22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

44 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Through st<strong>and</strong>ardization, access to ‘best practice’ is possible, <strong>and</strong> wide use of a public<br />

st<strong>and</strong>ard is an endorsement of that technology. Even if the details of a system’s<br />

technical operation is known, it cannot be compromised due to the strength of,<br />

<strong>and</strong> confidence in, protection mechanisms within the system. This can lead to<br />

system owners adopting a more sensible risk posture; instead of trying to develop<br />

costly, custom-made security solutions, a posture of adopting open st<strong>and</strong>ards<br />

<strong>and</strong> technologies may result in more thought being given to appropriate levels<br />

of security – resulting in a move to a ‘risk balanced’ approach, which is based on<br />

careful analysis of the threat, rather than a ‘protect against everything’ mentality<br />

which is financially inefficient <strong>and</strong> increasingly more difficult to justify. Openness<br />

as a posture may also be a deterrent to some attackers as it demonstrates confidence<br />

in your protection mechanisms. Particular security mechanisms can be adopted<br />

to deter would-be attackers, for example if an attacker knows they will be traced<br />

then they may be less likely to attack.<br />

Whilst there are clear benefits from using st<strong>and</strong>ardized <strong>and</strong> interoperable security<br />

mechanisms, public disclosure of a security mechanism is still seen as a risk<br />

to security: attackers are given an awareness of how the system works, without<br />

requiring the effort involved in reverse-engineering which decreases the skill level<br />

needed for basic attack attempts. There is also a concern that successful attacks<br />

against a public st<strong>and</strong>ard may not be disclosed.<br />

Whilst a more open <strong>and</strong> st<strong>and</strong>ards-based approach to security can enable<br />

interoperability, the increased information disclosure has a risk of making<br />

it easier to identify attack vectors against a system <strong>and</strong> reducing the level of skill<br />

needed to attack a system. Moving from a small number of trusted suppliers<br />

to a potentially global market for providing security mechanisms will result<br />

in a wider range of available technical options, but may also require a different<br />

stance to be taken with respect to trust in sourcing components <strong>and</strong> provenance<br />

of software <strong>and</strong> hardware.<br />

D. Technical case studies: MOSA, GVA <strong>and</strong> LOSA<br />

This paper will now outline the MOD case studies which refined the principles<br />

for developing open systems which have been stated above.<br />

MOSA has delivered a technical architecture, an enterprise model <strong>and</strong> a migration<br />

strategy <strong>and</strong> has progressed issues such as the management of Intellectual<br />

Property Rights (IPR), designing for modular test <strong>and</strong> acceptance <strong>and</strong> designing<br />

for modular certification <strong>and</strong> accreditation.<br />

MOSA aimed to provide a st<strong>and</strong>ardized structure for flexibly assembling<br />

combat system components to provide an overall combat capability using looselycoupled,<br />

non-proprietary, published interfaces. The fundamental characteristic<br />

of MOSA is that combat systems will be constructed of replaceable modules i.e.<br />

components will be upgradeable <strong>and</strong> interchangeable.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!