AC Summer 08 WIN-T Online - United States Army Signal Center of ...
AC Summer 08 WIN-T Online - United States Army Signal Center of ...
AC Summer 08 WIN-T Online - United States Army Signal Center of ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>AC</strong>RONYM QUICKSCAN<br />
AFCEA – Armed Forces Communications<br />
and Electronics Association<br />
CDD – Capabilities Description<br />
Document<br />
COTS – Commercial <strong>of</strong>f-the-Shelf<br />
CPD – Capabilities Production<br />
Document<br />
DoD – Department <strong>of</strong> Defense<br />
FCS – Future Combat System<br />
GOTS – Government <strong>of</strong>f-the-Shelf<br />
ICWG – Interface Communications<br />
Working Group<br />
IEEE – Institute <strong>of</strong> Electrical &<br />
Electronics Engineers<br />
JNN-N – Joint Network Node-<br />
Network<br />
JTRS – Joint Tactical Radio<br />
Systems<br />
KPPs – Key Performance Parameters<br />
NCOW – Network Centric Operations<br />
and Warfare<br />
NCES – Network Centric Enterprise<br />
Services<br />
NetOps – Network Operations<br />
NMS – Network Management<br />
Systems<br />
TCM N&S – TRADOC Capabilities<br />
Manager Network & Services<br />
TNOSC – Theater Network<br />
Operations and Securities <strong>Center</strong><br />
TRADOC – Training And Doctrine<br />
Command<br />
<strong>WIN</strong>-T – Warfighter Information<br />
Network-Tactical<br />
WNW – Wideband Networking<br />
Waveform<br />
52 <strong>Summer</strong> 20<strong>08</strong><br />
DiD strategy<br />
ensures security<br />
across<br />
By Deryk Gannon<br />
Ensuring tactical information<br />
reaches the right people at the right<br />
time is essential to the Warfighter’s<br />
safety and mission-related needs.<br />
Project Manager, Warfighter<br />
Information Network-Tactical will<br />
implement a Defense in-Depth<br />
strategy to ensure the integrity <strong>of</strong> this<br />
information. The initial and focal DiD<br />
strategy for <strong>WIN</strong>-T is to segregate<br />
and limit users’ access to the wide<br />
area network and network infrastructure<br />
by using a Global Information<br />
Grid Colorless Core. This colorless<br />
core will ensure all user traffic is High<br />
Assurance Internet Protocol<br />
Encryptor encrypted, as it transits<br />
through the <strong>WIN</strong>-T backbone.<br />
Defense in Depth is a coordination <strong>of</strong><br />
multiple security layers, such as<br />
perimeter, enclave, and host levels;<br />
alert correlation and countermeasures<br />
used in response to cyber threats and<br />
to provide protection <strong>of</strong> information<br />
across an enterprise network.<br />
The <strong>WIN</strong>-T strategy will also<br />
implement DiD fundamentals such as<br />
perimeter protection suite, enclave,<br />
and host-based protection. These<br />
protection mechanisms are a culmination<br />
<strong>of</strong> <strong>Army</strong> approved information<br />
assurance commercial <strong>of</strong>f-the-shelf<br />
hardware and s<strong>of</strong>tware, which<br />
provide firewall, anti-virus detection/<br />
blocking s<strong>of</strong>tware, intrusion detection,<br />
s<strong>of</strong>tware malicious mobile code<br />
detection and access control.<br />
This strategy will include<br />
extending the Department <strong>of</strong> Defense<br />
Public Key Infrastructure to the<br />
Warfighter and Battlefield Command<br />
applications. <strong>WIN</strong>-T will leverage the<br />
DoD PKI to provide stronger user/<br />
device authentication and negate the<br />
<strong>WIN</strong>-T<br />
need for users’ passwords. <strong>WIN</strong>-T<br />
802.1X will be used in conjunction<br />
with the DoD PKI to enforce network<br />
access and auditing. Each <strong>of</strong> these<br />
information assurance mechanisms<br />
and devices will be managed, monitored,<br />
and configured by the <strong>WIN</strong>-T<br />
Network Operations and Security<br />
<strong>Center</strong>, which will provide a single<br />
correlated IA Common Operation<br />
Picture and network InfoCon status.<br />
<strong>WIN</strong>-T transmission systems<br />
will implement National Security<br />
Agency transmission security techniques<br />
to protect over the air broadcast.<br />
This strategy <strong>of</strong> limiting the<br />
users’ direct access enterprise services<br />
is intended to reduce or limit the<br />
insider threat to the overall <strong>WIN</strong>-T<br />
network. This strategy is built into the<br />
program from the start and provides<br />
a strong manageable and upgradable<br />
system to protect all aspects <strong>of</strong> the<br />
<strong>WIN</strong>-T network.<br />
Mr. Gannon is a senior information<br />
assurance and security engineer for Net-<br />
Centric Technology supporting Project<br />
Manager, Warfighter Information<br />
Network-Tactical at Fort Monmouth, N.J.<br />
<strong>AC</strong>RONYM QUICKSCAN<br />
BC – Battle Command<br />
COP – Common Operational<br />
Picture<br />
DiD – Defense in Depth<br />
HAIPE – High Assurance Internet<br />
Protocol Encryptor<br />
IA – Information Assurance<br />
PKI – Public Key Infrastructure<br />
PM – Project Manager<br />
PPS – Perimeter Protection Suite<br />
<strong>WIN</strong>-T – Warfighter Information<br />
Network Tactical