perspectives on cyberspace research needs cyber research workshop louisiana tech university center...
TRANSCRIPT
![Page 1: Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired)](https://reader030.vdocuments.net/reader030/viewer/2022032723/56649cf85503460f949c8d6c/html5/thumbnails/1.jpg)
Perspectives onCyberspace Research Needs
Cyber Research WorkshopLouisiana Tech University
Center for Secure Cyberspace
Lt General Bob Elder, USAF (Retired)
15 November 2010
![Page 2: Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired)](https://reader030.vdocuments.net/reader030/viewer/2022032723/56649cf85503460f949c8d6c/html5/thumbnails/2.jpg)
Overview
• Evolving Cyber Environment
• Cyber and Cyber-enabled Business Operations
• Cyber Security and Defense
• Mission Assurance
• Exploiting Cyberspace
• Operational & Strategic Cyber Leaders
![Page 3: Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired)](https://reader030.vdocuments.net/reader030/viewer/2022032723/56649cf85503460f949c8d6c/html5/thumbnails/3.jpg)
The Nation requires cyber and cyber security expertise
Today’s Cyber Environment
• National Focus is on cyber security—$18B in FYDP– Effort limited to federal government networks– Critical need for state and local government,
commercial, and private use network protection• World focus is development of cyberspace for global
business—leaders are found outside the United States• Information now a commodity; knowledge management
tools and services prevent information overload• Value Chain is changing—consumers interact with
businesses to develop tailored products (Dell)• Social networking drives behaviors, choices, politics
![Page 4: Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired)](https://reader030.vdocuments.net/reader030/viewer/2022032723/56649cf85503460f949c8d6c/html5/thumbnails/4.jpg)
Key Cyber Functional Elements
Data CollectionKnowledge Creation(Info Management)
Network OpsNetwork Security
(Communications)
Legacy EnhancementGlobal Integrated Ops
Administrative OpsMission Assurance
(Operations)
Actions in & through Cyberspace
![Page 5: Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired)](https://reader030.vdocuments.net/reader030/viewer/2022032723/56649cf85503460f949c8d6c/html5/thumbnails/5.jpg)
Ways:
• Information Operations
• Network Operations
• Kinetic Actions
• Law Enforcement
• Counterintelligence
Enablers:
• Science & Technology
• Partnering
• Intelligence Support
• Law and policy
• Trained personnel 6
National Military Strategyfor Cyberspace Ops (NMS-CO)
Joint Capability Areas:
• Battlespace Awareness
• Force Generation
• Command and Control
• Information Operations
• Net-centric Operations
• Global Deterrence
• Homeland Defense
• Interagency Integration
• Non-governmental organization coordination
![Page 6: Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired)](https://reader030.vdocuments.net/reader030/viewer/2022032723/56649cf85503460f949c8d6c/html5/thumbnails/6.jpg)
Civilian Cyberspace Use
• Establish Networks – TELECOMs, ISPs, Businesses
• Maintain Networks (Security) – CIOs, CTOs, CISOs
• Defend Networks (Business) – COOs, Associations
• Business Ops Assurance – Risk Management
• Ops through Cyber – Business Enhancement
• Ops through Cyber – Marketing/Sales
• Ops through Cyber – Knowledge Management
• Ops in Cyber – Virtual Travel
• Ops in Cyber – Virtual Presence
• Ops in Cyber – Producer/Consumer Dialogue
7
![Page 7: Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired)](https://reader030.vdocuments.net/reader030/viewer/2022032723/56649cf85503460f949c8d6c/html5/thumbnails/7.jpg)
Major Cyber Security Players
Defense
• Law Enforcement
• Intelligence Community
• Homeland Security
• Counterintelligence
• Military
• Industry Consortiums
• Regulatory Agencies
• Commercial Providers
Potential Adversaries
• Organized Crime
• International Terrorists
• Domestic Terrorists
• Nation-State Intelligence
• Nation-State Military
• Industrial Intelligence
• Cyber “Vandals”
8
![Page 8: Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired)](https://reader030.vdocuments.net/reader030/viewer/2022032723/56649cf85503460f949c8d6c/html5/thumbnails/8.jpg)
Full Spectrum Cyber DefenseFull Spectrum Cyber Defense
Cyberspace Typology
• Private/Open
• Commercial
• Regulated Commercial
• Government (.gov)
• Military (Admin)
• Military (Ops)
• Economic Security
• Public Safety
• WMD/E Defense/I&W
Glo
bal I
nfor
mat
ion
Grid
and
DO
D N
etw
orks
US
Gov
ernm
ent
Cyb
ersp
ace
Sta
te &
Lo
cal
Go
v’t
Cyb
ersp
ace
Other USCyberspace
(includes DIB)&
AssociatedCyber
Infrastructure
CADC FOCUS
![Page 9: Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired)](https://reader030.vdocuments.net/reader030/viewer/2022032723/56649cf85503460f949c8d6c/html5/thumbnails/9.jpg)
Cyberspace Business Areas
COMMERCE
Cyberspace importance is increasing
Cyber Ops
• Establish the Domain– Form Cyber Networks– Secure Cyber Networks
• Defend the Domain– Passive Defense– Active Defense
• Use the Domain– Business Augmentation– Internet Business– Participatory Services
![Page 10: Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired)](https://reader030.vdocuments.net/reader030/viewer/2022032723/56649cf85503460f949c8d6c/html5/thumbnails/10.jpg)
PhysicalNetworks
Information Protection
Electronics (& Infrastructure)
Elec
trom
agne
tic S
pect
rum D
igital Data &
Code
Cyber Use
Force Protection
Elect
roni
c
Prote
ctio
nD
ata/Code
Protection
InfluenceProtection
Physical Attack(includes Directed Energy)
CyberAttack
ElectromagneticSpectrumAttack
Influence Attack
LogicalNetworks
WirelessNetworks
Effects of Attacks:• Denial of Service• Confidential Data Loss • Data Manipulation• System Integrity Loss
Social Networks
LawEnforcement
Offense
![Page 11: Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired)](https://reader030.vdocuments.net/reader030/viewer/2022032723/56649cf85503460f949c8d6c/html5/thumbnails/11.jpg)
Mission Assurance: Focus on Effects
ATTACKS TARGETS EFFECTS
Human Organization
Mission Layer
App/Session Layer
OS/Network Layer
HW/Systems Layer
Devices & Linkages
DisinformationConfusionC2 DisruptionAlter Behaviors
InaccuraciesInduced FailuresDenial of ServiceData Exfiltration
MalfunctionsPerformance lossLost Comms
Insider Attacks;Social engineering
Data and policyCorruption
Worms, virusesFlooding
Backdoor Implants
Physical Destruction
Code ManipulationMalware
Source: 2008 AFSAB Study
Passive Defense Active Defense Mission Assurance
![Page 12: Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired)](https://reader030.vdocuments.net/reader030/viewer/2022032723/56649cf85503460f949c8d6c/html5/thumbnails/12.jpg)
SensorData
SensorData (in)
IntelInfo (out)
IntelInfo
Intel InfoCmd Input
GndStation
Cmd Out(Gnd Cdr)
Control (in)Data (out)
Cmd Out(Air Cdr)
Control (out)Sensor (in)
Sensor(Out)
CoordAOC/ASOC
CoordAOC/ASOC
Coord
AOC-UAS Terrestrial
Sensors
RPA: Remotely Piloted AircraftAOC: Air Operations CenterASOC: Air Support Operations Center
Target
AOC Resiliency Study—C3 View
RPA Ctrl
AOC
ASOC
FusionCenter
![Page 13: Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired)](https://reader030.vdocuments.net/reader030/viewer/2022032723/56649cf85503460f949c8d6c/html5/thumbnails/13.jpg)
AOC Resiliency Study—Ops View
RPA Ctrl ASOC
FusionCenter
GndStation
AOC
SensorData
Sensors
Intel Info
SensorData (in)
IntelInfo (out)
Control (out)Sensor (in)
Sensor(Out)
Coord
Control (in)Data (out)
AOC/ASOCCoord
AOC-UAS Terrestrial
Dotted lines denote operational connections
RPA: Remotely Piloted AircraftAOC: Air Operations CenterASOC: Air Support Operations Center
Target
![Page 14: Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired)](https://reader030.vdocuments.net/reader030/viewer/2022032723/56649cf85503460f949c8d6c/html5/thumbnails/14.jpg)
Degraded Cyberspace
15
Observe
PhysicalSpace
Cognitive “Space”
Sensors DataIntegration
OpsIntegration
Effects(Integrated Actions)
KnowledgeOperations
LegacyOperations
Intelligence
Cyberspace Exploitation
Logistics
Cyber
Orient
DecideAct
Situational Awareness
Linked Ops CentersCyber-enabled Global Operations
![Page 15: Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired)](https://reader030.vdocuments.net/reader030/viewer/2022032723/56649cf85503460f949c8d6c/html5/thumbnails/15.jpg)
Value Chain in a Cyber World
OPPORTUNITIES• Shopper Dialogue• Information
Sharing• Synchronized
Production• Integrated
Logistics• Sustainability• Company Cyber
Culture
16
Consumer isa Partner
Quality isa commodity
OpenNetworkrules
ConsumerBehavior
Prod
uct
Flow
Information
Flow
FutureValueChain
GCI Initiative, 2008
![Page 16: Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired)](https://reader030.vdocuments.net/reader030/viewer/2022032723/56649cf85503460f949c8d6c/html5/thumbnails/16.jpg)
Warfighter-Industry Collaboration
Military User
(Warfighter)WIC-E
RequirementDevelopers
Programmers
AcquisitionCommunity
Capability Provider(Private Sector)
NormalProcess
“WIC-E”Process
Test &Evaluation
![Page 17: Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired)](https://reader030.vdocuments.net/reader030/viewer/2022032723/56649cf85503460f949c8d6c/html5/thumbnails/17.jpg)
Multi-State CADC Relationships
LANOSC
ARNOSC
MSNOSC
TX NOSC
Cyber Assurance and Defense Network Center
ARGuard
LAGuard
MSGuard
TXGuard
Internet
AR Network LA Network MS Network TX Network
![Page 18: Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired)](https://reader030.vdocuments.net/reader030/viewer/2022032723/56649cf85503460f949c8d6c/html5/thumbnails/18.jpg)
Operational & Strategic Leaders
Operational LeaderSupervise and
integrate technical skills with mission
Technical SkillsSuch as cyber Security, Info Assurance,
Software Assurance, Network Mgmt, Communications, Knowledge Management, Visualization …
StrategicLeader
Exploit Cyberspace
CurrentCyber WorkforceDevelopmentFocus
Cyber-enabledLeadershipDevelopmentShortfall
![Page 19: Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired)](https://reader030.vdocuments.net/reader030/viewer/2022032723/56649cf85503460f949c8d6c/html5/thumbnails/19.jpg)
Facilitating Cyber Partnerships
NationalGuard
LawEnforcement
Cyber(& related)Industries
Dept of HomelandSecurity
CyberSecurity &DefenseCenter
CyberspaceInnovation
Center
AcademicCommunity
Assurance& SecurityEducation
DoD
![Page 20: Perspectives on Cyberspace Research Needs Cyber Research Workshop Louisiana Tech University Center for Secure Cyberspace Lt General Bob Elder, USAF (Retired)](https://reader030.vdocuments.net/reader030/viewer/2022032723/56649cf85503460f949c8d6c/html5/thumbnails/20.jpg)
Challenge: Cultural (R)evolution
Hierarchical Culture Cyber Culture
21
Hierarchy Level ---- Power ---- ConnectionsHierarchy Level ---- Value ----- Contribution
Future
Alternative Strategies are available: Can we “break” the cultural barrier?