CYBERSPACE A Global War-fighting Domain Every minute of every
day, Airmen in the United States Air Force are flying and fighting
in cyberspace
Slide 2
Right Now Cyber Attack
Slide 3
Right Now Cyber Theft
Slide 4
Right Now Cyber Defense
Slide 5
Right Now Cyber Offense
Slide 6
Right Now Cyber Espionage
Slide 7
The Battle for Information Superiority is being fought in
Cyberspace Right Now! Right Now
Slide 8
Cyberspace Defined The Air Force Cyber Mission Cyberspace
Superiority The Airmans Perspective Threats and Vulnerabilities
Roles and Responsibilities of all Cyber Wingmen Guided
DiscussionOverview
Slide 9
National Security Presidential Directive 54 the interdependent
network of information technology infrastructures, and includes the
Internet, telecommunications networks, computer systems, and
embedded processors and controllers in critical industries.
Cyberspace Defined
Slide 10
Department of Defense A global domain within the information
environment consisting of the interdependent network of information
technology infrastructures, including the Internet,
telecommunications networks, computer systems, and embedded
processors and controllers. Cyberspace Defined
Slide 11
Cyberspace Defined (global domain)
Slide 12
Slide 13
Cyberspace Defined Cyberspace Domain A man-made, interconnected
operational realm characterized by use of the electromagnetic
spectrum to manipulate information.
Slide 14
Cyberspace Defined Cyberspace Domain A man-made, interconnected
operational realm characterized by use of the electromagnetic
spectrum to manipulate information.
Slide 15
Cyberspace Defined Cyberspace Domain A man-made, interconnected
operational realm characterized by use of the electromagnetic
spectrum to manipulate information.
Slide 16
Cyberspace Defined Cyberspace Domain A man-made, interconnected
operational realm characterized by use of the electromagnetic
spectrum to manipulate information.
Slide 17
Cyberspace Land Air Sea - Space
Slide 18
SPACECYBERSPACE AIR but how do we accomplish that cyberspace
part? The Air Force Mission
Slide 19
AF Cyber Mission 24 AF Mission to extend, operate and defend
the Air Force portion of the Department of Defense network while
providing the full spectrum of cyber capabilities for the joint war
fighter
Slide 20
Cyberspace Superiority Global Integrated ISR Personnel Recovery
Nuclear Deterrence Operations Command and Control Global Precision
Attack Building Partnerships Special Operations Air Superiority
Rapid Global Mobility Agile Combat Support Space Superiority
Cyberspace Superiority Global Integrated ISR Personnel Recovery
Nuclear Deterrence Operations Command and Control Global Precision
Attack Building Partnerships Special Operations Air Superiority
Rapid Global Mobility Agile Combat Support Cyberspace Superiority
Space Superiority Air Force Core Functions
Slide 21
Space Superiority Air Superiority Cyberspace Superiority Air
Force Core Functions
Slide 22
The operational advantage in, through, and from cyberspace to
conduct operations at a given time and in a given domain without
prohibitive interference Cyber Superiority
Slide 23
Mission assurance = operational success AF Cyber Mission
Slide 24
Mission Assurance Example Range = 0.5 mile
Slide 25
Mission Assurance ? ? ? ? ?
Slide 26
Airmans Perspective Airmen think of airpower & the
application of force from a functional rather than geographical
perspective. Airmen leverage speed, range, flexibility, precision,
time, and lethality to create effects from and within all domains.
Cyberspace operations are intrinsic to the conduct of modern
airpower. Airmen conduct greatest percentage of global operations.
Operations should be tightly integrated with capabilities of the
air and space domains and should be commanded by an Airman who
takes a broader view of war
Slide 27
Airmans Perspective and Threats
Slide 28
Threats and Vulnerabilities Threat = Capability + Intent
Slide 29
Military Critical Technology Annual Report to Congress
Countries Targeting The U.S. Number Reported Incidents FY10 FY 09
FY08 FY 2010 FY 2009 Information Systems 25 22 2163 47 Sensors
& Lasers17 11 840 46 Electronics11 9 732 37 Armaments/
Energetic Material 12 10 944 26 Aeronautics12 10 936 Marine
Systems6 4 232 24 Guidance / Navigation Technologies 8 4 226 15
Space Systems Technologies 6 5 322 19
Slide 30
Threat = Capability + IntentThreats
Slide 31
Vulnerability = Weakness Operating Systems Poor Practices
Applications OperatorVulnerabilities
Slide 32
Did You Know Social NetworkingSPAM USB ThumbdrivesCell Phones
Wireless DevicesDiscussion
Slide 33
Nuclear Weapons Facility Locating Cyber Weapons
Slide 34
Wheres the Cyber Threat? Locating Cyber Weapons
Slide 35
What do you think you can do to prevent adverse impacts on DOD
and AF networks? Where You Fit Into the Fight
Slide 36
Become a cyber defender. Dont open attachments or click on
links unless the email is digitally signed. Dont connect any
hardware or download any software, applications, music or
information onto our network without approval. Encrypting sensitive
but unclassified and/or mission critical information. Have a
general understanding of the cyberspace domain as well as basic
threats, vulnerabilities, and common countermeasures that any
Airman can employ. Where You Fit Into the Fight
Slide 37
1.The United States is vulnerable to cyberspace attacks by
relentless adversaries attempting to infiltrate our networks at
work and at home millions of times a day, 24/7. Ten Things a Cyber
Wingman Should Know 2. Our enemies plant malicious code, worms,
botnets, and hooks in common websites, software, and hardware such
as thumb drives, printers, etc. 3. Once implanted, this code begins
to distort, destroy, and manipulate information, or phone it home.
Code allows our adversaries to obtain higher levels of credentials
to access highly sensitive information. 4. The enemy attacks your
computers at work and at home knowing you communicate with the Air
Force network by email, or transfer information from one system to
another. 5. As cyber wingmen, you have a critical role in defending
your networks, your information, your security, your teammates, and
your country. 6. You significantly decrease our enemies access to
our networks, critical USAF information and even your personal
identity by taking simple action. 7. Dont open attachments or click
on links unless the email is digitally signed or you can directly
verify the source, even if it appears to be from someone you know.
8. Do not connect any hardware or download any software
applications, music, or information onto our networks without
approval. 9. Encrypt sensitive but unclassified and/or critical
information. Ask your computer systems administrator (CSA) for more
information. 10. Install the free Department of Defense anti-virus
software on your home computer. Your CSA can provide you with your
free copy.
Slide 38
Slide 39
Cyberspace Defined The Air Force Cyber Mission Cyberspace
Superiority The Airmans Perspective Threats and Vulnerabilities
Roles and Responsibilities of all Cyber Wingmen Guided
DiscussionSummary