Upload
pamela-maxwell
View
220
Download
4
Embed Size (px)
DESCRIPTION
3 Beyond Communication: Interoperability Layer Relationships C onnectivity C onfidentiality C ommunication C ontrol C ommand C oordination C ooperation C ollaboration SOCIAL TECHNICAL / FUNDAMENTAL OPERATIONAL
Citation preview
Communications
Randy CieslakChief Information Officer
21 March 2012
2
USCENTCOM
USAFRICOM
Asia-Pacific Region
The Asia-Pacific region encompasses51% of the Earth’s Surface
3
Beyond Communication:Interoperability Layer Relationships
Connectivity
Confidentiality
Communication
Control
Command
Coordination
Cooperation
Collaboration
SOCIAL
TECHNICAL / FUNDAMENTAL
OPERATIONAL
4
Communication Interoperability Tiers
Connectivity
Confidentiality
Communication
Collaboration
Coordination
Cooperation
Control
Command
Physical Links, Technical Protocols, Capacity, Order
Protection, Encryption, Trust
Processing Ability, Display Clarity, Language, Culture
Give and take to exchange ideas and/or negotiate positions
Mutual decisions and actions to avoid interference
Mutual decisions and actions to improve performance
Directed actions to accomplish a task or achieve an effect
Directed authority to accomplish a mission
TEC
HN
ICA
LS
OC
IAL
OP
ER
ATION
AL
5
ENCLAVE
Container
Connecting Users and Information
Information Consumers
Information Producers
ALIGN
Information Sharing Community
Network and Enclave Channels
COI AuthorizedInformation Set
CHANNEL
Community
Information Product
How do we create a network that connects users from multiple nations to authorized information on a common network infrastructure considering the expanse of the area of responsibility?
Sensitive Information Set (SIS)
Network Security Enclave (NSE)
Community of Interest (COI)
Problem Statement:Today’s Global Information Grid (GIG)
• A cacophony of service and enterprise networks– Stovepipes that impede information flow– Seams between Services that are exploited by adversaries– Bifurcation that dilutes responsibility and accountability – Complexity that makes it difficult to implement policy and insert
technology• As such today’s GIG is inherently:
– Difficult to secure• Costly to implement necessary security mechanisms
– Inefficient• Rife with duplication between the Services and Agencies
– Inflexible• Networks are dedicated to information sharing communities
and locked-in preventing re-use for alternate information sharing communities (i.e., “communities of interest”)
6
Let’s hear some ideas...
7