SECRET Internet Protocol Router Network (SIPRNET)

Slides:



Advertisements
Similar presentations
Industrial Security 2010 Worldwide Security Conference.
Advertisements

ELOC Bank Table Top Exercise Executive Leadership of Cybersecurity Austin, TX December 3,
Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Unit Outline Information Security Risk Assessment Module 1: Introduction to Risk Module 2: Definitions and Nomenclature Module 3: Security Risk Assessment.
Virtual Private Networking Karlene R. Samuels COSC513.
Roles and Responsibilities
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
A Combat Support Agency Defense Information Systems Agency Unified Capabilities Requirements (UCR) Overview Joint Interoperability Test Command.
Contractor SIPRNet Process
COMMUNICATIONS DESIGN AND IMPLEMENTATION 2010 Communications Design in Military Projects.
COR1000 Telecoms Project UK Link Committee Update September 2012.
National Law Enforcement and Corrections Technology Center - West The Security Summit Law Enforcement – Finding, Evaluating & Employing Best-of-Breed Technologies.
Cisco Threaded Case Study
Technical Security VTC 15 December 2010
Information Assurance Program Manager U.S. Army Europe and Seventh Army Information Assurance in Large-Scale Practice International Scientific NATO PfP/PWP.
Information Sharing Challenges, Trends and Opportunities
FLOOR CANDY.
CPT 123 Internet Skills Class Notes Internet Security Session A.
Jewuan Davis DSN Voice Connection Approval Office 18 May 2006 DSN Connection Approval Process (CAP)
UNCLASSIFIED Dwayne Slide 1 of 10 Network Enterprise Center (NEC) US Army Garrison (USAG) Fort Detrick Dwayne.
The Army’s Cyber Force Operating and Defending the Army’s Network Enterprise 106 th Signal Brigade Army Mobility (Devices and Services) “Mobility becomes.
5/18/2006 Department of Technology Services Security Architecture.
1 Executive Leadership of Cybersecurity Austin, TX December 3, 2014 ELOC Bank Table Top Exercise.
Defense Security Service Contractor SIPRNet Process June 2013
Network Components Basics!. Network HUB  Used to connect multiple Ethernet devices together  Layer 1 of the OSI model  Not used much today.
Mandatory Declassification Review and the Interagency Security Classification Appeals Panel Society of American Archivists, Austin, Texas Session 603:
SECRET Internet Protocol Router Network (SIPRNET)
Energy Huntsville Opportunity Report and Government Collaboration February 2016.
COR1000 Telecoms Project UK Link Committee Update May 2013.
Fort Detrick Installation Restoration Program Area B Groundwater November 1, 2010 Fort Detrick, Maryland A Sustainable Community of Excellence.
Contestability in Connections Contestability Working Group Meeting NIE/SONI Joint Presentation 9 September
1 Standards and Construction Specifications Manual Orange County Utilities February 13, 2007.
Virtual Private Networks
Georgia Tech Safety and Health Consultation Program
Transfer of data in ICT systems
Virtual Private Network (VPN)
Virtual Private Network
Improving Mission Effectiveness By Exploiting the Command’s Implementation Of the DoD Enterprise Services Management Framework - DESMF in the [name the.
SLIGP Update for NPSTC/IACP Public Safety Broadband Forum
RP3 Program Overview RP3 Webinar Series: Reliability
Cisco Router Technology
How To Apply For Grants using Grants.gov
Improving Mission Effectiveness By Exploiting the Command’s Implementation Of the DoD Enterprise Services Management Framework - DESMF in the [name the.
Army Geospatial Center
Unitized Group Ration-A Workshop
Interconnection Practice, Policies, Procedures ComEd Illinois
French experience with NDS NDS User meeting Mexico : 7-9 May 2007
Virtual Private Network (VPN)
Connection Grants November 24, 2015
NC Truck Driver Training SCHOOL
Virtual Private Network
Virtual Private Networks
$164 million K12 Strong Workforce Program and Funding Overview
Joint Staff J8, Deputy Director for C4
Bluetooth.
Connectivity methods. Connectivity methods Exam Answer WAN/LAN  Each office will have its own Local Area Network or LAN.  But the company also wants.
Connection Grants November 24, 2015
Chapter 3 VLANs Chaffee County Academy
~ 20% of employees are military veterans.
Management Information Systems: Classic Models and New Approaches
Preparing for a Stack Test
Surface Mount Technology Laboratory
The Internet: Encryption & Public Keys
was not invented by Al Gore…
COR1000 Telecoms Project UK Link Committee Update
Enhanced 911 for VoIP Standards and Regulatory
Topic 12: Virtual Private Networks
2015 January February March April May June July August September
Presentation transcript:

SECRET Internet Protocol Router Network (SIPRNET)

Explanation of SIPRNET The SIPRNET is the Defense Department's communications backbone, used for passing tactical and operational information at the secret classification level. The Joint Staff J-6 and the National Security Agency, Defense Intelligence Agency and Defense Information Systems Agency directors administer the SIPRNET jointly. These officers are called the SIPRNET designated approving authorities. They and their representatives (normally the Defense Information Systems Network Security Accreditation Working Group) manage the shared risk of the SIPRNET system and decide who can connect when, where and how.

Requirement for SIPRNET Depending upon your unique situation, SIPRNET may be installed in several ways: Site must have SIPRNET POP (must arrange for this circuit through DISA) KIV / TACLANE / Sectera end equipment (used to extend the SIPRNET circuit to user) Protected Wire Distribution may be required (when the user is not in the same room as the encryption equipment)

Example of SIPRNET (at POP)

Example of SIPRNET (at User)

SIPRNET References Army Regulation 25-1, Army Information Management, 31 May 2002 (http://www.army.mil/usapa/epubs/pdf/r25_1.pdf) Army Regulation 25-2, Information Assurance, 14 November 2003 (http://www.army.mil/usapa/epubs/pdf/r25_2.pdf) Army Regulation 380-5, Department of the Army Information Security Program, 29 September 2000 (http://www.army.mil/usapa/epubs/pdf/r380_5.pdf) Army Regulation 380-19, Information Systems Security, 27 February 1998 (http://www.fas.org/irp/doddir/army/r380_19.pdf) NSTISSAM TEMPEST/2-95, Red/Black Installation Guidance, 12 December 1995 (http://cryptome.sabotage.org/tempest-2-95.htm) NSTISSI No. 7003, Protective Distribution Systems (PDS), 13 December 1996 (http://www.nstissc.gov/Assets/pdf/nstissi_7003.pdf) SIPRNET Customer Connection Process Guide, 19 June 2003

FDED Capabilities The Fort Detrick Engineering Directorate provides engineering and installation assistance at the request of Army DOIMs and other customers who require SIPRNET extensions. Engineering design with cost estimate for implementation of secure data communication links . Implementation / installation of the SIPRNET extension. If you would like to “hire” ISEC for your SIPRNET needs, please contact Mike Dayhoff (DSN 343-6406) or Cal Farrar (DSN 343-6417).