Military Communications and Information Technology: A Trusted ...
Military Communications and Information Technology: A Trusted ... Military Communications and Information Technology: A Trusted ...
428 Military Communications and Information Technology... Acknowledgment Authors would like to acknowledge the funding received from the R&T Joint Investment Programme on Force Protection (JIP FP) which focuses on technologies for protecting EU armed forces against threats. The programme has been launched under the umbrella of the European Defence Agency and is financed by twenty European governments: Poland, Austria, Belgium, Cyprus, Czech Republic, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, the Netherlands, Norway, Portugal, Slovakia, Slovenia, Spain and Sweden. REFERENCES [1] D. Alberts, J. Garstka and F. Stein, Network Centric Warfare, 2nd Edition ed., CCRP, 2000. [2] NATO, “NATO Policy on Cyber Defence,” NATO, 2011. [3] A. Flizikowski, J. Zych, “Using game theory to reliability research for communication systems in crisis management and military operations (case study),” in The functioning of the company during the crisis, P. Bartkowiak, Ed., Poznań, Scientific Society for Organization and Management, 2011, pp. 50-60. [4] D.L. Shinder, Cyberprzestępczość: jak walczyć z łamaniem prawa w Sieci (ang. Cybersecurity – how to fight against breaking the law in Internet), Gliwice: Wydawnictwo Helion, 2004. ANNEX – Observation sheet (Cyber Space) Observation sheet duly completed to facilitate the gathering of factual data in the repository. The essence of fulfillment of this worksheet is to: facilitate dealing with parameterized observation process. An observation sheet should be filled to be aware of the fact that each of the fields in the spreadsheet is usually filled with a parameter in the record in the database / repository. Please endeavor to do so would not generate. garbage at the entrance. It I not necessary that all the fields in the observation sheet were filled. The completed observation sheet contains the sample data. Below it is presented how the most important fields can be filled.
Chapter 4: Information Assurance & Cyber Defence 429 Mission Name (codename): TANGO – 01 Observed phase of the mission planning execution debrifing (before the mission) (after the mission) ☑ ☐ ☐ Date of observation (YYYY.MM.DD) 2012.04.16 place of observation KABUL A concise description of the mission, the essence of the mission (a few sentences) PREPARATION FOR SUPPLYING AMMUNITION AND EQUIPEMENT FOR MILITARY BASE IN KABUL Characteristics of cyber events and consequences: System: 1. system (system name) AFGAN-WAN 2. subsystem (subsystem name) LOG 3. the object (object name) SERVER, ACCESS POINT IN MILITARY BASE Categories of information: 1) information confirmed / unconfirmed by another soldier: CONFIRMED 2) the information current / out of date (the date of obsolescence): CURRENT OBSERVATION 3) associated with the object of a stationary / mobile: MOBILE 4) identified human senses / sensors technical: TWO SOLDIERS WITH MOBILE EQUIPE- MENT, PROBABLY PERFORMING WI-FI SCANNING 5) will be available for all peoples / only for selected people: SELECTED PEOPLE 6) categories of accessibility (read only, modify, delete): POSSIBLE ALL CATEGORIES 7) how many and which sources (who) confirmed a piece of information about the event: SEN- TRY IN FRONT OF BASE, PATROL 8) The category of information in the repository (new or additional Supplementary): NEW Direct impact on the health / lives of soldiers Yes No I cannot define Type of cyber event: positive negative neutral
- Page 377 and 378: Development of High Assurance Guard
- Page 379 and 380: Chapter 4: Information Assurance &
- Page 381 and 382: Chapter 4: Information Assurance &
- Page 383 and 384: Chapter 4: Information Assurance &
- Page 385 and 386: Chapter 4: Information Assurance &
- Page 387 and 388: Chapter 4: Information Assurance &
- Page 389 and 390: Chapter 4: Information Assurance &
- Page 391 and 392: Chapter 4: Information Assurance &
- Page 393 and 394: Chapter 4: Information Assurance &
- Page 395 and 396: Network Traffic Characteristics for
- Page 397 and 398: Chapter 4: Information Assurance &
- Page 399 and 400: Chapter 4: Information Assurance &
- Page 401 and 402: Chapter 4: Information Assurance &
- Page 403 and 404: Chapter 4: Information Assurance &
- Page 405 and 406: Chapter 4: Information Assurance &
- Page 407 and 408: Chapter 4: Information Assurance &
- Page 409 and 410: Chapter 4: Information Assurance &
- Page 411 and 412: Chapter 4: Information Assurance &
- Page 413 and 414: Chapter 4: Information Assurance &
- Page 415 and 416: Methodology for Gathering Data Conc
- Page 417 and 418: Chapter 4: Information Assurance &
- Page 419 and 420: Chapter 4: Information Assurance &
- Page 421 and 422: Chapter 4: Information Assurance &
- Page 423 and 424: Chapter 4: Information Assurance &
- Page 425 and 426: Chapter 4: Information Assurance &
- Page 427: Chapter 4: Information Assurance &
- Page 432 and 433: 432 Military Communications and Inf
- Page 434 and 435: 434 Military Communications and Inf
- Page 436 and 437: 436 Military Communications and Inf
- Page 439 and 440: On Multi-Level Secure Structured Co
- Page 441 and 442: Chapter 4: Information Assurance &
- Page 443 and 444: Chapter 4: Information Assurance &
- Page 445 and 446: Chapter 4: Information Assurance &
- Page 447 and 448: Chapter 4: Information Assurance &
- Page 449 and 450: Chapter 4: Information Assurance &
- Page 451 and 452: Chapter 4: Information Assurance &
- Page 453 and 454: Chapter 4: Information Assurance &
- Page 455 and 456: Generation of Nonlinear Feedback Sh
- Page 457 and 458: Chapter 4: Information Assurance &
- Page 459 and 460: Chapter 4: Information Assurance &
- Page 461 and 462: Chapter 4: Information Assurance &
- Page 463: Chapter 4: Information Assurance &
- Page 466 and 467: 466 Military Communications and Inf
- Page 468 and 469: 468 Military Communications and Inf
- Page 470 and 471: 470 Military Communications and Inf
- Page 472 and 473: 472 Military Communications and Inf
- Page 474 and 475: 474 Military Communications and Inf
- Page 476 and 477: 476 Military Communications and Inf
428 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Acknowledgment<br />
Authors would like to acknowledge the funding received from the R&T Joint<br />
Investment Programme on Force Protection (JIP FP) which focuses on technologies<br />
for protecting EU armed forces against threats. The programme has been launched<br />
under the umbrella of the European Defence Agency <strong>and</strong> is financed by twenty<br />
European governments: Pol<strong>and</strong>, Austria, Belgium, Cyprus, Czech Republic, Estonia,<br />
Finl<strong>and</strong>, France, Germany, Greece, Hungary, Irel<strong>and</strong>, Italy, the Netherl<strong>and</strong>s, Norway,<br />
Portugal, Slovakia, Slovenia, Spain <strong>and</strong> Sweden.<br />
REFERENCES<br />
[1] D. Alberts, J. Garstka <strong>and</strong> F. Stein, Network Centric Warfare, 2nd Edition ed.,<br />
CCRP, 2000.<br />
[2] NATO, “NATO Policy on Cyber Defence,” NATO, 2011.<br />
[3] A. Flizikowski, J. Zych, “Using game theory to reliability research for communication<br />
systems in crisis management <strong>and</strong> military operations (case study),” in The functioning<br />
of the company during the crisis, P. Bartkowiak, Ed., Poznań, Scientific Society for<br />
Organization <strong>and</strong> Management, 2011, pp. 50-60.<br />
[4] D.L. Shinder, Cyberprzestępczość: jak walczyć z łamaniem prawa w Sieci<br />
(ang. Cybersecurity – how to fight against breaking the law in Internet), Gliwice:<br />
Wydawnictwo Helion, 2004.<br />
ANNEX – Observation sheet (Cyber Space)<br />
Observation sheet duly completed to facilitate the gathering of factual data<br />
in the repository. The essence of fulfillment of this worksheet is to: facilitate<br />
dealing with parameterized observation process. An observation sheet should<br />
be filled to be aware of the fact that each of the fields in the spreadsheet is usually<br />
filled with a parameter in the record in the database / repository. Please<br />
endeavor to do so would not generate. garbage at the entrance. It I not necessary<br />
that all the fields in the observation sheet were filled. The completed observation<br />
sheet contains the sample data. Below it is presented how the most important<br />
fields can be filled.