22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

379<br />

nations including Government of the Islamic Republic of Afghanistan (GIRoA),<br />

as well as between NATO forces <strong>and</strong> international organizations such as the United<br />

Nations World Food Programme.<br />

These classical use cases are expected to constitute the main source of traffic<br />

mediated by the HAAG in the NATO Future Mission Networks (FMN) <strong>and</strong><br />

of the NATO Network Enabled Capability (NNEC). However, future networks will<br />

also likely need to support real-time sharing of information between functional<br />

services running in different security domains. Two examples of such emerging<br />

use cases, i.e. cyber defence information exchange <strong>and</strong> civilian-military cooperation<br />

(CIMIC) in passive missile defence applications, are discussed in more<br />

details below.<br />

A. Cyber defence information exchange infrastructure<br />

Cyber defence is quickly becoming one of the critical tasks as the military<br />

operations rely more <strong>and</strong> more on capabilities provided by the <strong>Communications</strong><br />

<strong>and</strong> <strong>Information</strong> Systems (CIS). Not only must the CIS be protected before going<br />

into operation but there must also be a capability to respond <strong>and</strong> recover from attacks<br />

targeting these systems during their operation. In federated environments,<br />

where no one has control over the entire system, collaboration between different<br />

parties is critical in order to ensure effective cyber defence. However, exchange<br />

of the relevant information is often sensitive, <strong>and</strong> requires careful control of release.<br />

At the same time relevant information from public sources should be automatically<br />

imported.<br />

Therefore, the cyber defence information exchange infrastructure (CDXI)<br />

must support both the ability to import information from public sources as well<br />

as partners, <strong>and</strong> also ability to selectively share information. This requires a strict<br />

control of boundary such as the one provided by the HAAG. Further, the ability<br />

to automatically release information based on the associated metadata is critical<br />

in order to support the strict timeliness requirements in cyber defence. An example<br />

of CDXI architecture is shown in Figure 1.<br />

As shown in the Figure 1, the control barrier is needed in order to ensure that<br />

only authorized data is shared, <strong>and</strong> that only quality assured information is imported<br />

into the organizational domain. As some of the data sources on the low side typically<br />

will be public sources, the assurance level of the control barrier must be high.<br />

The type of information exchanges can include vulnerability <strong>and</strong> exploit information,<br />

incidence information, as well as a number of other types of information<br />

that potentially could be very useful in federated incidence h<strong>and</strong>ling. The format<br />

of the information should allow automated processing, as manual processing is not<br />

time effective when trying to combat cyber-attacks.<br />

The actual format depends on the type of information, <strong>and</strong> a number of st<strong>and</strong>ardization<br />

efforts are currently underway to support such information sharing

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!