Defense needs for future information assurance standards l.jpg
This presentation is the property of its rightful owner.
Sponsored Links
1 / 14

Defense Needs for Future Information Assurance Standards PowerPoint PPT Presentation


  • 133 Views
  • Uploaded on
  • Presentation posted in: General

Defense Needs for Future Information Assurance Standards. “Know the enemy, know yourself; your victory will never be endangered. Know the ground, know the weather; your victory will then be total”*. “We need improved information assurance standards to enable joint interoperability”**.

Download Presentation

Defense Needs for Future Information Assurance Standards

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Defense needs for future information assurance standards l.jpg

Defense Needs for FutureInformation Assurance Standards

“Know the enemy, know yourself; your victory will never be endangered. Know the ground, know the weather; your victory will then be total”*

“We need improved information assurance standards to enable joint interoperability”**

John James

[email protected]

* The Art of War by Sun Tzu , Translated by Samuel B. Griffith, Page 129

** GEN Paul Kern, CG, AMC, plenary speaker, IEEE Information Assurance Workshop, West Point, NY, 18 June 2003


Contents l.jpg

Contents

  • Complex system representation

    • Static models of dynamic systems

    • Adaptive models of dynamic systems

  • Trustworthiness of military information systems

    • If you are on the net, you are trusted

    • Accreditation is done at the lowest level of the network

  • Future military information systems requirements

    • The implications of autonomous combat vehicles

    • Military networks will change even more rapidly than today

  • Characteristics of standards for future military systems

    • Adaptive accreditation of networks of devices


Complex system representation l.jpg

Complex System Representation

  • Static models of dynamic systems

    • Discrete components

    • Continuous components

    • Multiple time and spatial scales

    • Presence of at least one equilibrium at each model level

  • Adaptive models of dynamic systems

    • Discrete components

    • Continuous components

    • Multiple time and spatial scales

    • Presence of at least one equilibrium at each model level

    • Models adapt (evolve) as system dynamics change


Trustworthiness of military information systems l.jpg

Trustworthiness of Military Information Systems

  • If you are on the net, you are trusted

    • Networks operate at different levels of security

    • Building gateways (guards) between networks operating at different security levels is difficult

  • Accreditation is done at the lowest level of the network

    • Network components (vehicles, workstations, servers, switches, routers …) are accredited

    • Detecting if a network has been compromised remains problematic


Future military information systems requirements l.jpg

Future Military Information Systems Requirements

  • The implications of autonomous combat vehicles

    • How does a machine “understand” commander’s intent?

    • As elements of the situation (constraints) change, how will the machine adapt a current plan to meet the commander’s intent?

  • Military networks will change even more rapidly than today

    • Military networks “move” with the force

    • As the tempo of operations increase, the rate at which the network architecture must adapt will increase

  • Insufficient to look only at Confidentiality, Integrity, Availability, Authentication, and Non-repudiation


Characteristics of standards for future military systems l.jpg

Characteristics of standards for future military systems

  • Standard for accreditation of complex adaptive systems

    • Multiple time scales

    • Multiple spatial scales

    • Representation of system architecture (ADL)

    • Representation of system interfaces (IDL)

  • Consideration of standards attributes for accreditation of military information systems

    (next 7 slides consider accrediting a feedback process)


State estimation and reactive control l.jpg

State estimation and reactive control


Current to future force l.jpg

“The Joint Operations Concepts … builds on the goal of Full Spectrum Dominance: the defeat of any adversary or control of any situation across the full range of military operations. Full Spectrum Dominance is based on the ability to sense, understand, decide and act faster than an adversary in any situation”*

Current to Future Force

* The Way Ahead , http://www.army.mil/thewayahead/foreword.html , Pages 5-6


The higher levels of the joint force system architecture l.jpg

The higher levels of the joint force system architecture


The tactical level of the system architecture l.jpg

The tactical level of the system architecture


Information assurance processes l.jpg

Accreditation processes occur over time

DISCRETE MODEL UPDATE

DISCRETE MODEL UPDATE

DISCRETE MODEL UPDATE

DISCRETE MODEL UPDATE

CONTINUOUS MODEL UPDATE

CONTINUOUS MODEL UPDATE

CONTINUOUS MODEL UPDATE

CONTINUOUS MODEL UPDATE

SYSTEM OPTIMALITY

SYSTEM OPTIMALITY

SYSTEM OPTIMALITY

SYSTEM OPTIMALITY

SYSTEM STATE

SYSTEM STATE

SYSTEM STATE

SYSTEM STATE

OFF

OFF

-

-

LINE VALIDATION

LINE VALIDATION

ON

ON

-

-

LINE VERIFICATION

LINE VERIFICATION

TRANSMISSION

TRANSMISSION

INFORMATION

INFORMATION

STATES

STATES

STORAGE

STORAGE

SERVICES

PROCESSING

PROCESSING

CONFIDENTIALITY

CONFIDENTIALITY

INTEGRITY

INTEGRITY

SECURITY

SECURITY

SERVICES

SERVICES

AVAILABILITY

AVAILABILITY

TECHNICAL

TECHNICAL

ARCHITECTURE

ARCHITECTURE

AUTHENTICATION

AUTHENTICATION

SYSTEMS

SYSTEMS

ARCHITECTURE

ARCHITECTURE

NON

NON

-

-

REPUDIATION

REPUDIATION

Information Assurance services whose values (states) change over time

PROTECTION

PROTECTION

SECURITY

SECURITY

DETECTION

DETECTION

MAINTENANCE

MAINTENANCE

OPERATIONAL

ARCHITECTURE

SERVICES

REACTION

REACTION

TECHNOLOGY

TECHNOLOGY

SECURITY

SECURITY

Architecture components and parameter values change over time

COUNTER

COUNTER

POLICIES AND PRACTICES

POLICIES AND PRACTICES

MEASURES

MEASURES

SERVICES

PEOPLE

PEOPLE

SITUATION

SITUATION

-

-

ASSESSMENT SUPPORT

ASSESSMENT SUPPORT

INFORMATION

INFORMATION

DOMINANCE

DOMINANCE

MILITARY

MILITARY

-

-

DECISION

DECISION

-

-

MAKING

MAKING

-

-

PROCESS SUPPORT

PROCESS SUPPORT

SERVICES

SERVICES

TRUTH

TRUTH

-

-

MAINTENANCE SUPPORT

MAINTENANCE SUPPORT

Information Assurance Processes


The technical architecture l.jpg

The Technical Architecture


Joint forces information architecture l.jpg

Joint Forces Information Architecture


Summary l.jpg

Summary

  • Critical infrastructure processes (such as military operations) have discrete and continuous components

  • Understanding complex dynamical processes requires modeling both discrete and continuous components

  • Future standards should support adaptive accreditation of systems that enable meeting enterprise process goals (such as commander’s intent)


  • Login