Professional Documents
Culture Documents
An Introduction To: Cyber-Security
An Introduction To: Cyber-Security
An Introduction to
Cyber-Security
Exploration of key concepts associated with the
evolving nature and practice of Information Security.
The Comprehensive Cyber Security (CCS) Practice and family of solutions
Presented by Stephen Lahanas
August 20, 2010
Copyright 2010 Semantech Inc., All Rights Reserved
Our Purpose
This presentation is designed to highlight both
sides of the Cyber Security story:
Side 1 (The Public View) The impact of
Cyber Security on society and the current
management of information systems.
Side 2 (The Provider View) The necessary
evolution of Security practices which are
emerging as a result of those impacts.
We also intend to help clarify concepts and issues
by examining or in some cases redefining key
terms
Copyright 2010 Semantech Inc., All Rights Reserved
Defining Cyber
Security
What is CyberSpace ?
1. Cyberspace is unique and ubiquitous; it is both its
own domain as well as a dimension within all other
(functional) domains.
2. Cyberspace is both the medium and the message
in many cases. Anything that might involve IP data
transfer or communications has a cyber
component.
3. Cyberspace represents a single point of failure for
the Federal Government. It provides asymmetrical
opponents the opportunity to disrupt and defeat a
vastly superior foe.
Copyright 2010 Semantech Inc., All Rights Reserved
10
11
12
Security is Symbiotic
Cyber Security as a
concept represents a
radical departure from the
previous view of IT-related
security.
In the past, security was
often viewed as a
separate discipline or as
an afterthought. Cyber
Security acknowledges
that IT security must be
symbiotic from now on
Copyright 2010 Semantech Inc., All Rights Reserved
13
14
15
16
Threat Management
17
18
19
20
Information Assurance
21
22
23
Mission Assurance
Security is not an end unto itself, it is a means to
ensure facilitation of other ends.
The mission/s of most enterprises or organizations
now depend entirely on the availability of
information technology. This is fairly well
understood what isnt as well understood is the
growing symbiosis of those missions and their
enabling technologies.
This symbiosis is most critical in the context of
security. Cyber Assurance by nature now
encompasses mission assurance.
Copyright 2010 Semantech Inc., All Rights Reserved
24
Infrastructure
Management
25
26
The Network
Networks have evolved as well. Internet Protocol
or IP has allowed for convergence of many types
of networks:
The wired backbone (much of which now is fiber
optic).
The wired telephone backbone.
Various wireless telephony networks.
Satellite Networks.
Smaller, targeted wired and wireless networks
(some riding on the larger infrastructure, some
not).
27
28
Cyber Operations
29
30
31
32
Cyber Integration
33
34
35
Cyber Semantics
36
Conclusion
Any intelligent device that can pass data to one or
more other devices (either through a network or
not) is encompassed within the scope of Cyber
Security that includes pretty much the entire
foundation of modern society.
Not viewing security from this scope is the single
biggest risk associated with Cyber Terrorism, Cyber
Crime or Cyber Warfare.
In our following presentations, we will drill down to
more specific issues and examples that will help
illustrate what direction the practice of Cyber
Security must proceed to match the growing threat.
Copyright 2010 Semantech Inc., All Rights Reserved
37
CCS Integration
Partners
For more information, visit http://www.cyber-ccs.com
or contact:
Stephen Lahanas
Steve.Lahanas@semantech-inc.com
38