22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

418 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

tary domain, as well as analyzing such information. Such methodology<br />

should cover following aspects: gathering an information / data; structuring,<br />

analysis (filtering, finding the correlations, etc.) <strong>and</strong> building the new<br />

knowledge (rules)<br />

• challenging definition of realistic scenario that could show impact of cyber<br />

security issues on training, in the area of asymmetric threats.<br />

Unavailability of above mentioned items could limit the benefits of using<br />

the ATHENA Cyber Tool in the context of:<br />

• identification of networks’ <strong>and</strong> systems’ threats,<br />

• training, including an identification of given network topology vulnerabilities,<br />

• decision support capabilities.<br />

III. Cyber threats in military missions<br />

One must realize the fact that security is indivisible. With respect to e.g.<br />

network centric warfare concept it is sometimes said that the cumulative impact<br />

of new relationships among war fighting organizations (due to existence of new<br />

network connections) is the source of increased combat power as suggested in [1].<br />

In situations where people lives <strong>and</strong> health are threatened (military missions fall<br />

into this group) this assumption is significant. Identification of incidents/events,<br />

which can cause disruption or termination of military mission is one of the key<br />

problems in present military asymmetric conflicts. The new NATO Cyber Defense<br />

Policy, treats cyber security with a high priority [2]. It is related to known,<br />

but still unsolved problems in acquiring, collecting <strong>and</strong> exploiting factual data<br />

in cyber defense domain, including effective usage of sensors (both people <strong>and</strong><br />

specialized devices).<br />

There is a great amount of well known (<strong>and</strong> unknown) groups of incidents,<br />

which may lead to a disruption <strong>and</strong>/or prevent military mission from completion.<br />

Appearance of such an incident during execution of a military mission may lead to<br />

severe consequences (ultimately losses of people’s life or health). Thus the ultimate<br />

goal of collecting information about incidents in cyberspace is achieving increased<br />

level of cyber security, which in turn takes effect in an increase of military security.<br />

It is of key importance to consider the following set of information:<br />

1. Identification of information sources.<br />

2. Definition of the means used for data collection.<br />

3. Preparation of the information gathering method.<br />

4. Preparation of the concept for storing information about incidents.<br />

The points 1-4 above provide a fundament for the stage of collecting factual<br />

data about incidents in cyberspace. Elementary goals of military missions can be<br />

achieved in many ways. While defining this process we should focus on:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!