Skip to main content

Currently Skimming:

2 The Immediate Response - Current Information Assurance and Cyberdefense Initiatives
Pages 33-50

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 33...
... instruction documents as "measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities." 1 Additionally, the DOD's long-term vision for an effective network-centric operating environment -- and the associated Global Information Grid (GIG)
From page 34...
... 5The committee was briefed by the portfolio manager of the GIG Information Assurance Portfolio program, which is developing such a comprehensive listing (Richard Scalco, GIG IA Portfolio Man ager, "GIG IA Portfolio Management Office," presentation to the committee, July 16, 2008, National Security Agency, Fort Meade, Md.)
From page 35...
... for these activities; • To ensure feedback from CNA and CNE activities into CND planning and execution, and to ensure that a similar feedback loop exists for CI activities; • To provide a complete and coordinated picture of cyber activities within the DON; • To ensure a synchronized and coordinated investment in cyber activities; and 6 John Lussier, Department of the Navy Deputy Chief Information Officer, "Department of the Navy CIO Organization," presentation to the committee, March 6, 2008, Washington, D.C. 7 Prometheus is the name given to an information technology system recently implemented by the Navy Cyber Defense Operations Command (NCDOC)
From page 36...
... The list of DON initiatives presented in Table 2.1 is not complete, as can be seen by comparing it with the naval initiatives discussed in the subsections below addressing IA initia tives sponsored by the Naval Network Warfare Command (NETWARCOM) , the Navy Information Systems Security Program (ISSP)
From page 37...
... Navy/Marine concept Corps Intranet Attribute-Based Access "Sweet 16"a Next Generation Control (pilot) Enterprise Network Security Secretary of the Navy Plan and Concept Warning Orders of Operation Wireless Security Cyber Asset Reduction and Security aThe Navy/Marine Corps Intranet information assurance initiatives -- commonly referred to as the "Sweet 16" -- are discussed in the subsection entitled "Navy/Marine Corps Intranet" in the present chapter and are presented in Table 2.4.
From page 38...
... Supply Chain Risk Trusted Computing Management Consortium (ongoing) Joint Task Force–Global Network Operations Security Awareness Messages aThe Demilitarized zone, or DMz, approach to defending the Global Information Grid provides a separate interface to the Internet and external DOD connections, thus limiting vulnerabilities to malicious attacks, worms, and viruses that plague the Internet.
From page 39...
... The single largest individual Fy 2009 budgetary item in the Navy's ISSP is the Navy Cryptographic Modernization Program and its associated secure communications, budgeted at $8.75 million in this particular program element.15 13The ISSP effort is a naval enterprise-wide responsibility derived from requirements outlined in the Secretary of the Navy Instruction 5239.3A, Department of the Navy Information Assurance Policy (INFOSEC) Program, Washington, D.C., December 20, 2004.
From page 40...
... and network programs associated with large specific naval program activities, in addition to the targeted IA-focused projects of the ISSP. The committee was briefed in detail on three such major programs: the Navy/Marine Corps Intranet, the planned Next Generation Enterprise Network (a follow-on to NMCI)
From page 41...
... A list of the top 16 current NMCI network security initiatives is provided in Table 2.4; all are scheduled to be implemented before NMCI transitions to NGEN in 2010. Next-generation Enterprise Network Current plans are for the Next Generation Enterprise Network to encompass the current Navy/Marine Corps Intranet, plus the Overseas Navy Enterprise Network (ONE-Net)
From page 42...
... Bradshaw, Naval Network Warfare Command, Global Network Operations Center, "NMCI IA Overview," April 29, 2008, Norfolk, Va.
From page 43...
... Simpson, USN, Director, Navy Networks, Deputy Chief of Naval Operations, Communication Networks (N6) , "Next 43 Generation Enterprise Network (NGEN)
From page 44...
... Consolidated Afloat Networks and Enterprise Services The Navy's Consolidated Afloat Networks and Enterprise Services program is primarily a system redesign and acquisition program for afloat networks; however, it can also be viewed as a broad initiative designed to consolidate and reduce network infrastructure,18 reduce legacy systems aboard ships, and provide increased network capability to the afloat platform enclaves. Key IA-related initiatives included in the CANES common computing environment are its builtin computer network defense capabilities, its cross-domain solutions, and its utilization of service-oriented architectures (SOAs)
From page 45...
... For the purpose of brevity, these initiatives are not listed separately in this report. However, in addition to the previously reported naval initiatives, SPAWAR's PEO C4I and PEO Space personnel are also the primary responsible Navy party for designing and engineering system-wide defense-in-depth concepts; they are also the responsible party for developing IA architecture guidance as it relates to the execution of SOA implementation in naval systems.20 FLEET INFORMATION ASSURANCE INITIATIVES The committee held discussions with the Commander, U.S.
From page 46...
... . Also, in this program, the GIAP claims responsibility for leading the "enterprise enabling" IA initiatives, such as the Public Key Infrastructure and the Key Management Infrastructure, across the DOD.
From page 47...
... ) Assured Information Sharing Cross Domain Sharing, Multinational Information Sharing Enterprise Security Management Key Management Infrastructure, Pubic Key Infrastructure, Privileged Management Foundational IA Training, Enterprise-Wide Certification and Accreditation, Best Practices SOURCE: Derived from information presented to the committee by Richard Scalco, GIG IA Portfolio Manager, "GIG IA Portfolio Management Office," July 16, 2008, Fort Meade, Md.
From page 48...
... It will require significant efforts to achieve this comprehensive view -- something that the committee views as necessary in order to select and synchronize integrated IA solutions. OTHER INFORMATION ASSURANCE INITIATIVES In addition to previously discussed information assurance initiatives, the committee was also briefed on work underway at the Defense Advanced Research Projects Agency and at NSA, and it received an overview of research currently included in the Comprehensive National Cyber Security Initiative.
From page 49...
... ) , in collaboration with the Office of the Secretary of Defense and the National Security Agency, should conduct a thorough examination of technical opportunities and architec tural options and develop a comprehensive plan for reengineering naval networks and computing enclaves to be resilient through cyberattacks by sophisticated adversaries.
From page 50...
... The defensive capability provided by information assurance should be supported and augmented by cybersurveillance and cyberattack -- just as defense in "traditional" naval warfighting operations is integrated with surveillance and attack. The remaining chapters of this report elaborate on these findings and recom mendations and provide additional recommendations for improving matters.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.