dc.contributor.author |
Botha, P
|
|
dc.contributor.author |
Vawda, Shazia
|
|
dc.contributor.author |
Ramadeen, P
|
|
dc.contributor.author |
Terlunen, A
|
|
dc.date.accessioned |
2015-11-12T07:37:44Z |
|
dc.date.available |
2015-11-12T07:37:44Z |
|
dc.date.issued |
2015-03 |
|
dc.identifier.citation |
otha, P, Vawda, S, Ramadeen, P, and Terlunen, A. 2015. Securing military information systems on public infrastructure. In: Proceedings of the 10th International Conference on Cyber Warfare and Security (ICCWS) 2015, Skukuza, Kruger National Park, 24-25 March 2015 |
en_US |
dc.identifier.uri |
http://hdl.handle.net/10204/8262
|
|
dc.description |
Abstract only. The full-text of this paper is published in the Proceedings of the 10th International Conference on Cyber Warfare and Security (ICCWS) 2015, Skukuza, Kruger National Park, 24-25 March 2015 |
en_US |
dc.description.abstract |
Military information systems require high levels of security to protect sensitive information within these systems. Encrypted private networks are a common method of securing such systems. However these networks are not always available or practical to set up in time for scenarios which require real time information. This may force communications to utilise public infrastructure. Securing communications for military mobile and Web based systems over public networks poses a greater challenge compared to private encrypted networks. Several security mechanisms from commercial enterprise and social networking systems were adopted and customised in order to secure Cmore, a Web based real time distributed command and control system developed by the Council for Scientific and Industrial Research (CSIR). This paper highlights the security architecture of Cmore and discusses some of the successes and challenges encountered during the design and development of the Cmore architecture. Cmore has been successfully utilised and tested in several field experiments and operations. The resulting security architecture can be applied to other Web and mobile systems. |
en_US |
dc.language.iso |
en |
en_US |
dc.relation.ispartofseries |
Worklist;14591 |
|
dc.subject |
Information security |
en_US |
dc.subject |
Military information systems |
en_US |
dc.subject |
Web systems |
en_US |
dc.subject |
Mobile systems |
en_US |
dc.subject |
Cyber warfare |
en_US |
dc.subject |
Cyber-attacks |
en_US |
dc.title |
Securing military information systems on public infrastructure |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Botha, P., Vawda, S., Ramadeen, P., & Terlunen, A. (2015). Securing military information systems on public infrastructure. http://hdl.handle.net/10204/8262 |
en_ZA |
dc.identifier.chicagocitation |
Botha, P, Shazia Vawda, P Ramadeen, and A Terlunen. "Securing military information systems on public infrastructure." (2015): http://hdl.handle.net/10204/8262 |
en_ZA |
dc.identifier.vancouvercitation |
Botha P, Vawda S, Ramadeen P, Terlunen A, Securing military information systems on public infrastructure; 2015. http://hdl.handle.net/10204/8262 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Botha, P
AU - Vawda, Shazia
AU - Ramadeen, P
AU - Terlunen, A
AB - Military information systems require high levels of security to protect sensitive information within these systems. Encrypted private networks are a common method of securing such systems. However these networks are not always available or practical to set up in time for scenarios which require real time information. This may force communications to utilise public infrastructure. Securing communications for military mobile and Web based systems over public networks poses a greater challenge compared to private encrypted networks. Several security mechanisms from commercial enterprise and social networking systems were adopted and customised in order to secure Cmore, a Web based real time distributed command and control system developed by the Council for Scientific and Industrial Research (CSIR). This paper highlights the security architecture of Cmore and discusses some of the successes and challenges encountered during the design and development of the Cmore architecture. Cmore has been successfully utilised and tested in several field experiments and operations. The resulting security architecture can be applied to other Web and mobile systems.
DA - 2015-03
DB - ResearchSpace
DP - CSIR
KW - Information security
KW - Military information systems
KW - Web systems
KW - Mobile systems
KW - Cyber warfare
KW - Cyber-attacks
LK - https://researchspace.csir.co.za
PY - 2015
T1 - Securing military information systems on public infrastructure
TI - Securing military information systems on public infrastructure
UR - http://hdl.handle.net/10204/8262
ER -
|
en_ZA |