WELCOME The National Security Agency (NSA) and its predecessors have been protecting the United States’ most sensitive information since World War II. As communication technology and information technology have advanced — creating a more interconnected world with an increasing number of threats — NSA’s mission has expanded and it has embraced new responsibilities and operational authorities to ensure our networks remain secure. Today, NSA’s cybersecurity mission integrates its cryptographic expertise, signals intelligence, vulnerability analysis, defensive operations, and more to prevent and eradicate cyber threats to: NATIONAL SECURITY SYSTEMS (NSS) Networks that contain classified information or are otherwise critical to United States military and intelligence activities. It is vital that these networks remain secure to ensure mission readiness of U.S. warfighting capabilities as well as protect the nation’s most sensitive information. THE DEPARTMENT OF DEFENSE (DOD) U.S. military services and combatant commands as well as U.S. government agencies and departments related to national security. THE DEFENSE INDUSTRIAL BASE (DIB) Companies that design, develop, operate, and maintain the Department of Defense’s critical systems, platforms, and technologies required to defend the nation. If these networks are at risk, so is the U.S. While much of the critical work NSA does to secure th e nation cannot be publicly disclosed, this year in review shares a wealth of information on cybersecurity efforts that have better equipped the U.S. to defend against the highest priority cyber threats. Visit NSA. gov/cybersecurity to access the report digitally . Provide NSA Cybersecurity with feedback or ask questions by emailing cybersecurity@nsa.gov .TABLE OF CONTENTS LETTER FROM THE NSA CYBERSECURITY DIRECTOR 02 RESPONDING TO NATIONAL THREATS AND PRIORITIES 04 PARTNERING WITH INDUSTRY 08 ARMING NET DEFENDERS WITH GUIDANCE 16 DEFENDING OUR MOST CRITICAL NETWORKS 19 CREATING CRYPTOGRAPHY TO PROTECT DATA, COMMUNICATIONS 22 PROTECTING THE WARFIGHTER AND SUPPORTING THE COMBATANT COMMANDS26 RESEARCHING CYBERSECURITY SOLUTIONS 31 DEVELOPING THE CURRENT AND NEXT GENERATION OF CYBER EXPERTS34LETTER FROM THE NSA CYBERSECURITY DIRECTOR CYBERSPACE IS DANGEROUS More than a month before Russian troops invaded Ukraine in February, a cyberattack took down several of Ukraine’s government websites. An ominous message greeted visitors: “… be afraid and expect the worst. This is your past, present and future.” While Europe hasn’t seen this level of kinetic activity since World War II, this hybrid war started in cyberspace. It’s an environment where actors can increase their power, degrade others, and gain a strategic advantage — often at a very low cost. In the weeks leading up to and following Russia’s invasion in Ukraine, at least seven new families of destructive data wipers were used. One even attacked satellite broadband service to disrupt Ukraine’s military communications on the day of the invasion but spilled beyond the conflict, impacting critical infrastructure remote monitoring of wind turbines in Germany, emergency services in France, and internet access of select users in Europe. Industry observed and reported on many of these destructive wipers, demonstrating their unique insights into the conflict. The Russian threats did not stop with Ukraine. Hacktivists targeted our Defense Industrial Base and the communications and weapons systems of EUCOM and NATO were in the crosshairs of our adversaries. The keys, codes, and cryptography we provide are vital: Encryption is the last line of defense. Our focus extends beyond the Russia-Ukraine conflict, but this example demonstrates the complex environment. Our approaches must scale for China, Iran, North Korea, cybercrime, and other threats. In addition to the insights we receive from industry, we are committed to

PDF文档 NSA:2022网络空间安全年度回顾

安全报告 > 其他 > 文档预览
中文文档 40 页 50 下载 1000 浏览 0 评论 0 收藏 3.0分
温馨提示:本文档共40页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
NSA:2022网络空间安全年度回顾 第 1 页 NSA:2022网络空间安全年度回顾 第 2 页 NSA:2022网络空间安全年度回顾 第 3 页
下载文档到电脑,方便使用
本文档由 SC2023-05-03 01:08:07上传分享
给文档打分
您好可以输入 255 个字符
网站域名是多少( 答案:github5.com )
评论列表
  • 暂时还没有评论,期待您的金玉良言
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们微信(点击查看客服),我们将及时删除相关资源。