Recommendations on Future Operational Environments Command Control and Cyber Security

نویسنده

  • Kerim Goztepe
چکیده

—It is a well-known fact that today a nation's telecommunication networks, critical infrastructure, and information systems are vulnerable to growing number of attacks in cyberspace. Cyber space contains very different problems involving various sets of threats, targets and costs. Cyber security is not only problem of banking, communication or transportation. It also threatens core systems of army as command control. Some significant recommendations on command control (C2) and cyber security have been suggested for army computing environment in this paper. This study addresses priorities of " what should be done for a better army cyber future " to cyber security researchers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Operational Exercise Integration Recommendations for DoD Cyber Ranges

Permission has been given to destroy this document when it is no longer needed. Cyber-enabled and cyber-physical systems connect and engage virtually every mission-critical military capability today. And as more warfighting technologies become integrated and connected, both the risks and opportunities from a cyberwarfare continue to grow—motivating sweeping requirements and investments in cyber...

متن کامل

Cyber Command and Control: A Military Doctrinal Perspective on Collaborative Situation Awareness for Decision Making

Cyber-space is emerging as the fifth domain of warfare and a crucial operational concern for commercial industry. As such, it requires a command and control system that enables defensive and operational capabilities within cyber-space. This chapter describes a research and development project aimed at discovering solutions for a Cyber Command and Control both for commercial and military environ...

متن کامل

Cyber Security in Tactical Network Infrastructure for Command and Control

Emerging information and communications technology has had significant importance for military operations during the last decades. Development within such technology areas as sensors, computers, and wireless communications has allowed for faster and more efficient collection, transmission, storage, processing, analysis, and distribution of data. This has led to new and improved military capabil...

متن کامل

Active cyber defense with denial and deception: A cyber-wargame experiment

In January 2012, MITRE performed a real-time, red team/blue team cyber-wargame experiment. This presented the opportunity to blend cyber-warfare with traditional mission planning and execution, including denial and deception tradecraft. The cyberwargame was designed to test a dynamic network defense cyber-security platform being researched in The MITRE Corporation’s Innovation Program called Bl...

متن کامل

Resiliency in Future Cyber Combat

Rigid cyberspace defenses are proving unable to meet advanced and modern cyberspace threats. As a result, there has been increasing focus and interest in cyber resiliency, but what will it take to be resilient in future cyber combat? We can glean some useful concepts from the ancient Japanese proverb about the resiliency of bamboo in a storm. In comparison with the massive oak, which relies on ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1502.06422  شماره 

صفحات  -

تاریخ انتشار 2015