Transcript Slide 1

South Carolina Cyber
Nature of Cyberspace
675
PETABYTES
OF INTERNET
TRAFFIC PER
DAY (2011);
GROWING 60%
PER YEAR
265
BILLION
EMAILS
PER DAY
13
MILLION
HOURS OF
VOIP PER DAY
• Cyberspace: (DoD) “A global domain within the information
environment consisting of the interdependent network of
information technology infrastructures and resident data,
including the internet, telecommunications networks, computer
systems, and embedded processors and controllers.”
Source: Joint Pub 3-12
• However…
–
–
–
–
Manmade domain/ever changing/privately owned
Virtual
Programming code and protocols define rules of the domain
Environment/TTPs evolve at net speed
Success in this domain means being smarter, more creative, faster,
and stealthier than our opponent.
1/28/2013 4:37
4
UNCLASSIFIED
Environment: Exponential Rate of Change
2012
1 Billion
Users, 2012
Library of Congress = 10 Terabytes
At best transmission line speed:
1998 = 16.5 days
2013 = .00008 seconds
2010
2008
Facebook
Launch, 2004
2000
10 Billion Mobile Devices
Projected by 2016
(1.4 per person on the planet)
UNCLASSIFIED
5
THREAT ACTORS
FOREIGN
INTELLIGENCE
SUPPLY CHAIN
VULNERABILITY
NEGLIGENT
USERS
HACKTIVISTS
WIRELESS ACCESS
POINTS
CRIMINAL
ELEMENTS
REMOVABLE
MEDIA
TERRORIST ACTS
INSIDER
THREATS
A Disturbing Trend
The Threat is Evolving
7
5 Key Challenges in Cyber
Ends
USCYBERCOM
Mission
1. Defend the Nation
2. CCMD Support
3. GIG Ops and Defense
Ways &
Key
Challenges
Command &
Control
Trained & Ready
Means
Authorities,
ROE, Policy
Situational
Awareness
Defensible
Architecture
Materiel, Technology, Facilities, Engagement
1/28/2013 4:37
8
UNCLASSIFIED
AGREED
March 5, 2013
U.S. Federal Cybersecurity Operations Team
National Roles and Responsibilities*
US Government Departments and Agencies
• Investigate, attribute, disrupt and
prosecute cyber crimes
• Lead domestic national security
operations
• Conduct domestic collection, analysis,
and dissemination of cyber threat
intelligence
• Support the national protection,
prevention, mitigation of, and
recovery from cyber incidents
• Coordinate cyber threat investigations
DOJ/FBI
LEAD FOR
Investigation and
Enforcement
FBI, NSD, CRM,
USAO
Global Cyberspace
DoD
DHS
DOJ/FBI
• Coordinate the national protection,
prevention, mitigation of, and
recovery from cyber incidents
• Disseminate domestic cyber threat and
vulnerability analysis
• Protect critical infrastructure
• Secure federal civilian systems
• Investigate cyber crimes under DHS’s
jurisdiction
DHS
LEAD FOR
Protection
NPPD, USSS,
ICE
• Defend the nation from attack
• Gather foreign cyber threat intelligence
and determine attribution
• Secure national security and military
systems
• Support the national protection,
prevention, mitigation of, and recovery
from cyber incidents
• Investigate cyber crimes under military
jurisdiction
DoD
LEAD FOR
National Defense
USCYBERCOM, NSA,
DISA, DC3
Coordinate with Public, Private, and International Partners
* Note: Nothing in this chart alters existing DOJ, DHS, and
DoD roles, responsibilities, or authorities
Partnerships: Team Cyber & International engagements
Network Vulnerabilities Are Not
Solely a US Problem
• Shared Situational Awareness
• Agile Tipping and Cueing
• Integrated Defensive &
Offensive Capabilities
• Synchronized Command & Control
1/28/2013
PM
1/28/2013 4:37
4:37 PM
10
Cyber Partnering Framework
What other proactive partners are doing
Government
Industry
Academia
Cyber South Carolina
Cyber South Carolina
Cyber Protection
and Awareness
Leverages Economic Engagement
and Opportunity
Cyber
Relevance
Synergy of Effort and Capabilities
Between Government/Industry/Academia
Russian Gang Said to Amass
More Than a
Billion Stolen Internet Credentials
Aug 2014
Industry
South Carolina Cyber
Partners
The Cyber solution
Academia
Government
Questions?
17