国家网络防御中心:走向全国网络安全的关键下一步.docx





《国家网络防御中心:走向全国网络安全的关键下一步.docx》由会员分享,可在线阅读,更多相关《国家网络防御中心:走向全国网络安全的关键下一步.docx(96页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、Contentsfiguresvtables vSummaryviiCyber Threats to US National Security 1Cyber threats below the level of Armed Conflict2Cyber Attacks in Crisis or Conflict4linkages between Cyber threats above and below the threshold of Armed Conflict5US Cyber Defense Strategy7What an NCDC Would Do11Cyber Deterrenc
2、e12Active Cyber Defense 14offensive Cyber Actions in Support of Cyber Defense15Cyber incident Response16Preparing for and Conducting Coordinated Cyber Defense in Crisis or Conflict18Prioritizing engagement with Key Partners19identifying escalation Risks that Could Arise in Day-to-Day execution of Ca
3、mpaign Plans19Prioritizing Key Private Sector and international Partner engagements19NCDC Supporting function: Provide a Continuous Net Assessment Process24Accelerating technology insertion 26What an NCDC Would Not Do 26NCDC Organizational Relationships, Structure, and Staffing27NCDCintheoNCD 27orga
4、nizational Structure of an NCDC27leadership and Staffing of an NCDC29Creating a National Cyber Cadre31NCDC Relationships with the NSC and DHS 31organizational Placement and Physical location 35 providers, cloud service providers, and cybersecurity companies could allow them to modify their services
5、to help a large number of private sector companies, citizens, and the US government.A key role of the NCDC would be to identify barriers to effective and timely private-public partnerships and advocate for changes in the US government necessary to improve the overall cyber defense posture of the Uni
6、ted States. Todays system is not set up for operating at the speed of relevance in crisis or conflict, and as a result, in a great power crisis or conflict, there would almost certainly be avoidable failures to “connect the dots” (or avoidable errors in rushing to judgment and incorrectly connecting
7、 dots) and to take action in a timely manner.A continuous net assessment process for cyberspace can be thought of as an ongoing simulation of strategic interactions in cyberspace between the United States and each competitor/adversary (and other relevant players).engaging State and local Governments
8、 and US Allies/PartnersThe NCDC must have strong connectivity with US states and localities to coordinate cyber efforts, including law enforcement and National Guard support. As seen in other national disaster response activities, large cities can be on the front lines and can often provide the earl
9、iest warnings that an attack is underway. One component of the NCDC, perhaps led by a senior Department of Homeland Security (DHS) person with a Federal Bureau of Investigation (FBI) deputy and connected closely to DHSs Cybersecurity and Infrastructure Security Agency (CISA), would be responsible fo
10、r bringing state and local governments appropriately into the planning process and engaging them in operational coordination. Such planning and coordination could also be facilitated by creating secure collaboration capabilities between state cyber “experl centers and the NCDC.The engagement of key
11、US allies and partners in the US governments cyber defense efforts is essential both to improving the defense of US networks and to deterring aggression overseas. The NCDC would be responsible for coordinating and proposing priorities for such engagements across domestic, defense, and intelligence a
12、gencies. One early objective for an NCDC might be to increase the coordinated activities of “like-minded nations and entities.Key Supporting function: A Continuous Net Assessment ProcessIt would be unrealistic to expect effective planning or coordinated government and private sector action to occur
13、day to day or in crisis/conflict in the absence of a shared common perspective of the current situation and an ability to share a visualization of potential future developments. Sustaining a shared common perspective requires creating and maintaining a pl at I or m for securely sharing data and anal
14、ytical insights within the US government and with select private sector partners, at appropriate classification levels. Sharing a visualization of potential future developments requires, additionally, a ganiing/sirnulation platform for conducting (human and machine) simulations and analyses aiming t
15、o anticipate the most likely and most dangerous future adversary courses of actionsincluding responses to actions that the United States might take.Providing shared perspectives on the current situation and potential future developments, through tailored visualization tools based on a wide range of
16、data sources, would be a key role of the NCDC. Such a continuous net assessment process would not be able to “predict precisely what the adversary will do, but over timeand with continued reality testingthe US ability to anticipate potential adversary courses of action should improve. A continuous n
17、et assessment process for cyberspace can be thought of as an ongoing simulation of strategic interactions in cyberspace between the United States and each competitor/ adversary (and other relevant players).This process would be supported by intelligence/counterintelligence assessments and informed b
18、y tabletop war gaming, modeling and simulation, and results from cyber range activities. The objective is not only to assess the current situation but also to assist intelligence analysts, planners, and decision-makers in anticipating potential future adversary courses of action, alternative US opti
19、ons, and how those actions and options may interact with each other and with other key actors choices.Such a net assessment process would help highlight areas where additional information and intelligence are most needed. Because adversaries are adapting as they exploit emerging cyber vulnerabilitie
20、s, this net assessment process could also generate testable hypotheses regarding next adversary moves so that intelligence assets can be directed appropriately, defensive measures can be taken, and offensive measures can be preplanned, lb counter adapting adversaries, this net assessment process mus
21、t exploit new technologies, such as artificial intelligence and machine learning.The NCDC could achieve an initial operating capability with fewer than one hundred personnel, perhaps with as few as thirty to forty.NCDC organizational Structure and StaffingAn NCDC would be an integral part of the con
22、gressionally mandated ONCD. The organizational structure of the NCDC could, and probably should, evolve over time. From the outset, its organization should be based on a few key principles. The director should be a senior civilian with both senior-level US government and private sector experience as
23、 well as the confidence of the National Cyber Director and the deputy national security advisor for cyber and emerging technology. The vice director should also be an experienced leader, with complementary expertise and background, and would likely be either active duty, reservist, or a member of th
24、e National Guard. Deputy directors should, as a group, have experience across all key departments and agencies, including the Departments of Homeland Security, Defense, State, and Treasury as well as various elements of the Intelligence Community. To ensure a continued focus on cyber adversaries, cr
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 国家 网络 防御 中心 走向 全国 网络安全 关键 下一步

限制150内