DocomUSA Cyber Security


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

DocomUSA Cyber Security

  1. 1. CyberSecurity for Critical Infrastructure Protection of DocomUSA facilities<br />Compiled by Terry L. Easley<br />Proprietary and Confidential<br />1<br />
  2. 2. Computers are crucial to DocomUSA refining operations , distribution networks, feedstock delivery and credit card verification system. <br />Computers and networks essentially run the critical infrastructures that are vital to DocomUSA.<br />Proprietary and Confidential<br />2<br />
  3. 3. Unfortunately, many computer systems and networks were not designed with security in mind. As a result, the core of our critical infrastructure is riddled with vulnerabilities that could enable an attacker to disrupt operations or cause damage to these infrastructures. <br />Proprietary and Confidential<br />3<br />
  4. 4. DocomUSA Critical infrastructure protection (CIP) involves activities that enhance the security of our company’s cyber and physical infrastructure. <br />Defending against attacks on our digital and analog information technology. <br />CyberSecurity and Global Satellilte Tracking of critical assets.—is a major concern of DocomUSA.<br />Proprietary and Confidential<br />4<br />
  5. 5. DocomUSA Security has reviewed previous studies on cybersecurityand critical infrastructure protection, including those from the National Research Council, the CERT® Coordination Center (CERT/CC), the Institute for Information Infrastructure Protection (I3P), the National Institute of Standards and Technology (NIST), and GAO. <br />We have accessed various data collection instruments to interview representatives of several critical infrastructure sectors, as identified in national strategy documents. We have reviewed transcripts of meetings with officials from the Department of Homeland Security’s (DHS) Information Analysis and Infrastructure Protection (IAIP) directorate to discuss their efforts in organizing and coordinating critical infrastructure protection activities. <br />Proprietary and Confidential<br />5<br />
  6. 6. In addition, information was gleaned from meetings held with representatives of the National Science Foundation (NSF), NIST, the National Security Agency (NSA), the Advanced Research and Development Activity, the Infosec Research Council, and DHS’s Science and Technology directorate to discuss current and planned federal CyberSecurity research efforts. <br />Representatives from two Department of Energy national laboratories, Sandia National Laboratories and Lawrence Livermore National Laboratory, and from Software Engineering Institute's CERT/CC were also consulted.<br />Proprietary and Confidential<br />6<br />
  7. 7. Interviews were conducted of CyberSecurity researchers from academic institutions (Carnegie Mellon University, Dartmouth College, and the University of California at Berkeley) and corporate research centers (AT&T Research Laboratories, SRI International, and HP Laboratories).<br />The DocomUSA Cyber Security Protocols are based on our analysis of information obtained from these and other sources. <br />DocomUSA Security includes physical protection and cyber protection of all critical assets. <br />7<br />Proprietary and Confidential<br />7<br />
  8. 8. DocomUSA Solution Sets<br />Powered by: <br />Proprietary and Confidential<br />8<br />
  9. 9. Supported Communication Architectures<br />Powered by <br />Proprietary and Confidential<br />9<br />
  10. 10. What is Machine to Machine (M2M)?<br /> communications consist of: <br /><ul><li>using a device(e.g., sensor, meter, etc.)
  11. 11. to capture an "event" (e.g., temperature, inventory level, location, environment status, etc.),
  12. 12. relayed through a network(e.g., wireless, wired or hybrid)
  13. 13. to an application(software program),
  14. 14. translating the captured event into meaningful information (e.g., there is a breach, corrosion requires attention, items need to be restocked, an accident has occurred, etc.)
  15. 15. DocomUSA Security responds responds to the threat.
  16. 16. Innovative, fast, reliable, and affordable</li></ul>Proprietary and Confidential<br />10<br />
  17. 17. DN2K Communications Integration at DocomUSA<br /><ul><li>Comprehensive Experience w/Carriers, Architectures & Operations
  18. 18. Local
  19. 19. Wi-Fi, WiMax, AdHoc
  20. 20. Line of Sight
  21. 21. Radio (RF) 802.11
  22. 22. Over the Horizon
  23. 23. Satellite L band, Ku band, C band, X band
  24. 24. Private Networks
  25. 25. Customer defined and shared backup networks with priority data rules
  26. 26. Integrated Legacy Networks
  27. 27. Aggregation of multiple communication types</li></ul> Combat-Proven Products<br /> Secure / Scalable / Reliable / Intuitive<br />Proprietary and Confidential<br />11<br />
  28. 28. Proprietary and Confidential<br />12<br />DN2K NOC Capabilities employed to protect DocomUSA<br /><ul><li>Operational monitoring
  29. 29. Critical infrastructure
  30. 30. High value assets
  31. 31. Communications links
  32. 32. Network services
  33. 33. Bandwidth management
  34. 34. Private redundant network
  35. 35. Converged critical infrastructure protection
  36. 36. Physical security monitoring
  37. 37. Specialized cyber listening correlators</li></li></ul><li>Proprietary and Confidential<br />13<br />Current and Historical Location of DocomUSA Assets<br />Information readily accessible to authorized DocomUSApersonnel anywhere in the world<br /><ul><li>Requires little to no training
  38. 38. Red, green, yellow alerts
  39. 39. “Bread crumb” trail to track movement of assets
  40. 40. Drill down to source in six clicks or less
  41. 41. Rapidly configurable for any environment
  42. 42. Extensible to any data source</li></ul>Turning volumes of data into actionable information<br />
  43. 43. CyberSecurity for Critical Infrastructure Protection of DocomUSA facilities<br />Compiled by Terry L. Easley and Stewart Nazzaro<br />Proprietary and Confidential<br />14<br />