Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ... Military Communications and Information Technology: A Trusted ...

22.01.2015 Views

428 Military Communications and Information Technology... Acknowledgment Authors would like to acknowledge the funding received from the R&T Joint Investment Programme on Force Protection (JIP FP) which focuses on technologies for protecting EU armed forces against threats. The programme has been launched under the umbrella of the European Defence Agency and is financed by twenty European governments: Poland, Austria, Belgium, Cyprus, Czech Republic, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, the Netherlands, Norway, Portugal, Slovakia, Slovenia, Spain and Sweden. REFERENCES [1] D. Alberts, J. Garstka and F. Stein, Network Centric Warfare, 2nd Edition ed., CCRP, 2000. [2] NATO, “NATO Policy on Cyber Defence,” NATO, 2011. [3] A. Flizikowski, J. Zych, “Using game theory to reliability research for communication systems in crisis management and military operations (case study),” in The functioning of the company during the crisis, P. Bartkowiak, Ed., Poznań, Scientific Society for Organization and Management, 2011, pp. 50-60. [4] D.L. Shinder, Cyberprzestępczość: jak walczyć z łamaniem prawa w Sieci (ang. Cybersecurity – how to fight against breaking the law in Internet), Gliwice: Wydawnictwo Helion, 2004. ANNEX – Observation sheet (Cyber Space) Observation sheet duly completed to facilitate the gathering of factual data in the repository. The essence of fulfillment of this worksheet is to: facilitate dealing with parameterized observation process. An observation sheet should be filled to be aware of the fact that each of the fields in the spreadsheet is usually filled with a parameter in the record in the database / repository. Please endeavor to do so would not generate. garbage at the entrance. It I not necessary that all the fields in the observation sheet were filled. The completed observation sheet contains the sample data. Below it is presented how the most important fields can be filled.

Chapter 4: Information Assurance & Cyber Defence 429 Mission Name (codename): TANGO – 01 Observed phase of the mission planning execution debrifing (before the mission) (after the mission) ☑ ☐ ☐ Date of observation (YYYY.MM.DD) 2012.04.16 place of observation KABUL A concise description of the mission, the essence of the mission (a few sentences) PREPARATION FOR SUPPLYING AMMUNITION AND EQUIPEMENT FOR MILITARY BASE IN KABUL Characteristics of cyber events and consequences: System: 1. system (system name) AFGAN-WAN 2. subsystem (subsystem name) LOG 3. the object (object name) SERVER, ACCESS POINT IN MILITARY BASE Categories of information: 1) information confirmed / unconfirmed by another soldier: CONFIRMED 2) the information current / out of date (the date of obsolescence): CURRENT OBSERVATION 3) associated with the object of a stationary / mobile: MOBILE 4) identified human senses / sensors technical: TWO SOLDIERS WITH MOBILE EQUIPE- MENT, PROBABLY PERFORMING WI-FI SCANNING 5) will be available for all peoples / only for selected people: SELECTED PEOPLE 6) categories of accessibility (read only, modify, delete): POSSIBLE ALL CATEGORIES 7) how many and which sources (who) confirmed a piece of information about the event: SEN- TRY IN FRONT OF BASE, PATROL 8) The category of information in the repository (new or additional Supplementary): NEW Direct impact on the health / lives of soldiers Yes No I cannot define Type of cyber event: positive negative neutral

428 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Acknowledgment<br />

Authors would like to acknowledge the funding received from the R&T Joint<br />

Investment Programme on Force Protection (JIP FP) which focuses on technologies<br />

for protecting EU armed forces against threats. The programme has been launched<br />

under the umbrella of the European Defence Agency <strong>and</strong> is financed by twenty<br />

European governments: Pol<strong>and</strong>, Austria, Belgium, Cyprus, Czech Republic, Estonia,<br />

Finl<strong>and</strong>, France, Germany, Greece, Hungary, Irel<strong>and</strong>, Italy, the Netherl<strong>and</strong>s, Norway,<br />

Portugal, Slovakia, Slovenia, Spain <strong>and</strong> Sweden.<br />

REFERENCES<br />

[1] D. Alberts, J. Garstka <strong>and</strong> F. Stein, Network Centric Warfare, 2nd Edition ed.,<br />

CCRP, 2000.<br />

[2] NATO, “NATO Policy on Cyber Defence,” NATO, 2011.<br />

[3] A. Flizikowski, J. Zych, “Using game theory to reliability research for communication<br />

systems in crisis management <strong>and</strong> military operations (case study),” in The functioning<br />

of the company during the crisis, P. Bartkowiak, Ed., Poznań, Scientific Society for<br />

Organization <strong>and</strong> Management, 2011, pp. 50-60.<br />

[4] D.L. Shinder, Cyberprzestępczość: jak walczyć z łamaniem prawa w Sieci<br />

(ang. Cybersecurity – how to fight against breaking the law in Internet), Gliwice:<br />

Wydawnictwo Helion, 2004.<br />

ANNEX – Observation sheet (Cyber Space)<br />

Observation sheet duly completed to facilitate the gathering of factual data<br />

in the repository. The essence of fulfillment of this worksheet is to: facilitate<br />

dealing with parameterized observation process. An observation sheet should<br />

be filled to be aware of the fact that each of the fields in the spreadsheet is usually<br />

filled with a parameter in the record in the database / repository. Please<br />

endeavor to do so would not generate. garbage at the entrance. It I not necessary<br />

that all the fields in the observation sheet were filled. The completed observation<br />

sheet contains the sample data. Below it is presented how the most important<br />

fields can be filled.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!