DF Nucleo Conferencia Ciberseguridad WATM ed6 Presentations/DF... · DF Núcleo General Overview is...

18
DF NÚCLEO Towards Secure Communications in ANSPs

Transcript of DF Nucleo Conferencia Ciberseguridad WATM ed6 Presentations/DF... · DF Núcleo General Overview is...

DF NÚCLEO

Towards Secure Communications in ANSPs

CONTENTSDF Núcleo

Introduction

Cyber Security

Red/Black

Solution

Conclusions

Sources

DF NúcleoGeneral Overview

is the international subsidiary of DF (Duro Felguera) in the market

segment of Intelligent Systems

The company provides CONTROL, INSTRUMENTATION, COMMUNICATION and CYBER DEFENCE solutions and systems based on proprietary technology designed for the following infrastructure markets: Aeronautic, Maritime, Railways, Mining, Energy, Water and Security & Defence

is the international subsidiary of DF (

“50 years implementing technollogicallyadvanced solutions and turnkey projects

for the Aeronautical Sector”advanced

IntroductionDF Núcleo’s VCCS: ULISES

?ULISES V3000 ULISES V4000 ULISES V5000i

Securing your critical networks

IntroductionDF EPICOM

IntroductionDF Núcleo – DF Epicom

VoIPComms

CryptoSystems

Secure Communications

Cyber SecurityGeneral Overview

What’s the meaning of Cyber Security?

Cyber Security

Cyber SecurityGeneral Overview

The term “cyber security” regards the protection of electronic systems from

malicious electronic attack and the means of dealing with the consequences of such attacks

Plan

Protect

Detect

Respond

Cyber SecurityProtect

ATCO

Engineers

Handlers

Analysts

Anyone with responsibility forinformation assets

Flight Planning

Weather & Traffic surveillance

Aeronautical informationservices

Network Infrastructure

Airport surface area

Voice communicationinfrastructure

Radar for supporting ATC

Aircraft information Systems

People Process Technology

Cyber SecurityTechnology assets

PlainVoice & Data

CipherVoice & Data

Black Network. Carriesencrypted information (Voice

& Data)

Red Network. Handlessensitive or classified

information as plain form

Cyber SecurityRed/Black Separation

ConfidentialityEncryption technique preserve the information and communication from unauthorized revelation and access of information.

AuthenticationThe cryptographic techniques supports the validation of messages and information system requests..

Data IntegrityThe cryptographic hash functions are playing vital role in assuring the users about the data integrity.

Cyber SecurityMajor Challenges

Cyber SecuritySolution

Cyber SecuritySolution

Cyber SecuritySolution

Against cyber threats, together

Towards Secure Communications

Cyber SecurityConclusion

! Cyber Security and Risk Assessment Guide. CANSO

! Cybersecurity Strategy of the European Union. European Commission

! Article. Progress in cyber security in ATM. Eurocontrol.

! Civil-military CNS coordination. Eurocontrol.

! Estrategia de Ciberseguridad Nacional. Presidencia del Gobierno.

Cyber SecuritySources