IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cyber Security in Tactical Network Infrastructure for Command and Control

Cyber Security in Tactical Network Infrastructure for Command and Control
View Sample PDF
Author(s): J. Sigholm (Swedish National Defence College, Sweden)
Copyright: 2014
Pages: 29
Source title: Network Topology in Command and Control: Organization, Operation, and Evolution
Source Author(s)/Editor(s): T. J. Grant (R-BAR, The Netherlands), R. H. P. Janssen (Netherlands Defence Academy, The Netherlands) and H. Monsuur (Netherlands Defence Academy, The Netherlands)
DOI: 10.4018/978-1-4666-6058-8.ch011

Purchase

View Cyber Security in Tactical Network Infrastructure for Command and Control on the publisher's website for pricing and purchasing information.

Abstract

Emerging information and communications technology has had significant importance for military operations during the last decades. Development within such technology areas as sensors, computers, and wireless communications has allowed for faster and more efficient collection, transmission, storage, processing, analysis, and distribution of data. This has led to new and improved military capabilities within command and control, intelligence, targeting, and logistics. However, the increased complexity and interdependencies of networked systems, the continuously growing amounts of data, changing non-technical requirements, and evolving adversary threats makes upholding cyber security in command and control systems a challenging task. Although some best-practice approaches have been developed, finding good solutions for protecting critical infrastructure and important information assets is still an open research question requiring an interdisciplinary approach. This chapter describes recent developments within emerging network technology for command and control, and suggests focus areas where further research is needed in order to attain sufficient operational effect from the employed systems. While a gradual and evolutionary progress of military cyber security has been seen, a long-term commitment is required within such areas as procurement, standardization, training, doctrinal, and legal development, in order to achieve military utility of command and control systems.

Related Content

Stojan Kitanov, Borislav Popovski, Toni Janevski. © 2019. 36 pages.
Noman Islam, Ainuddin Wahid Abdul Wahab. © 2019. 34 pages.
Ashraf Aboshosha, Mohamed B. El-Mashade, Ehab A. Hegazy. © 2019. 19 pages.
Adam Wong Yoon Khang, Mohamed Elshaikh Elobaid, Arnidza Ramli, Nadiatulhuda Zulkifli, Sevia Mahdaliza Idrus. © 2019. 15 pages.
Hesham Mohammed Ali Abdullah, A.V. Senthil Kumar. © 2019. 20 pages.
Elisavet Grigoriou. © 2019. 22 pages.
Anandkumar R, Kalpana R.. © 2019. 19 pages.
Body Bottom