Secure communications in the cyber world
This presentation is the property of its rightful owner.
Sponsored Links
1 / 4

Secure Communications in the Cyber World PowerPoint PPT Presentation


  • 250 Views
  • Uploaded on
  • Presentation posted in: General

Secure Communications in the Cyber World. Phil Mar September 2010. Securing the Network Assets. Transforming Secure Communications to the Tactical Edge. Securing the Networks. Securing the Waveform. Securing the End-Points.

Download Presentation

Secure Communications in the Cyber World

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Secure communications in the cyber world

Secure Communications in the Cyber World

Phil Mar

September 2010


Secure communications in the cyber world

Securing the Network Assets

Transforming Secure Communications to the Tactical Edge

Securing the Networks

Securing the Waveform

Securing the End-Points

The Adversary Attacks the Weakest Areas To Steal, Alter Your Data and Prohibit You From Communicating


Secure communications in the cyber world

Security Enables Communications

Securing the Waveform – Data In Transit Protection

Securing the End Points – Data in At Rest Protection and Platform Integrity

  • The right encryption algorithms

    • Suite A and Suite B

  • Network Enabled Waveforms

    • HAIPE, IPMEIR

  • Secure Key Distribution

    • PKI, NSA KMI, H2H, Secret and Below Keying

  • Hard Disk Encryption

  • USB Encryption

  • Host-Based Security Systems

  • Mobile Device Integrity

  • Last-Mile DIT

    • WiFi, Cellular, WiMax

Securing the Assets - Applying DIT, DIR and CND Everywhere

Securing the Network – Cyber Defense Network

  • C4ISR of Cyber Space

    • Cyber Sensors

    • Early Warning Systems

    • Dynamics/Active Cyber Defense

    • Graceful Degradation

  • Operational Ability

    • Incident Response Team

    • Forensics

    • Network Repair under Attack

  • Space Networks

  • ISR Networks

  • Radio/Waveform Networks

  • Wireless Networks

  • Key Management Infrastructure

  • ….and everything connected to THE NETWORK with or without wires


Secure communications in the cyber world

ViaSat Security Communications Portfolios

Data In Transit

Data in At Rest Protection and Platform Integrity

1 Gbps KG-255

100 Mbps KG-250

KG-201

KG-200

TRANSEC Module

Laptop Embeddable

PSIAM Crypto

KG-250x

Securing the Network – Cyber Defense Network

Securing the Assets - Applying DIT, DIR & CND everywhere

HAF-100x

HAF-100

FAB-T

Blue Force Tracking

Dynamic Cyber Sensors

Government SATCOM

JTRS/Link 16

Secure Ad-hoc Networking


  • Login