Security Vulnerabilities in Command and Control Interoperability

نویسنده

  • John A. Hamilton
چکیده

This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation to support the evaluation of the effects of worm-induced packet storms and the experimental design, implementation and results using the OPNET simulation environment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Ontology-based Approach to Model Common Vulnerabilities and Exposures in Information Security

Machine understandable security vulnerabilities are in need for security content automation [2]. Common Vulnerabilities and Exposures (CVE) is an industry standard of common names for publicly known information security vulnerabilities, and has been widely adopted by organizations to provide better coverage, easier interoperability, and enhanced security [1]. In this paper, we focus our researc...

متن کامل

Security Issues in the Architecture of the Global Command and Control System ( GCCS ) Experience

The Global Command and Control System (GCCS) was one of the most ambitious and largest software integration tasks in the history of the Department of Defense. As the Chief Systems Engineer for GCCS, I found architectural differences among command and control systems presented unique integration and interoperability challenges. In this paper I present 3 security-related examples of specific prob...

متن کامل

Mapping Security Needs to Critical Organizational Functions

As information systems become increasingly important to the functions of organizations, security and reliable operation of these systems are also becoming increasingly important. Interoperability, information sharing, collaboration, design imperfections, limitations, and the like lead to vulnerabilities that can endanger information system security and operation. Unfortunately, understanding an...

متن کامل

Security Issues Resulting from Interoperability

Once coalition networks are established, the vulnerability of information systems may increase. Internal propagation of a worm with the characteristics of, for example, “Nimbda” or “Code Red” can generate internal broadcast storms behind the network firewalls. There are significant limitations to applying simulation information security issues. Most security vulnerabilities occur at the end poi...

متن کامل

Improving Test Conformance of Smart Cards versus EMV-Specification by Using on the Fly Temporal Property Verification

Electronic payment transactions using smart card are based on the Europay Mastercard Visa (EMV) specifications. This standard appeared in 1995 in order to ensure security and global interoperability between EMV-compliant smart cards and EMV-compliant payment terminals throughout the world. Another purpose of EMV specifications is to permit a secure control of offline credit card transaction app...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003