Securing Cyberspace : A Military Perspective, by Arif Shouqi

15

Click here to load reader

description

C4I2 Summit was a two day exclusive event organized from October 18-19, 2011 at the Manekshaw Convention Center in New Delhi with the sole objective of enhancing the defense capabilities of the Indian Armed Forces. By bringing together decision makers from the Indian Army, Navy, Air Force and HQ IDS with senior representatives from the Industry, the Summit served as a platform to enable discussion of the advancements and requirements for Network-Centric technologies within the Defense Forces. It also provided the perfect stage for the Industry to showcase its CSI4 capabilities and offerings for the Armed Forces.As one of the leaders in the Network solutions space and a key player in the Indian Defense Forces, Cisco participated in this high level event by nominating senior speakers for the conference and by manning a stall in the exhibition area.Col. (Retd) KPM Das, Vice President, Cisco shared his thoughts and insights on Net-Centric Operations In C4i2: Strategic to the Tactical Level on 18th October while Mr Arif Shouqi, Chief Defense Architect- Asia Pacific, Cisco Systems participated in a high level discussion on Policy And Conduct Of Cyber Security Operations/Joint Services Perspective on 19th October

Transcript of Securing Cyberspace : A Military Perspective, by Arif Shouqi

Page 1: Securing Cyberspace : A Military Perspective, by Arif Shouqi

Cisco Public 1 © 2011 Cisco and/or its affiliates. All rights reserved.

Securing Cyberspace : A Military Perspective Sqn Ldr Arif Shouqi (Retd) National Security and Defense

Page 2: Securing Cyberspace : A Military Perspective, by Arif Shouqi

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 2

“Just as in the 19th century we had to secure the seas for our national safety and prosperity, and in the 20th century we had to secure the air, in the 21st century we also have to secure our advantage in cyber space”

Page 3: Securing Cyberspace : A Military Perspective, by Arif Shouqi

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 3

• Basic definitions and principles of cyber security

• Vulnerabilities and examples

• Sample study (Tactical Communication Systems)

• Conclusion

• Things to keep in mind when designing/choosing products and technology

Page 4: Securing Cyberspace : A Military Perspective, by Arif Shouqi

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 4

Risk = Vulnerability x Probability x Impact

Page 5: Securing Cyberspace : A Military Perspective, by Arif Shouqi

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 5

• Availability

• Confidentiality

• Integrity

• Authentication & Access Control

• Non-repudiation

Page 6: Securing Cyberspace : A Military Perspective, by Arif Shouqi

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 6

H

U

M

A

N

S

Page 7: Securing Cyberspace : A Military Perspective, by Arif Shouqi

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 7

7 * Data from US Secret Service

25 Years old, eastern European looking lady

MIT Graduate

Cyber Threat Analyst with the Naval Warfare College

10 years of work experience

Address of Blackwater, the infamous US contractor

Page 8: Securing Cyberspace : A Military Perspective, by Arif Shouqi

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 8

8

• 300 Linkedin/FB connections in 1 month

• Senior officers in Joint Chiefs of Staff

• CIO of the National Security Agency

•Intelligence Director of the US Marines

•Chief of staff for the U.S. House of Representatives

•Serving soldiers in Iraq and Afghanistan, some of whom sent her

snaps with GPS co-ordinates in them

•Job offers with Lockheed, Northrop

•And of course, dozens of dinner offers to discuss employment

Page 9: Securing Cyberspace : A Military Perspective, by Arif Shouqi

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 9

• Mission critical

• Vulnerabilities are plenty

• Threats are plenty

• Security is only beginning to evolve

Risk = Vulnerability x Probability x Impact

Page 10: Securing Cyberspace : A Military Perspective, by Arif Shouqi

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 10

H

U

M

A

N

S

NETWORK

OS Transport

OS Infra

Application

Page 11: Securing Cyberspace : A Military Perspective, by Arif Shouqi

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 11

Source : Cornell University, Zhou et al

Page 12: Securing Cyberspace : A Military Perspective, by Arif Shouqi

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 12

• The malicious node participates in a route but simply drops some of the data packets.

• The malicious node transmits falsified route updates.

• The malicious node could potentially replay stale updates.

• The malicious node reduces the TTL (time-to-live) field in the IP header so that the packet never reaches the destination.

Page 13: Securing Cyberspace : A Military Perspective, by Arif Shouqi

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 13

• Success of the network depends upon trust

• Trust is established by Authentication and Encryption

• Key management and distribution is a glaring weakness

• A tactical system without trust can be worse than not having one

Page 14: Securing Cyberspace : A Military Perspective, by Arif Shouqi

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 14

• A tactical Communication System is sure to be attacked

• ….is full of vulnerabilities

• Impact is catastrophic

……what can we say about the risk?

Risk = Vulnerability x Probability x Impact

Page 15: Securing Cyberspace : A Military Perspective, by Arif Shouqi

Thank you.