E N D
1. LandWarNet 2008  
2. PURPOSE:  To provide an overview of the Army’s Information Assurance Program
OBJECTIVES:
To present key challenges
 
To highlight select programs 
     and initiatives
 
5. Changes in Threat Perspectives 1995 – Life was simple
  Few foreign developed tools considered
  Presence of a non U.S. citizen is a red flag
  Trusted coalition partners is a short list
  Threat to networks is not widely understood
   Threat not that sophisticated –Jolt cola and SATAN perceptions
  Limit access to the INTERNET 
7. Changes in Threat Perspectives 2008 – Life is more complicated 
  Research Centers support multinational corporations are located In  Russia, China and India
  Multinational boards include non U.S. citizens 
  Demand for information sharing with coalition partners is significant – and really necessary
  Supply Chain concerns
  Theft of information
 Organized crime
 Personal Identifiable Information (PII) – identity theft
  Technology – P2P/collaboration/virtual
Threat is more sophisticated 
  Solar Sunrise -- Israel
  Moonlight Maze – Russian
  Titan  Rain -- China
 
9. Can You Guarantee 100% Security Can you guarantee with this IA investment that my information will be 100% protected ? 
Information Assurance investments looked at as something  separate, something special, something out of the norm.
After spending 1M plus for a tank does the decision maker ask if the provider can guarantee it will be 100 % assured of not being damaged/destroyed ?
Depth of armor
Reactive technology
Speed
Smoke
Stand off capability
 IA is not always looked at as an integral and key enabler to facilitate the Integrity, confidentiality and availability of the information necessary to execute a mission. 
 
13. Turn aShip in a Bathtub 
14. What is the Challenge ?   A Firewall/IPS that does not have adequate policy rules and or is not audited is a door stop !
  The best Certification and Accreditation (C&A) and Networthiness process in the world is worthless if there is no daily follow up and compliance !
  Need to get away from the “3 year”                         mind set
  Need compliance checks
  Lack of compliance needs to be painful !
  Lack of enterprise results in pockets of excellence and pockets of failure. 
15. What is the Challenge ? 
16. Information, Information, Information In modern conflict, information as one of the eight elements of combat power (The other elements are leadership, movement and maneuver, intelligence, fires, sustainment, command and control, and protection) has become as important as lethal action in determining the outcome of operations. 
 
18. HQDA IG IA Division Operational
IA Self Assessment Training Module
Question
Source
Standard
Determine standard is being met
Limited number of categories and questions
ALARACT directing use of the self assessment tool to conduct a self assessment
 
20. Authority To Connect (ATC) DISA requires customers to renew a request for their circuit connectivity.  
To be successful the customer must have a valid IATO/ATO.
2008 is the first year that the Army is tracking the status of ATCs.
2008 is the first year that JTF GNO is disconnecting circuits that cannot meet the standards for an ATC.
 
21. Army NIPR Circuits 
22. Army NIPR Circuits 
29. Army Web Risk Assessment Cell  Reviews:
 Public assessable web sites
Army BLOGs
 Works with owner/web manager to remediate
  Trends:
Personably Identifiable Information 
 
30. AWRAC Tracking Database Snapshot July 2008 
33. IAVA – Hosts Scanned 
34. IAVA – Patches Not Applied 
35. IAVA- Sites Visited 
36. IAVA – Army Annual Vulnerability Rate 
40. Systems requiring Accreditation must have an Authority to Operate (ATO)
Systems need to have a Plan of Action and Milestones (POAM) 
System owners must test their DoD 8500.2 Security Controls on Annual Basis 
All Systems must have a Contingency Plan and test that Contingency Plan on an Annual Basis 
System owners must conduct an annual security review 
Annual IA training requirement 
Army Portfolio Management System (APMS)
 
41. Army FISMA Statistics 
43. Training: System Administrator 
44. Training: e-Learning 
46.  Certificates Approved For FY08  
48. Visual of legacy equipment and what they are being replaced by.  This chart does not represent one for one 
Visual of legacy equipment and what they are being replaced by.  This chart does not represent one for one 
 
49. Prior to FY08
Stopped issuing - KG-84, KG-94, KG-175, STUIII, 
Production stopped- KG-175AC (classic), DTD, KIV-7 HSB, KG-75
New Technology- TALON, SecNet 11, SecNet 54, KG-250
FY08-
Stop issuing KG-175 AC, KY-68, KIV-7, KIV-19
Production stopped- KG-175 E-100, KG-175B, KG-235, KG-240
New Technology- KG-175D, KIV-7M, KIV-19M, KY-100s, vIPer, ECC, SME-PED, SKL, TALON, KG-255, SecNet 54
FY09-
Stop issuing- KOV-14
Production stopped- TBD
New Technology- 10 GB TACLANEs, other TBD
FY10
Not supported- STUIII 
51. Public Key Infrastructure   Identity Management
  Logical access
  Physical access
  Select groups
  Security - Security - Security  
53. ON CYBER PATROL