cybersecurity: arm and train us warriors to win cyber war

Post on 29-Nov-2014

541 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Quickly & easily recreate Internet scale cyber war, interpret the results, and rapidly act upon cyber threats to: -Train cyber warriors to defend against threats or neutralize the enemy. -Harden targets – networks, data centers, individual devices.

TRANSCRIPT

Arm and Train US Warriors to Win Cyber War Deploying the Modern Cyber Range

2

Prepare for cyber war with cyber war: •  Thousands of global attacks

•  Botnet and global DDoS simulation

•  Millions of users

•  Hundreds of applications

•  As much non-repetitive data as the U.S. Library of Congress in one hour

The Cyber Range Imperative

Military Preparedness Requires Ranges

Every base must be able to easily recreate, interpret, and rapidly respond to cyber threats.

•  Conduct basic training

•  Develop ingrained skills

•  Harden critical targets

•  Too complex

•  Not scalable

• Not practical

• Not cost-effective

Legacy Methods Cannot Solve Modern Problems

Legacy Thinking Breeds Costs and Delays

Creates Internet-scale cyber war in controlled environment and records impact.

•  Visibility to harden network and data center targets

•  Intelligence needed to act on cyber events

•  Repeatable, deterministic Resiliency Score™

Science of Cyber Tomography

The comprehensive alternative to costly and complex cyber ranges.

• 4,500+ real-time attacks

• 150+ applications

• Traffic from millions of users

• Extensive automation speeds configuration and reporting

• Futureproof and always current

BreakingPoint Storm CTM™

Harden Network and Data Center Targets

Centralized Command and Control

The BreakingPoint Storm CTM is an ever current command and control center for:

• Keeping conditions up-to-date and standardized • Coordinating multi-party situational analysis • Replicating content across a network of machines • Distributing and managing cyber warming exercise

We must build resiliency into every element of critical infrastructure.

•  Measure and improve resiliency from chip to application

•  Hold vendors accountable

•  Identify and remediate stress fractures

•  Monitor the effects of changes over time

Hardening Targets Throughout IT Supply Chain

We must leverage science and technology to recreate, interpret, and rapidly respond to cyber threats.

•  Develop elite cyber warriors

•  Advance capabilities through research and development

•  Harden critical targets

Evolving Voodoo into Science

–  Rapidly deployed operational cyber range to troops

–  Armed staff to attack infrastructure to measure and harden resiliency

–  Remain current with attack and application changes

Goal: Deploy operationally relevant cyber range

–  Provide cyber warriors with model of Internet and curriculum to hone cyber defense skills

–  Support red and blue teaming exercises with relevant conditions and new attacks

–  Enable staff to stay current with attacks

Benefits: Increased performance and ROI

–  Dramatically reduced the time and cost of creating war game exercises

–  Exposed warriors to real attacks and network traffic in a controlled environment

–  Retired 100+ linear feet of racks full of hardware

Solution: Measure resiliency with high stress conditions

US Defense Information Systems Agency

Northrop Grumman Cyber Range

top related