX <br />NOSC<br />AR Network<br />LA Network<br />MS Network<br />TX Network<br />Cyber Assurance and Defense Network Center<br />
  18. 18. Government-Industry Collaboration<br />DoD: Warfighter-Industry Collaboration Environment (WIC-E)<br />Requirement<br />Developers<br />Programmers<br />WIC-E<br />Government User<br />(Warfighter)<br />Acquisition<br />Community<br />“WIC-E”<br />Process<br />Test &Evaluation<br />Capability Provider<br />(Private Sector)<br />Normal<br />Process<br />
  19. 19. Workforce Development<br />Partners<br />LSUS<br />LA Tech<br />BPCC<br />NSU<br />Support<br />NSF<br />DoEd<br />NASA<br />DHS<br />NSA<br />StrategicLeader<br />Exploit Cyberspace<br />Operational LeaderSupervise and integratetechnical skills with mission(Mission Assurance)<br />Technical LeaderAreas such as Cyber Security, Info Assurance,Software Assurance, Network Mgmt,Communications, Knowledge Mgmt, Visualization …<br />
  20. 20. CIC Technical Curricula<br /><ul><li>Cyber Science –18 week course offered to 9th & 10th graders
  21. 21. Cyber Security – provides a basic understanding of computer hardware, software, networks, and encryption
  22. 22. Computer Science – curriculum provides students with a basic understanding of computer science, engineering and mathematical concepts as a strong foundation (Web Design & Computer Programming) to further their studies
  23. 23. Digital Media - curriculum provides students with a basic understanding of digital media, animation, visual effects, and interactive command and control environments
  24. 24. Information Assurance/Digital Forensics –Provides basic understanding of computer hardware, data storage and collection, network intrusion, and data degradation</li></ul>PROPRIETARY INFORMATION:Copyright ©2010 by the Cyber Innovation Center<br />
  25. 25. CIC Academic Pathways<br />Animation and Visual Effects Articulation<br />HS Cyber Courses  BPCC Telecommunications LSUS<br />Digital Forensics Articulation<br />HS Cyber Courses  BPCC CIT Div  NSU (Criminal Justice)<br />Computer Science Articulation<br />HS Cyber Courses  BPCC CIT Div  La Tech (Comp-Sci)<br />Associate of Engineering Articulation<br />HS Cyber Courses  BPCC CIT Div (with LA Tech support)<br />Cyber Security Articulation<br />HS Cyber Courses  BPCC CIT Div La Tech Cyber Academy<br />Articulations in Work<br />Energy, Bio-medical, Software Assurance, E-Business<br />PROPRIETARY INFORMATION:Copyright ©2010 by the Cyber Innovation Center<br />
  26. 26. CIC Public-Private Collaboration<br /><ul><li>Awareness Programs
  27. 27. Cyber Day Workshops (K-8)
  28. 28. Cyber Awareness Presentations (9-12)
  29. 29. Outreach to School Boards, Administrators, & Teachers (K-12)
  30. 30. Academic Outreach Program
  31. 31. Professional Development Workshops
  32. 32. Industry Certification Programs
  33. 33. High School Digital Forensics Laboratories
  34. 34. Summer Cyber Camps
  35. 35. Local, Regional, and National Cyber Competitions
  36. 36. Workforce Development Partnerships
  37. 37. Industry: CISCO Academy (Bossier Career & Technical HS), Warfighter-Industry Collaboration Exercises (WIC-E)
  38. 38. Government: Cyber Assurance & Security Education (DHS); NSA, WIC-E (AF), Electronic Systems Command (AF)
  39. 39. Universities and Colleges: LA Tech, BPCC, LSUS, NSU</li></ul>PROPRIETARY INFORMATION:Copyright ©2010 by the Cyber Innovation Center<br />
  40. 40. Facilitating LA Cyber Partnerships<br />Cyber<br />Assurance &<br />Defense<br />Center<br />National<br />Guard<br />Dept of <br />Homeland<br />Security<br />Cyberspace<br />Innovation<br />Center<br />Law<br />Enforcement<br />DoD<br />Cyber<br />(& related)<br />Industries<br />Assurance<br />& SecurityResearch<br />Academic<br />Community<br />
  41. 41. Summary<br />Cyber Security<br />Cyber Assurance and Defense<br />Government-Industry Collaboration<br />WorkforceDevelopment<br />Facilitating Cyber Networking<br />
  42. 42.
  43. 43. Cyberspace Business Areas<br />Cyber Ops<br />Establish the Domain<br />Form Cyber Networks<br />Secure Cyber Networks<br />Defend the Domain<br />Passive Defense<br />Active Defense<br />Use the Domain<br />Business Augmentation<br />Internet Business<br />Participatory Services<br />COMMERCE<br />Cyberspace importance is increasing <br />

×