Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • harvard-cite-them-right
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Cyber Security in Tactical Network Infrastructure for Command and Control
Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Militärtekniska avdelningen (MTA).ORCID-id: 0000-0002-4376-9800
2014 (Engelska)Ingår i: Network Topology in Command and Control: Organization, Operation, and Evolution / [ed] T. J. Grant, R. H. P. Janssen, H. Monsuur, Hershey, PA: IGI Global, 2014, s. 241-269Kapitel i bok, del av antologi (Refereegranskat)
Abstract [en]

Emerging information and communications technology has had significant importance for military operations during the last decades. Development within such technology areas as sensors, computers, and wireless communications has allowed for faster and more efficient collection, transmission, storage, processing, analysis, and distribution of data. This has led to new and improved military capabilities within command and control, intelligence, targeting, and logistics. However, the increased complexity and interdependencies of networked systems, the continuously growing amounts of data, changing non-technical requirements, and evolving adversary threats makes upholding cyber security in command and control systems a challenging task. Although some best-practice approaches have been developed, finding good solutions for protecting critical infrastructure and important information assets is still an open research question requiring an interdisciplinary approach. This chapter describes recent developments within emerging network technology for command and control, and suggests focus areas where further research is needed in order to attain sufficient operational effect from the employed systems. While a gradual and evolutionary progress of military cyber security has been seen, a long-term commitment is required within such areas as procurement, standardization, training, doctrinal, and legal development, in order to achieve military utility of command and control systems.

Ort, förlag, år, upplaga, sidor
Hershey, PA: IGI Global, 2014. s. 241-269
Nyckelord [en]
Advanced Persistent Threat, Cyber Security, Cyber war, Cyber-attacks, Cyber-physical systems, Cyberspace operations, Hastily Formed Network, Reconfigurable Radio System
Nationell ämneskategori
Mänsklig interaktion med IKT
Forskningsämne
Försvarssystem
Identifikatorer
URN: urn:nbn:se:fhs:diva-4828DOI: 10.4018/978-1-4666-6058-8ISBN: 978-14-6666-058-8 (tryckt)ISBN: 14-6666-058-9 (tryckt)OAI: oai:DiVA.org:fhs-4828DiVA, id: diva2:732998
Tillgänglig från: 2014-07-07 Skapad: 2014-07-07 Senast uppdaterad: 2019-08-26Bibliografiskt granskad

Open Access i DiVA

Fulltext saknas i DiVA

Övriga länkar

Förlagets fulltext

Personposter BETA

Sigholm, Johan

Sök vidare i DiVA

Av författaren/redaktören
Sigholm, Johan
Av organisationen
Militärtekniska avdelningen (MTA)
Mänsklig interaktion med IKT

Sök vidare utanför DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetricpoäng

doi
isbn
urn-nbn
Totalt: 457 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • harvard-cite-them-right
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf