12.12.2012 Views

AC Summer 08 WIN-T Online - United States Army Signal Center of ...

AC Summer 08 WIN-T Online - United States Army Signal Center of ...

AC Summer 08 WIN-T Online - United States Army Signal Center of ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>AC</strong>RONYM QUICKSCAN<br />

AFCEA – Armed Forces Communications<br />

and Electronics Association<br />

CDD – Capabilities Description<br />

Document<br />

COTS – Commercial <strong>of</strong>f-the-Shelf<br />

CPD – Capabilities Production<br />

Document<br />

DoD – Department <strong>of</strong> Defense<br />

FCS – Future Combat System<br />

GOTS – Government <strong>of</strong>f-the-Shelf<br />

ICWG – Interface Communications<br />

Working Group<br />

IEEE – Institute <strong>of</strong> Electrical &<br />

Electronics Engineers<br />

JNN-N – Joint Network Node-<br />

Network<br />

JTRS – Joint Tactical Radio<br />

Systems<br />

KPPs – Key Performance Parameters<br />

NCOW – Network Centric Operations<br />

and Warfare<br />

NCES – Network Centric Enterprise<br />

Services<br />

NetOps – Network Operations<br />

NMS – Network Management<br />

Systems<br />

TCM N&S – TRADOC Capabilities<br />

Manager Network & Services<br />

TNOSC – Theater Network<br />

Operations and Securities <strong>Center</strong><br />

TRADOC – Training And Doctrine<br />

Command<br />

<strong>WIN</strong>-T – Warfighter Information<br />

Network-Tactical<br />

WNW – Wideband Networking<br />

Waveform<br />

52 <strong>Summer</strong> 20<strong>08</strong><br />

DiD strategy<br />

ensures security<br />

across<br />

By Deryk Gannon<br />

Ensuring tactical information<br />

reaches the right people at the right<br />

time is essential to the Warfighter’s<br />

safety and mission-related needs.<br />

Project Manager, Warfighter<br />

Information Network-Tactical will<br />

implement a Defense in-Depth<br />

strategy to ensure the integrity <strong>of</strong> this<br />

information. The initial and focal DiD<br />

strategy for <strong>WIN</strong>-T is to segregate<br />

and limit users’ access to the wide<br />

area network and network infrastructure<br />

by using a Global Information<br />

Grid Colorless Core. This colorless<br />

core will ensure all user traffic is High<br />

Assurance Internet Protocol<br />

Encryptor encrypted, as it transits<br />

through the <strong>WIN</strong>-T backbone.<br />

Defense in Depth is a coordination <strong>of</strong><br />

multiple security layers, such as<br />

perimeter, enclave, and host levels;<br />

alert correlation and countermeasures<br />

used in response to cyber threats and<br />

to provide protection <strong>of</strong> information<br />

across an enterprise network.<br />

The <strong>WIN</strong>-T strategy will also<br />

implement DiD fundamentals such as<br />

perimeter protection suite, enclave,<br />

and host-based protection. These<br />

protection mechanisms are a culmination<br />

<strong>of</strong> <strong>Army</strong> approved information<br />

assurance commercial <strong>of</strong>f-the-shelf<br />

hardware and s<strong>of</strong>tware, which<br />

provide firewall, anti-virus detection/<br />

blocking s<strong>of</strong>tware, intrusion detection,<br />

s<strong>of</strong>tware malicious mobile code<br />

detection and access control.<br />

This strategy will include<br />

extending the Department <strong>of</strong> Defense<br />

Public Key Infrastructure to the<br />

Warfighter and Battlefield Command<br />

applications. <strong>WIN</strong>-T will leverage the<br />

DoD PKI to provide stronger user/<br />

device authentication and negate the<br />

<strong>WIN</strong>-T<br />

need for users’ passwords. <strong>WIN</strong>-T<br />

802.1X will be used in conjunction<br />

with the DoD PKI to enforce network<br />

access and auditing. Each <strong>of</strong> these<br />

information assurance mechanisms<br />

and devices will be managed, monitored,<br />

and configured by the <strong>WIN</strong>-T<br />

Network Operations and Security<br />

<strong>Center</strong>, which will provide a single<br />

correlated IA Common Operation<br />

Picture and network InfoCon status.<br />

<strong>WIN</strong>-T transmission systems<br />

will implement National Security<br />

Agency transmission security techniques<br />

to protect over the air broadcast.<br />

This strategy <strong>of</strong> limiting the<br />

users’ direct access enterprise services<br />

is intended to reduce or limit the<br />

insider threat to the overall <strong>WIN</strong>-T<br />

network. This strategy is built into the<br />

program from the start and provides<br />

a strong manageable and upgradable<br />

system to protect all aspects <strong>of</strong> the<br />

<strong>WIN</strong>-T network.<br />

Mr. Gannon is a senior information<br />

assurance and security engineer for Net-<br />

Centric Technology supporting Project<br />

Manager, Warfighter Information<br />

Network-Tactical at Fort Monmouth, N.J.<br />

<strong>AC</strong>RONYM QUICKSCAN<br />

BC – Battle Command<br />

COP – Common Operational<br />

Picture<br />

DiD – Defense in Depth<br />

HAIPE – High Assurance Internet<br />

Protocol Encryptor<br />

IA – Information Assurance<br />

PKI – Public Key Infrastructure<br />

PM – Project Manager<br />

PPS – Perimeter Protection Suite<br />

<strong>WIN</strong>-T – Warfighter Information<br />

Network Tactical

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!