C4 ISRchapter

Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/216485701

Application of Cyber Security in Emerging C4ISR Systems

Chapter · January 2011


DOI: 10.4018/978-1-4666-4707-7.ch086

CITATIONS READS
2 3,109

4 authors, including:

Ashfaq Malik Mahboob, A.


National University of Sciences and Technology The Islamia University, Bahawalpur, Pakistan
6 PUBLICATIONS   11 CITATIONS    58 PUBLICATIONS   249 CITATIONS   

SEE PROFILE SEE PROFILE

Junaid Zubairi
State University of New York at Fredonia
67 PUBLICATIONS   380 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Network Security View project

Flight Data Tracker View project

All content following this page was uploaded by Junaid Zubairi on 23 August 2014.

The user has requested enhancement of the downloaded file.


Cyber Security Standards,
Practices and Industrial
Applications:
Systems and Methodologies
Junaid Ahmed Zubairi
State University of New York at Fredonia, USA

Athar Mahboob
National University of Sciences & Technology, Pakistan
Senior Editorial Director: Kristin Klinger
Director of Book Publications: Julia Mosemann
Editorial Director: Lindsay Johnston
Acquisitions Editor: Erika Carter
Development Editor: Michael Killian
Production Editor: Sean Woznicki
Typesetters: Adrienne Freeland
Print Coordinator: Jamie Snavely
Cover Design: Nick Newcomer

Published in the United States of America by


Information Science Reference (an imprint of IGI Global)
701 E. Chocolate Avenue
Hershey PA 17033
Tel: 717-533-8845
Fax: 717-533-8661
E-mail: [email protected]
Web site: http://www.igi-global.com

Copyright © 2012 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in
any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher.
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or
companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark.

Library of Congress Cataloging-in-Publication Data


Cyber security standards, practices and industrial applications: systems and methodologies / Junaid Ahmed Zubairi and
Athar Mahboob, editors.
p. cm.
Includes bibliographical references and index.
Summary: “This book details the latest and most important advances in security standards, introducing the differences
between information security (covers the understanding of security requirements, classification of threats, attacks and
information protection systems and methodologies) and network security (includes both security protocols as well as
systems which create a security perimeter around networks for intrusion detection and avoidance)”--Provided by publisher.
ISBN 978-1-60960-851-4 (hbk.) -- ISBN 978-1-60960-852-1 (ebook) -- ISBN 978-1-60960-853-8 (print & perpetual
access) 1. Computer networks--Security measures. 2. Computer security. 3. Data protection. 4. Electronic data processing
departments--Security measures. I. Zubairi, Junaid Ahmed, 1961- II. Mahboob, Athar, 1971-
TK5105.59.C92 2012
005.8--dc22
2011009262

British Cataloguing in Publication Data


A Cataloguing in Publication record for this book is available from the British Library.

All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the
authors, but not necessarily of the publisher.
Editorial Advisory Board
Kassem Saleh, Kuwait University
Sajjad Madani, COMSATS Institute
Badar Hussain, KCI Engineering
Omer Mahmoud, Int’l Islamic University

Panel of Reviewers
Alfredo Pironti, Politecnico di Torino, Torino, Italy
Athar Mahboob, National University of Sciences & Technology, Pakistan
Badar Hussain,
Davide Pozza, Politecnico di Torino, Torino, Italy
Junaid Ahmed Zubairi, State University of New York at Fredonia, New York, USA
Junaid Hussain, National University of Sciences & Technology, Pakistan
Kashif Latif, National University of Sciences & Technology, Pakistan
Morgan Henrie, Morgan Henrie Inc.
Omer Mahmoud, Int’l Islamic University
Riccardo Sisto, Politecnico di Torino - Dip. di Automatica e Informatica, Corso Duca degli Abruzzi,
Torino, Italy
Sajjad Ahmed Madani, COMSATS Institute of Information Technology, Abbotabad, Pakistan
Shakeel Ali
Sohail Sattar, NED University of Engineering & Technology, Karachi, Pakistan
Syed Ali Khayam, School of Electrical Engineering & Computer Science, National University of Sci-
ences & Technology, Pakistan
Wen Chen Hu, Dept. of Computer Science, University of North Dakota
Table of Contents

Foreword................................................................................................................................................ xi

Preface................................................................................................................................................... xii

Acknowledgment................................................................................................................................ xvii

Section 1
Mobile and Wireless Security

Chapter 1
Securing Wireless Ad Hoc Networks:State of the Art and Challenges.................................................... 1
Victor Pomponiu, University of Torino, Italy

Chapter 2
Smartphone Data Protection Using Mobile Usage Pattern Matching................................................... 23
Wen-Chen Hu, University of North Dakota, USA
Naima Kaabouch, University of North Dakota, USA
S. Hossein Mousavinezhad, Idaho State University, USA
Hung-Jen Yang, National Kaohsiung Normal University, Taiwan

Chapter 3
Conservation of Mobile Data and Usability Constraints....................................................................... 40
Rania Mokhtar, University Putra Malaysia (UPM), Malaysia
Rashid Saeed, International Islamic University Malaysia (IIUM), Malaysia

Section 2
Social Media, Botnets and Intrusion Detection

Chapter 4
Cyber Security and Privacy in the Age of Social Networks.................................................................. 57
Babar Bhatti, MutualMind, Inc., USA
Chapter 5
Botnets and Cyber Security:Battling Online Threats............................................................................. 75
Ahmed Mansour Manasrah, National Advanced IPv6 Center, Malaysia
Omar Amer Abouabdalla, National Advanced IPv6 Center, Malaysia
Moein Mayeh, National Advanced IPv6 Center, Malaysia
Nur Nadiyah Suppiah, National Advanced IPv6 Center, Malaysia

Chapter 6
Evaluation of Contemporary ADSs....................................................................................................... 90
Ayesha Binte Ashfaq, National University of Sciences & Technology (NUST), Pakistan
Syed Ali Khayam, National University of Sciences & Technology (NUST), Pakistan

Section 3
Formal Methods and Quantum Computing

Chapter 7
Practical Quantum Key Distribution.................................................................................................... 114
Sellami Ali, International Islamic University Malaysia (IIUM), Malaysia

Chapter 8
Automated Formal Methods for Security Protocol Engineering......................................................... 139
Alfredo Pironti, Politecnico di Torino, Italy
Davide Pozza, Politecnico di Torino, Italy
Riccardo Sisto, Politecnico di Torino, Italy

Section 4
Embedded Systems and SCADA Security

Chapter 9
Fault Tolerant Remote Terminal Units (RTUs) in SCADA Systems................................................... 169
Syed Misbahuddin, Sir Syed University of Engineering and Technology, Pakistan
Nizar Al-Holou, University of Detroit Mercy, USA

Chapter 10
Hardware and Embedded Systems Security........................................................................................ 180
Muhammad Farooq-i-Azam, COMSATS Institute of Information Technology, Pakistan
Muhammad Naeem Ayyaz, University of Engineering and Technology, Pakistan
Section 5
Industrial and Applications Security

Chapter 11
Cyber Security in Liquid Petroleum Pipelines..................................................................................... 201
Morgan Henrie, MH Consulting, Inc., USA

Chapter 12
Application of Cyber Security in Emerging C4ISR Systems and Related Technologies.................... 224
Ashfaq Ahmad Malik, National University of Sciences & Technology, Pakistan
Athar Mahboob, National University of Sciences & Technology, Pakistan
Adil Khan, National University of Sciences & Technology, Pakistan
Junaid Zubairi, State University of New York at Fredonia, USA

Chapter 13
Practical Web Application Security Audit Following Industry Standards and Compliance................ 260
Shakeel Ali, Cipher Storm Ltd, United Kingdom

Compilation of References................................................................................................................ 281

About the Contributors..................................................................................................................... 304

Index.................................................................................................................................................... 311
224

Chapter 12
Application of Cyber Security
in Emerging C4ISR Systems
Ashfaq Ahmad Malik
National University of Sciences & Technology, Pakistan

Athar Mahboob
National University of Sciences & Technology, Pakistan

Adil Khan
National University of Sciences & Technology, Pakistan

Junaid Zubairi
State University of New York at Fredonia, USA

ABSTRACT
C4ISR stands for Command, Control, Communications, Computers, Intelligence, Surveillance &
Reconnaissance. C4ISR systems are primarily used by organizations in the defense sector. However,
they are also increasingly being used by civil sector organizations such as railways, airports, oil, and
gas exploration departments. The C4ISR system is a system of systems and it can also be termed as
network of networks and works on similar principles as the Internet. Hence it is vulnerable to similar
attacks called cyber attacks and warrants appropriate security measures to save it from these attacks
or to recover if the attack succeeds. All of the measures put in place to achieve this are called cyber
security of C4ISR systems. This chapter gives an overview of C4ISR systems focusing on the perspective
of cyber security warranting information assurance.

DOI: 10.4018/978-1-60960-851-4.ch012

Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Application of Cyber Security in Emerging C4ISR Systems

Figure 1. The concept of C4ISR (Stokes, 2010)

Introduction to the C4ISR ing by the mission commanders to achieve their


Systems missions. A comprehensive and better situational
awareness of the battlefield helps the commander
C4ISR is the abbreviation of Command, Con- in making of effective and timely decisions which
trol, Communications, Computers, Intelligence, in turn helps in effective control of the situation
Surveillance & Reconnaissance (Figure 1). The through an advance planning and efficient utiliza-
C4ISR system is the central nervous system of tion of the available resources. Figure1 shows the
military organizations. There is an increase in overall concept of C4ISR systems.
requirement and usage of these systems even by Historically, C4ISR systems have followed an
civil organizations such as railways, airports, oil evolutionary path in their development. The ter-
and gas exploration departments, etc., hence C4I minology of C4ISR is used by the military orga-
systems are a source of growing attraction for nizations, specially by US-DoD, to mean the use
various people and organizations. The primary ob- of organizational setup utilized by military
jective of a C4ISR system is to present the overall forces for carrying out a mission. The first C of
scenario and picture of the area of interest (such C4ISR stands for command which means author-
as a battlefield, operation area of ships/forces in ity over subordinates with responsibility. Second
sea/land/air or a disaster area, etc.). This allows a C stands for control which means exercising
clear situational awareness for better decision mak- authority over subordinates. These are the aspects

225
Application of Cyber Security in Emerging C4ISR Systems

of leadership and are commonly known as C2. may require the plan to be updated or revised.
The facilities used by commanders and leaders When the mission has achieved the required effects
in carrying out their assigned missions are large- the current set of command and control activities
ly dependent on communication and computers come to an end. The model distinguishes between
hence terms C3 and C4 are well known and ac- ‘command’ activities and ‘control’ activities.
cepted. The I of C4ISR represents Intelligence, Command comprises proactive, mission-driven,
i.e. the collecting of information which is required planning and co-ordination activities. Control
by leaders/commanders to carry out a mission. comprises reactive, event-driven monitoring and
Hence the terms C3I and C4I started coming into communication activities. The former implies the
use over a period of time. The information is transmission of mission intent whereas the latter
gathered through intelligence, surveillance and implies reactions to specific situations.
reconnaissance which is the reason for the ISR
part. The systematic observation of certain things Nowadays the trend of using the information,
is called surveillance whereas observations on communication and computer technologies has
specific occasions is defined as reconnaissance. increased manifolds. Their use in medical, defense,
Hence, the systems are now collectively termed banking, education, research etc., or we can say that
as C4ISR systems (Anthony, 2002). in every walk of life has quite obviously increased.
The overall purpose of a modern C4ISR System The use of PDAs, laptops, mobile phones, ipods,
is to achieve a better Command & Control of a gaming and communication devices in our day to
situation (i.e. in the battlefield, at sea, disaster day life has increased tremendously. Everyone is
management, etc.) through good and updated on-line and connected together through a network
ISR functions and using the latest computer and of computers. The use of similar technologies in
communication technologies effectively. A very defense sector has also increased in order to get the
brief and comprehensive C2 model which has benefit of improvement in operational capabilities
been basically derived from tactical level but also at less cost. Hence the information is shared with
fits in higher more strategic levels is described all stakeholders in the military chain of command
as bottom up approach for design of C2 systems through networking of equipment/systems of de-
(Anthony, 2002) (Stanton, et. al., 2008): cision makers, their implementers/effectors and
having information sources. There are different
It is proposed that the command and control ac- network oriented defense terminologies in use
tivities are triggered by events such as the receipt such as Network-Centric Warfare (NCW) by the
of orders or information, which provide a mission US-DoD (US-DoD, 2005), Network Enabled
and a description of the current situation of events Capability (NEC) by the UK (MoD, 2004) and
in the field. The gap between the mission and the Network-Based Defense (NBD) by the Swedish
current situation lead the command system to Military (Nilsson, 2003), for example. These
determine the effects that narrow that gap. This terms are also similar to C4ISR. Figure 2 shows
in turn requires the analysis of the resources and the network oriented defense concept in which
constraints in the given situation. From these the decision makers, the effectors and information
activities, plans are developed, evaluated and se- sources are interconnected in a common network.
lected. The chosen plans are then rehearsed before The services on the network are used by all stake-
being communicated to agents in the field. As the holders. C4ISR works on a similar concept.
plan is enacted, feedback from the field is sought Despite the fact that C4ISR systems have their
to check that events are unfolding as expected. origins in security centric organizations like the
Changes in the mission or the events in the field military, cyber security of these systems, for

226
Application of Cyber Security in Emerging C4ISR Systems

Figure 2. Network oriented structure: NEC/NCW/NBD (Ericsson, 2006)

various reasons discussed later in this chapter, is col suite. TCP/IP development was also initiated
still an open question and an area which is and supported by the US-DoD. TCP/IP forms the
keenly being researched. In this chapter we shall foundation of all modern network applications and
provide an overview of the current state of cyber C4ISR systems are no exception. An appreciation
security of C4ISR systems. We shall provide of security vulnerabilities inherent in original TCP/
references to additional material which the IP protocols will put forward many cyber security
reader may access to get further details. Now we considerations for the C4ISR system design and
provide information on the organization of the uses. In section 7 we discuss the cyber security
remainder of our chapter. of various of C4ISR components including the
After this introduction, section 2 goes into operating systems, Electronic Mail systems, Com-
more details of the C4ISR system themselves. munication Systems from the end to end perspec-
This should provide sufficient frame of reference tive, communication data links and Identity and
for a reader not already familiar with the C4ISR Access Management Systems. In section 8 we
systems. In section 3 we provide the cyber security provide examples of many of the success stories
requirements of C4ISR systems and the threats and best practices for cyber security of C4ISR
to which these systems are exposed. In section system components. We emphasize on current
4 we provide various case studies of reported trends and approaches and, wherever possible,
cyber security breaches in C4ISR systems. The we provide examples of noteworthy projects and
sample of reported cases which we present should initiatives. In section 9 we discuss the increas-
justify the relevance and importance of the cyber ing use of open source information processing
security requirements of C4ISR systems. In sec- modules as building blocks for C4ISR systems.
tion 5 we discuss the cyber security aspects of Finally, we conclude our chapter by summa-
the standardized C4ISR architectures. Here we rizing the findings presented in the entire chapter
primarily focus on the DoDAF, a well accepted and highlight some directions for future research
C4ISR architectural framework. In section 6 we in cyber security of C4ISR systems.
discuss the security aspects of the TCP/IP proto-

227
Application of Cyber Security in Emerging C4ISR Systems

USCESRC. (2009). China’s cyber activities that ADDITIONAL READING


target the United States, and the resulting impacts
on U.S. national security. US China Economic and Anderson, R., & Fuloria, S. (2009), “Security
Security Review Commission 2009 Annual Report Economics and Critical National Infrastructure,”
to Congress. Retrieved from http://www.uscc.gov in Workshop on the Economics of Information
Security 2009.
USDoD. (2005). The implementation of network-
centric warfare. Force Transformation, Office of DHS (2009), A Roadmap for Cybersecurity Re-
the Secretary of Defense. Retrieved from http:// search, Technical Report by the Department of
www.oft.osd.mil/library/library_files/docu- Homeland Security, November 2009.
ment_387_NCW_Book_LowRes.pdf. IATAC CRTA Report (2002). Network Centric
Wiki. (n.da). What is wiki? Wikiorg, The Free Warfare, 14 May 2002.
Encyclopedia. Retrieved October 15, 2010, from IATAC CRTA Report (2003). Wireless Wide Area
http://wiki.org/wiki.cgi?WhatIsWiki Network (WWAN) Security 14 May 2003.
Wiki. (n.db). Thin client. Techterms, The Free IATAC SOAR Report (2001). Modeling And
Encyclopedia. Retrieved October 15, 2010, from Simulation for Information Assurance, 14 May
http://en.wikipedia.org/wiki/Thin_client 2001.
Wiki. (n.dc). Techterms. Techterms, The Free IATAC SOAR Report (2005). A Comprehensive
Encyclopedia. Retrieved October 15, 2010, from Review of Common Needs And Capability Gaps,
http://www.techterms.com/definition/wiki 21 July 2005.
Wikipedia. (2010a). Identification friend or IATAC SOAR Report (2007). Software Security
foe. Retrieved October 21, 2010, from http:// Assurance 31 July 2007.
en.wikipedia.org/wiki/Identification_friend_or_
foe IATAC SOAR Report. (2008, October). The In-
sider Threat . Information Systems, ▪▪▪, 10.
Wikipedia. (2010b). Security focused operating
system. Retrieved October 21, 2010, from http:// IATAC SOAR Report (2009). Measuring Cyber
en.wikipedia.org/wiki/Security_focused_operat- Security and Information Assurance, 8 May 2009.
ing_systems
USAF Instruction(2005a). Communications
Wortzel, L. M. (2009). Preventing terrorist at- security: Protected Distribution Systems (PDS).
tacks, countering cyber intrusions, and protecting Air Force Instruction 33-201, Volume 8 dated 26
privacy in cyberspace. U.S. China Economic and April 2005
Security Review Commission, Testimony before
USAF Instruction(2005a). Emission Security.
the Subcommittee on Terrorism and Homeland
Air Force Instruction 33-203, Volume 1 dated
Security. United States Senate.
31 October 2005
Zehetner, A. R. (2004). Information operations:
USAF Instruction(2005a). Emission Security.
The impacts on C4I systems. Australia: Electronic
Air Force Instruction 33-203, Volume 3 dated 2
Warfare Associates.
November 2005

255
Application of Cyber Security in Emerging C4ISR Systems

Jenkins, D. P. Contributing author (2008). Mod- Walker, G. H., Stanton, N. A., Salmon, P. M.,
eling Command and Control: Event Analysis of & Jenkins, D. P. (2009). How can we support
Systemic Teamwork. Ashgate: Aldershot. the commander’s involvement in the planning
process? An exploratory study into remote and
Salmon, P. M., Stanton, N. A., Walker, G. H.,
co-located command planning. International
Jenkins, D. P., Ladva, D., Rafferty, L., & Young,
Journal of Industrial Ergonomics, 39(2), 456–464.
M. S. (2009). Measuring situation awareness in
doi:10.1016/j.ergon.2008.12.003
complex systems: Comparison of measures study.
International Journal of Industrial Ergonomics,
39(3), 490–500. doi:10.1016/j.ergon.2008.10.010
KEY TERMS AND DEFINITIONS
Walker, G. H., Stanton, N. A., Jenkins, D. P., &
Salmon, P. M. (2009). From telephones to iPhones: Active Attack: An attack in which the adver-
Applying systems thinking to networked, in- sary undertakes unauthorized modification of data
teroperable products. Applied Ergonomics, 40(2), or information system assets.
206–215. doi:10.1016/j.apergo.2008.04.003 Community of Interest (CoI): COI is a
Walker, G. H., Stanton, N. A., Salmon, P., Jenkins, collaborative grouping of users who share and
D. P., Monnan, S., & Handy, S. (2009). An evolu- exchange information in the pursuit of common
tionary approach to network enabled capability. goals or missions.
International Journal of Industrial Ergonomics, COMSEC: Communication Security mea-
39(2), 303–312. doi:10.1016/j.ergon.2008.02.016 sures include using encryption and ciphering
techniques for protecting the contents of data from
Walker, G. H., Stanton, N. A., Salmon, P. M., being deciphered, if intercepted by an intruder/
Jenkins, D., Revell, K., & Rafferty, L. (2009). eavesdropper.
Measuring Dimensions of Command and Control Cyber Security: Cyber security is coordinated
Using Social Network Analysis: Extending the actions in order to prevent, analyze and react in
NATO SAS-050 Model. International Journal case of cyber attacks.
of Command and Control, 3(2), 1–46. INFOSEC: Information Security are measures
Walker, G. H., Stanton, N. A., Salmon, P. M., which ensure the integrity, availability and confi-
Jenkins, D., Stewart, R., & Wells, L. (2009). Us- dentiality of data and IT related services.
ing an integrated methods approach to analyse Passive Attack: An attack in which the adver-
the emergent properties of military command and sary does not modify data or system is and only
control. Applied Ergonomics, 40(4), 636–647. observes data or system information or activity.
doi:10.1016/j.apergo.2008.05.003 TEMPEST: Transient Electromagnetic Pulse
Emanation Standard are the measures undertaken
Walker, G. H., Stanton, N. A., Salmon, P. M., & to ensure that the electromagnetic transmissions
Jenkins, D. P. (2008). A review of sociotechni- from equipment can’t be intercepted to derive
cal systems theory: A classic concept for new information about the equipment’s operation and
command and control paradigms. Theoretical the data it processes.
Issues in Ergonomics Science, 9(6), 479–499.
doi:10.1080/14639220701635470

256
Application of Cyber Security in Emerging C4ISR Systems

APPENDIX: ACRONYMS

• ACDS/SSDS: Advanced Combat Direction System/Ship Self-Defense System


• ACTD: Advanced Concept Technology Demonstration
• AEHF: Advanced Extremely High Frequency
• AES: Advanced Encryption Standard
• AHP: Analytic Hierarchy Process
• AIP: Anti-surface Warfare Improvement Program, MPA (Maritime Patrol Aircraft
• ATWCS/ TTWCS: Advanced Tomahawk Weapon Control System/Tactical Tomahawk Weapon
Control System
• BGPHES: Battle Group Passive Horizon Extension System
• BLOS: Beyond Line of Sight
• C2: Command & Control
• C4ISR: Command, Control, Communications, Computers, Intelligence, Surveillance &
Reconnaissance
• CDCIE: Cross Domain Collaborative Information Environment
• CDF: Combat Direction Finding
• CEC DDS: Cooperative Engagement Capability Data Distribution System
• COMSEC: Communications Security
• COP: Common Operational Picture
• COTS: Commercial Off the Shelf
• CSTE: Classification Stateless, Trusted Environment
• CV/TSC: Carrier/Tactical Support Center
• CWID: Warrior Interoperability Demonstration
• DES: Data Encryption Standard
• DJC2: Deployable Joint Command and Control
• DODAF: Department of Defense Architecture Framework
• DoS: Denial of Service
• DSCS: Defense Satellite Communications System
• DTD: Data Terminal Device
• EHF: Extremely High Frequency
• EMF: Management Framework
• ESM: The Enterprise System Management
• FOS: Family of Systems
• GAL: Global Address List
• GBS: Global Broadcasting System, Inmarsat- International Maritime Satellite
• GCCS: Global Command and Control System
• GIG: Global Information Grid
• HAIPE: High Assurance Internet Protocol Encryptor
• HF: High Frequency
• ICT: Information and Communication Technology
• IMINT: Image Intelligence
• INFOSEC: Information Security
• INTELSAT: Intelligence Satellite

257
Application of Cyber Security in Emerging C4ISR Systems

• IPC: Internet Protocol Convergence


• JMPS: Joint Mission Planning System
• JSIPS-N: Joint Services Imagery Processing System-Navy
• JTIDS: Joint Tactical Information Distribution System
• JTRS WNW: Joint Tactical Radio System Wideband Network Waveform
• KRA: Key Recovery Authority
• LAMPS: Light Airborne Multipurpose System
• LLC: Link Level COMSEC
• LOS: Line-of-Sight
• MANET: Mobile Ad-Hoc Network
• MASINT: Measurement and Signatures Intelligence
• MD5: Message-Digest 5
• MODAF: Ministry of Defense Architecture Framework
• MPAs: Maritime Patrol Crafts
• MUOS: Mobile User Objective System
• NAF: NATO Architecture
• NAVSSI: Navigation Sensor System Interface
• NBD: Network Based Defense
• NCO: Network Centric Operations
• NCW: Network Centric Warfare
• NEC: Network Enabled Capability
• NetD-COP: Network Defense Common Operational Picture
• NIST: National Institute for Standards in Technology
• OS: Operating System
• PC: Personal Computer
• PEM: Privacy Enhanced Email
• S/MIME: Secure/Multipurpose Internet Mail Extensions
• SIGINT: Signal Intelligence
• SMS/NAVMACS: Stores Management System/Naval Modular Automated Communications
System
• SNC: System Network Controller
• SOA: Service Oriented Architecture
• SPCs: Signal Processing Controllers
• STDN: Secure Tactical Data Network
• TACTICELL: Tactical Cellular
• TADIL: Tactical Digital Information Link
• TAMD: Theater Air and Missile Defense
• TBMCS/JTT: Theater Battle Management Core Systems/Joint Tactical Terminal
• TDS/DLP: Operator Interface System-D Tactical Data System/Data Link Processor
• TEMPEST: Transient Electromagnetic Pulse Emanation Standard
• TLS: Transport Layer Security
• TPT: Top Performing Technologies
• TRMS: Type Commanders Readiness Management System
• TSAT: Transformation Satellite

258
Application of Cyber Security in Emerging C4ISR Systems

• UAVs: Unmanned Aerial Vehicles


• UFO: Ultra High Frequency Follow-On
• UHF LOS: Ultra High Frequency Line of Sight
• USW: Undersea Warfare
• VHF: Very High Frequency
• VPN: Virtual Private Network
• WGS: Wideband Gapfiller System

259

View publication stats

You might also like