Security Vulnerabilities in Command and Control Interoperability
نویسنده
چکیده
This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation to support the evaluation of the effects of worm-induced packet storms and the experimental design, implementation and results using the OPNET simulation environment.
منابع مشابه
An Ontology-based Approach to Model Common Vulnerabilities and Exposures in Information Security
Machine understandable security vulnerabilities are in need for security content automation [2]. Common Vulnerabilities and Exposures (CVE) is an industry standard of common names for publicly known information security vulnerabilities, and has been widely adopted by organizations to provide better coverage, easier interoperability, and enhanced security [1]. In this paper, we focus our researc...
متن کاملSecurity Issues in the Architecture of the Global Command and Control System ( GCCS ) Experience
The Global Command and Control System (GCCS) was one of the most ambitious and largest software integration tasks in the history of the Department of Defense. As the Chief Systems Engineer for GCCS, I found architectural differences among command and control systems presented unique integration and interoperability challenges. In this paper I present 3 security-related examples of specific prob...
متن کاملMapping Security Needs to Critical Organizational Functions
As information systems become increasingly important to the functions of organizations, security and reliable operation of these systems are also becoming increasingly important. Interoperability, information sharing, collaboration, design imperfections, limitations, and the like lead to vulnerabilities that can endanger information system security and operation. Unfortunately, understanding an...
متن کاملSecurity Issues Resulting from Interoperability
Once coalition networks are established, the vulnerability of information systems may increase. Internal propagation of a worm with the characteristics of, for example, “Nimbda” or “Code Red” can generate internal broadcast storms behind the network firewalls. There are significant limitations to applying simulation information security issues. Most security vulnerabilities occur at the end poi...
متن کاملImproving Test Conformance of Smart Cards versus EMV-Specification by Using on the Fly Temporal Property Verification
Electronic payment transactions using smart card are based on the Europay Mastercard Visa (EMV) specifications. This standard appeared in 1995 in order to ensure security and global interoperability between EMV-compliant smart cards and EMV-compliant payment terminals throughout the world. Another purpose of EMV specifications is to permit a secure control of offline credit card transaction app...
متن کامل